SlideShare uma empresa Scribd logo
1 de 11
A
seminar on

An Efficient Improved Group Key Agreement Protocol Based on
Diffie-Hellman Key Exchange

Presented By:
Jayant Rajurkar
M-Tech (CSE)

1

1
Introduction
• Traditional group key generating methods
using binary-tree performs efficiently when
adding or deleting nodes dynamically.
• when dealing with group key among multinodes in the Internet, their time complexity
grows to O(Nlog2N).
• an improved group key agreement protocol
based on Diffie-Hellman key exchange, which
can reduce the time complexity of this
situation to O(N).
ALGORITHM DESCRIPTIONS
• This method of rapidly generating group key
has a differences in both generating and
maintaining procedures.
• first there is a managing node which is
responsible for gathering and dispatching
information of generating group key.
• second the algorithm is different between
managing node and nonmanaging node to
maintain its binary-tree.
Select Managing Node
we should select one node as managing node
preferred to select the computer with the
strongest capability a s the managing node
If the m nodes are equal in their computing
capability, selection will be carried on
according to IP addresses
IP address is an unsigned 32 bits integer, so we
can select the one with the smallest or the
largest as the managing node.
Generate Complete Binary-tree by Managing Node


each non-managing node sends its Diffie-Hellman
key exchanging “ingredient” to the managing node

After receiving m-1 pieces of ingredients from others and
adding its own ingredient, the managing node can generate
and maintain a complete binary-tree inside its memory, also
calculate the group key using the binary tree.
DYNAMICALLY ADDING AND DELETING
Nodes’ Dynamically Adding

 No matter whether it is the managing node or
nonmanaging node, the updating operation for
adding new node will be completed within
log2N layers in itself binary-tree for each node.

 After updating itself, the managing node takes
its responsibility to send necessary updating
information packages to other non-managing
nodes.
• Nodes’ Dynamically Deleting
Deletion of Non-Managing Nodes:

 The deletion of non-managing nodes is similar to
the adding, beginning with updating the
information stored in the managing node,
followed by sending the necessary information
selected by managing node to every nonmanaging node.
Deletion of Managing Node:
 Before deleting the managing node, a new managing node
should be selected first based on the selection regulation.
 The previous managing node transfers its binary-tree
structure to the new managing node using the old group
key.
PERFORMANCE ANALYSES
• This method starts computing after gathering all the
needed information, which means that each inner
node is calculated only once.
• As a consequence, the time complexity is log2N
rather than the traditional Nlog2N.
• The average time complexity for non-managing
• Nodes may be much smaller than log2N, because the
information stored in each non-managing node is
limited to the minimum received from the managing
node after its selection, which largely reduces the
time cost in the nonmanaging nodes.
SECURITY ANALYSES

• In terms of traditional Diffie-Hellman key-exchange
protocol, there is a well-known attack -- MITM (Man-InThe-Middle Attack)
• The traditional MITM attack can hardly validate to this
method of group key generation.
• One improved MITM can hijack all the communicating
paths between the managing node and other nonmanaging nodes, which works by hijacking the managing
node.
• we can use digital signature technology to defeat this
attack.
• Adding digital signature based authentication technology
to the DH based key exchange protocol also has been
quite common and sophisticated.
Conclusion
• It can effectively reduce overlapping
computing, decrease the packages sending
times, and cut the time complexity from
O(Nlog2N) of traditional binary-tree method
down to O(N).
• The non-managing nodes still maintain basic
binary-tree structure, which enhances the
speed of dynamically adding and deleting
nodes.
• Deals with MITM attack, and come up with an
effective solution to this attack.
THANK YOU……

Mais conteúdo relacionado

Mais procurados

SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)Mohammad Awais Javaid
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolNilantha Piyasiri
 
resource management
  resource management  resource management
resource managementAshish Kumar
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsSolarWinds
 
dos mutual exclusion algos
dos mutual exclusion algosdos mutual exclusion algos
dos mutual exclusion algosAkhil Sharma
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems Haitham Ahmed
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
The Power Of Event Chapter 3
The Power Of Event Chapter 3The Power Of Event Chapter 3
The Power Of Event Chapter 3Woojin Joe
 
Distributed System Security Aspects
Distributed System Security AspectsDistributed System Security Aspects
Distributed System Security Aspectssmita gupta
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring SystemSidharth Goel
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsKarthikeyan Dhayalan
 
group presentation
group presentationgroup presentation
group presentations1120099
 
The Power Of Event Chapter 1
The Power Of Event Chapter 1The Power Of Event Chapter 1
The Power Of Event Chapter 1Woojin Joe
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolPrasenjit Gayen
 
Processor allocation in Distributed Systems
Processor allocation in Distributed SystemsProcessor allocation in Distributed Systems
Processor allocation in Distributed SystemsRitu Ranjan Shrivastwa
 
The Power Of Event Chapter 7
The Power Of Event Chapter 7The Power Of Event Chapter 7
The Power Of Event Chapter 7Woojin Joe
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Abdullaziz Tagawy
 

Mais procurados (20)

SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
resource management
  resource management  resource management
resource management
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the Basics
 
dos mutual exclusion algos
dos mutual exclusion algosdos mutual exclusion algos
dos mutual exclusion algos
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Network management
Network managementNetwork management
Network management
 
The Power Of Event Chapter 3
The Power Of Event Chapter 3The Power Of Event Chapter 3
The Power Of Event Chapter 3
 
Distributed System Security Aspects
Distributed System Security AspectsDistributed System Security Aspects
Distributed System Security Aspects
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
SNMP
SNMPSNMP
SNMP
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
group presentation
group presentationgroup presentation
group presentation
 
The Power Of Event Chapter 1
The Power Of Event Chapter 1The Power Of Event Chapter 1
The Power Of Event Chapter 1
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Processor allocation in Distributed Systems
Processor allocation in Distributed SystemsProcessor allocation in Distributed Systems
Processor allocation in Distributed Systems
 
Chapter00000000
Chapter00000000Chapter00000000
Chapter00000000
 
The Power Of Event Chapter 7
The Power Of Event Chapter 7The Power Of Event Chapter 7
The Power Of Event Chapter 7
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 

Destaque

Network based virtual drawing & secured data sharing using vnc protocol
Network based virtual drawing & secured data sharing using vnc protocolNetwork based virtual drawing & secured data sharing using vnc protocol
Network based virtual drawing & secured data sharing using vnc protocolJAYANT RAJURKAR
 
Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloudCloud Legal Project
 
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCY
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCYPROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCY
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCYI3E Technologies
 
Programming Hybrid Services in the Cloud
Programming Hybrid Services in the CloudProgramming Hybrid Services in the Cloud
Programming Hybrid Services in the CloudHong-Linh Truong
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted dataSELASI OCANSEY
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption SystemsChristopher Frenz
 
Crypto workshop part 3 - Don't do this yourself
Crypto workshop part 3 - Don't do this yourselfCrypto workshop part 3 - Don't do this yourself
Crypto workshop part 3 - Don't do this yourselfhannob
 
Multi-Party Computation for the Masses
Multi-Party Computation for the MassesMulti-Party Computation for the Masses
Multi-Party Computation for the MassesDavid Evans
 
Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergentJayakrishnan U
 
CompTIA: Trends in Cloud Computing
CompTIA: Trends in Cloud ComputingCompTIA: Trends in Cloud Computing
CompTIA: Trends in Cloud ComputingCompTIA
 
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013RightScale
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationPapitha Velumani
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationAdz91 Digital Ads Pvt Ltd
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 

Destaque (19)

Network based virtual drawing & secured data sharing using vnc protocol
Network based virtual drawing & secured data sharing using vnc protocolNetwork based virtual drawing & secured data sharing using vnc protocol
Network based virtual drawing & secured data sharing using vnc protocol
 
Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloud
 
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCY
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCYPROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCY
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCY
 
Programming Hybrid Services in the Cloud
Programming Hybrid Services in the CloudProgramming Hybrid Services in the Cloud
Programming Hybrid Services in the Cloud
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted data
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
 
Crypto workshop part 3 - Don't do this yourself
Crypto workshop part 3 - Don't do this yourselfCrypto workshop part 3 - Don't do this yourself
Crypto workshop part 3 - Don't do this yourself
 
Multi-Party Computation for the Masses
Multi-Party Computation for the MassesMulti-Party Computation for the Masses
Multi-Party Computation for the Masses
 
Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergent
 
CompTIA: Trends in Cloud Computing
CompTIA: Trends in Cloud ComputingCompTIA: Trends in Cloud Computing
CompTIA: Trends in Cloud Computing
 
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
 
Public key cryptography and RSA
Public key cryptography and RSAPublic key cryptography and RSA
Public key cryptography and RSA
 
Seminar cloud computing
Seminar cloud computingSeminar cloud computing
Seminar cloud computing
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 

Semelhante a poster on "An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange "

Securing Mobile
Securing Mobile Securing Mobile
Securing Mobile PREMKUMAR
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Distributive Collaborative Key Agreement Protocol for Dynamic Peer GroupsDistributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Distributive Collaborative Key Agreement Protocol for Dynamic Peer GroupsIRJET Journal
 
Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...Mumbai Academisc
 
Computer system Architecture. This PPT is based on computer system
Computer system Architecture. This PPT is based on computer systemComputer system Architecture. This PPT is based on computer system
Computer system Architecture. This PPT is based on computer systemmohantysikun0
 
1. What are the advantages and disadvantages of hardwired and micro-.pdf
1. What are the advantages and disadvantages of hardwired and micro-.pdf1. What are the advantages and disadvantages of hardwired and micro-.pdf
1. What are the advantages and disadvantages of hardwired and micro-.pdfarihantelehyb
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET Journal
 
Fast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmFast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmJPINFOTECH JAYAPRAKASH
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyCSCJournals
 
Introduction to netlink in linux kernel (english)
Introduction to netlink in linux kernel (english)Introduction to netlink in linux kernel (english)
Introduction to netlink in linux kernel (english)Sneeker Yeh
 
Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Networkijceronline
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdffashiionbeutycare
 
Directions in SELinux Networking
Directions in SELinux NetworkingDirections in SELinux Networking
Directions in SELinux NetworkingJames Morris
 

Semelhante a poster on "An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange " (20)

Securing Mobile
Securing Mobile Securing Mobile
Securing Mobile
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
231 236
231 236231 236
231 236
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Distributive Collaborative Key Agreement Protocol for Dynamic Peer GroupsDistributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
 
Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...Distributed collaborative key agreement and authentication protocols for dyna...
Distributed collaborative key agreement and authentication protocols for dyna...
 
Computer system Architecture. This PPT is based on computer system
Computer system Architecture. This PPT is based on computer systemComputer system Architecture. This PPT is based on computer system
Computer system Architecture. This PPT is based on computer system
 
1. What are the advantages and disadvantages of hardwired and micro-.pdf
1. What are the advantages and disadvantages of hardwired and micro-.pdf1. What are the advantages and disadvantages of hardwired and micro-.pdf
1. What are the advantages and disadvantages of hardwired and micro-.pdf
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
 
Fast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmFast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigm
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
 
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
 
IoT Heap 2
IoT Heap 2IoT Heap 2
IoT Heap 2
 
Introduction to netlink in linux kernel (english)
Introduction to netlink in linux kernel (english)Introduction to netlink in linux kernel (english)
Introduction to netlink in linux kernel (english)
 
Elliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed NetworkElliptic Curve for Secure Group Key Management in Distributed Network
Elliptic Curve for Secure Group Key Management in Distributed Network
 
08-sdnfvmec.pdf
08-sdnfvmec.pdf08-sdnfvmec.pdf
08-sdnfvmec.pdf
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
 
Directions in SELinux Networking
Directions in SELinux NetworkingDirections in SELinux Networking
Directions in SELinux Networking
 
운영체제론 Ch22
운영체제론 Ch22운영체제론 Ch22
운영체제론 Ch22
 

Último

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Último (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

poster on "An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange "

  • 1. A seminar on An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange Presented By: Jayant Rajurkar M-Tech (CSE) 1 1
  • 2. Introduction • Traditional group key generating methods using binary-tree performs efficiently when adding or deleting nodes dynamically. • when dealing with group key among multinodes in the Internet, their time complexity grows to O(Nlog2N). • an improved group key agreement protocol based on Diffie-Hellman key exchange, which can reduce the time complexity of this situation to O(N).
  • 3. ALGORITHM DESCRIPTIONS • This method of rapidly generating group key has a differences in both generating and maintaining procedures. • first there is a managing node which is responsible for gathering and dispatching information of generating group key. • second the algorithm is different between managing node and nonmanaging node to maintain its binary-tree.
  • 4. Select Managing Node we should select one node as managing node preferred to select the computer with the strongest capability a s the managing node If the m nodes are equal in their computing capability, selection will be carried on according to IP addresses IP address is an unsigned 32 bits integer, so we can select the one with the smallest or the largest as the managing node.
  • 5. Generate Complete Binary-tree by Managing Node  each non-managing node sends its Diffie-Hellman key exchanging “ingredient” to the managing node After receiving m-1 pieces of ingredients from others and adding its own ingredient, the managing node can generate and maintain a complete binary-tree inside its memory, also calculate the group key using the binary tree.
  • 6. DYNAMICALLY ADDING AND DELETING Nodes’ Dynamically Adding  No matter whether it is the managing node or nonmanaging node, the updating operation for adding new node will be completed within log2N layers in itself binary-tree for each node.  After updating itself, the managing node takes its responsibility to send necessary updating information packages to other non-managing nodes.
  • 7. • Nodes’ Dynamically Deleting Deletion of Non-Managing Nodes:  The deletion of non-managing nodes is similar to the adding, beginning with updating the information stored in the managing node, followed by sending the necessary information selected by managing node to every nonmanaging node. Deletion of Managing Node:  Before deleting the managing node, a new managing node should be selected first based on the selection regulation.  The previous managing node transfers its binary-tree structure to the new managing node using the old group key.
  • 8. PERFORMANCE ANALYSES • This method starts computing after gathering all the needed information, which means that each inner node is calculated only once. • As a consequence, the time complexity is log2N rather than the traditional Nlog2N. • The average time complexity for non-managing • Nodes may be much smaller than log2N, because the information stored in each non-managing node is limited to the minimum received from the managing node after its selection, which largely reduces the time cost in the nonmanaging nodes.
  • 9. SECURITY ANALYSES • In terms of traditional Diffie-Hellman key-exchange protocol, there is a well-known attack -- MITM (Man-InThe-Middle Attack) • The traditional MITM attack can hardly validate to this method of group key generation. • One improved MITM can hijack all the communicating paths between the managing node and other nonmanaging nodes, which works by hijacking the managing node. • we can use digital signature technology to defeat this attack. • Adding digital signature based authentication technology to the DH based key exchange protocol also has been quite common and sophisticated.
  • 10. Conclusion • It can effectively reduce overlapping computing, decrease the packages sending times, and cut the time complexity from O(Nlog2N) of traditional binary-tree method down to O(N). • The non-managing nodes still maintain basic binary-tree structure, which enhances the speed of dynamically adding and deleting nodes. • Deals with MITM attack, and come up with an effective solution to this attack.