Group diffie hellman key exchange algorithm based secure group communication

S. Sathyanarayana, R. Lavanya
{"title":"Group diffie hellman key exchange algorithm based secure group communication","authors":"S. Sathyanarayana, R. Lavanya","doi":"10.1109/ICATCCT.2017.8389149","DOIUrl":null,"url":null,"abstract":"With the rapid development in the field of internet, most of the communication takes place through insecure network. Rather than one to one communication, group communication incur significant utilization of the bandwidth. Security of an information can be achieved by the process of encryption and decryption of data with the secret group key. Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm. In group communication, the user may join or leave the group at any time. In order to achieve security requirements like confidentiality, authentication, integrity, forward secrecy and backward secrecy, the group key must be updated immediately after the membership change. In this regard algorithms are described for initial group setup, group member withdrawal and group member inclusion. The generated group secret key is used in the symmetric encryption and decryption of an image. Symmetric encryption methods like Advanced Encryption Standard (AES) and Cipher Feedback mode (CFB) algorithms are used for encryption and decryption of an image. The performance analysis of the secret key in an image encryption/decryption is obtained by comparing the results of entropy, correlation coefficient and histogram band of an original image with an encrypted image. It is observed that, from the value of entropy, correlation coefficient and histogram band, that an encrypted image does not contain any residual information. So that it is very difficult for the unauthorized recipient to appreciate the data transmitted.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICATCCT.2017.8389149","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

With the rapid development in the field of internet, most of the communication takes place through insecure network. Rather than one to one communication, group communication incur significant utilization of the bandwidth. Security of an information can be achieved by the process of encryption and decryption of data with the secret group key. Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm. In group communication, the user may join or leave the group at any time. In order to achieve security requirements like confidentiality, authentication, integrity, forward secrecy and backward secrecy, the group key must be updated immediately after the membership change. In this regard algorithms are described for initial group setup, group member withdrawal and group member inclusion. The generated group secret key is used in the symmetric encryption and decryption of an image. Symmetric encryption methods like Advanced Encryption Standard (AES) and Cipher Feedback mode (CFB) algorithms are used for encryption and decryption of an image. The performance analysis of the secret key in an image encryption/decryption is obtained by comparing the results of entropy, correlation coefficient and histogram band of an original image with an encrypted image. It is observed that, from the value of entropy, correlation coefficient and histogram band, that an encrypted image does not contain any residual information. So that it is very difficult for the unauthorized recipient to appreciate the data transmitted.
基于群diffie hellman密钥交换算法的安全群通信
随着互联网领域的迅速发展,大部分通信都是在不安全的网络上进行的。而不是一对一的通信,组通信导致大量的带宽利用率。信息的安全性可以通过使用秘密组密钥对数据进行加密和解密的过程来实现。安全性还取决于对组秘密密钥的有效管理。提出了基于Diffie-Hellman密钥交换算法的组密钥生成算法。在群组通信中,用户可以随时加入或离开群组。为了实现机密性、身份验证、完整性、前向保密和后向保密等安全需求,必须在成员变更后立即更新组密钥。在这方面,描述了初始群组建立、群组成员退出和群组成员加入的算法。生成的组秘密密钥用于图像的对称加密和解密。对称加密方法,如高级加密标准(AES)和密码反馈模式(CFB)算法用于图像的加密和解密。通过比较原始图像与加密图像的熵、相关系数和直方图带的结果,得到密钥在图像加解密中的性能分析。从熵、相关系数和直方图频带的值可以看出,加密后的图像不包含任何残差信息。因此,未经授权的接收方很难理解传输的数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信