{"title":"基于群diffie hellman密钥交换算法的安全群通信","authors":"S. Sathyanarayana, R. Lavanya","doi":"10.1109/ICATCCT.2017.8389149","DOIUrl":null,"url":null,"abstract":"With the rapid development in the field of internet, most of the communication takes place through insecure network. Rather than one to one communication, group communication incur significant utilization of the bandwidth. Security of an information can be achieved by the process of encryption and decryption of data with the secret group key. Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm. In group communication, the user may join or leave the group at any time. In order to achieve security requirements like confidentiality, authentication, integrity, forward secrecy and backward secrecy, the group key must be updated immediately after the membership change. In this regard algorithms are described for initial group setup, group member withdrawal and group member inclusion. The generated group secret key is used in the symmetric encryption and decryption of an image. Symmetric encryption methods like Advanced Encryption Standard (AES) and Cipher Feedback mode (CFB) algorithms are used for encryption and decryption of an image. The performance analysis of the secret key in an image encryption/decryption is obtained by comparing the results of entropy, correlation coefficient and histogram band of an original image with an encrypted image. It is observed that, from the value of entropy, correlation coefficient and histogram band, that an encrypted image does not contain any residual information. So that it is very difficult for the unauthorized recipient to appreciate the data transmitted.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Group diffie hellman key exchange algorithm based secure group communication\",\"authors\":\"S. Sathyanarayana, R. Lavanya\",\"doi\":\"10.1109/ICATCCT.2017.8389149\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid development in the field of internet, most of the communication takes place through insecure network. Rather than one to one communication, group communication incur significant utilization of the bandwidth. Security of an information can be achieved by the process of encryption and decryption of data with the secret group key. Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm. In group communication, the user may join or leave the group at any time. In order to achieve security requirements like confidentiality, authentication, integrity, forward secrecy and backward secrecy, the group key must be updated immediately after the membership change. In this regard algorithms are described for initial group setup, group member withdrawal and group member inclusion. The generated group secret key is used in the symmetric encryption and decryption of an image. Symmetric encryption methods like Advanced Encryption Standard (AES) and Cipher Feedback mode (CFB) algorithms are used for encryption and decryption of an image. The performance analysis of the secret key in an image encryption/decryption is obtained by comparing the results of entropy, correlation coefficient and histogram band of an original image with an encrypted image. It is observed that, from the value of entropy, correlation coefficient and histogram band, that an encrypted image does not contain any residual information. So that it is very difficult for the unauthorized recipient to appreciate the data transmitted.\",\"PeriodicalId\":123050,\"journal\":{\"name\":\"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICATCCT.2017.8389149\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICATCCT.2017.8389149","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Group diffie hellman key exchange algorithm based secure group communication
With the rapid development in the field of internet, most of the communication takes place through insecure network. Rather than one to one communication, group communication incur significant utilization of the bandwidth. Security of an information can be achieved by the process of encryption and decryption of data with the secret group key. Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm. In group communication, the user may join or leave the group at any time. In order to achieve security requirements like confidentiality, authentication, integrity, forward secrecy and backward secrecy, the group key must be updated immediately after the membership change. In this regard algorithms are described for initial group setup, group member withdrawal and group member inclusion. The generated group secret key is used in the symmetric encryption and decryption of an image. Symmetric encryption methods like Advanced Encryption Standard (AES) and Cipher Feedback mode (CFB) algorithms are used for encryption and decryption of an image. The performance analysis of the secret key in an image encryption/decryption is obtained by comparing the results of entropy, correlation coefficient and histogram band of an original image with an encrypted image. It is observed that, from the value of entropy, correlation coefficient and histogram band, that an encrypted image does not contain any residual information. So that it is very difficult for the unauthorized recipient to appreciate the data transmitted.