Preview

Group Key Establishment Analysis

Better Essays
Open Document
Open Document
1146 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Group Key Establishment Analysis
1.2.2 Group Key Establishment
The overview of key establishment in group communication is discussed with the basic service and additional security properties, fault tolerance and group management.
1.2.2.1 Basic Service and Additional Security Properties
The basic service and security properties of a key establishment are roughly the same for the n-party case, i.e., groups, as they are for the two-party case described above. The main differences which have to be considered are as follows. On the one hand, due to the dynamic nature of a group, it is more difficult to reason about the honesty of parties. A party might be considered trusted in respect to its “legal” membership period. However, it also might try to misuse this time to prepare access to the group at other “illegal” membership periods, potentially even in collusion with other former group members. In fact, a number of group key
…show more content…
Simple group key authentication is the sufficient and only practical form of authentication in the case of large asymmetric groups where a static party controls access to the group and members do not know each other, e.g., in video-on-demand applications. However, in DPGs, where the roles of group members are symmetric and a common agreement on the group membership is essential, mutual group key authentication is more desirable and more natural than simple group key authentication. In groups, the verification of the authenticity does not always have to be direct as in the two-party case. It also can be indirect via some other group member(s). This requires additional trust assumptions in these intermediary group members. However, these trust assumptions are quite natural when trust insiders not to give away the common group key. Similarly, in extending explicit key authentication, a confirmation which is either direct and pairwise or indirect is

You May Also Find These Documents Helpful

  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    is3230 week1 assgnmnt1

    • 362 Words
    • 3 Pages

    References: Ballad, Bill, Tricia Ballad, and Erin K. Banks. 2011. Access Control, Authentication, and Public Key Infrastructure. Sudbury: Jones & Bartlett Learning.…

    • 362 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Qlt1 Task 3

    • 760 Words
    • 4 Pages

    |3. |Communication –relating to each other in the group by |3. |None Communicating of some group members all the time |…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    CSEC 630 Final Exam

    • 1055 Words
    • 4 Pages

    Includes descriptions of security groups and their relationship to one another. This section maps group policies to security groups.…

    • 1055 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Cited: Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington: Jones & Bartlett Learning.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Group communication refers to the communication between a group of people and another group of people or within the group itself. A group is normally considered as a collection of people that number 3 or more. This type of communication is very helpful when you need to get across the same message to more than 1 person. For example if you are a manager who is announcing a change in hours for employees shifts, then you would gather everyone together. That way it is quicker and saves you time. Also it is helpful when you want to discuss something with your team mates or business. Group debates and discussions are very popular.…

    • 817 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    P1 Unit 1 Communication

    • 1983 Words
    • 8 Pages

    Unit 1 communication in health and social care P1 Context of communication One to one One to one communication is when two people having conversation between them without the third person getting involved into the conversation. A one to one communication could be a service provider talking to a service user, Example in a care home a one to one communication could be when a key worker is talking to a service user, this could he/she asking the service user if they had anything to eat or had a good sleep.it could also be the other way around when the service user is telling the key worker he/she life story. Group Group communication can also be done the same way as one to one communication is done, however group communication is only when…

    • 1983 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Unit 1 Communication

    • 1312 Words
    • 6 Pages

    Group Communication: A context of communication between many people. It may be a class discussions, hospitals agency coming together to communicate on the health of…

    • 1312 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Group communication relies on prior understanding of the group objectives and the group's culture. Unlike individual communication, individuals in a group do not provide feedback directly to one another. Rather, they provide feedback to be addressed by the entire group. With group communication, every participant’s input is necessary to help the group comprehend the objectives so that the whole group can benefit and arrive at mutual understanding. Therefore, in individual communication, the exchange of ideas and opinion is specific to the two individuals involved. Whereas, group communication involves many people and the communication is not specific to just one person. Group communication includes the input of many people which makes the process more difficult. Everyone in the group contributes ideas that need consideration. Members of a group want to feel that their input is having impact on the group dynamics.…

    • 1104 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Collaborative Technology

    • 4398 Words
    • 18 Pages

    During the past ten years collaborative technologies have evolved. These technologies can be characterized by variations along the continua of time, space and level of group support (Alavi & Kenn, 1989; DeSanctis & Gallupe, 1987; Johansen, 1988). The term Group Support System (GSS) refers to a computer-based electronic system, frequently implemented on a local area network (LAN) to support the work of groups and to supplement the meeting process (Dennis, et.…

    • 4398 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Group Dynamics

    • 1615 Words
    • 7 Pages

    Groups are used for many different purposes. According to Jex and Britt, “organizations make use of groups for an obvious reason: A group can accomplish more…

    • 1615 Words
    • 7 Pages
    Powerful Essays