The paper analyzes the Logical Key Hierarchy (LKH) secure multicast protocol focusing on the reliability of the re-keying authentication process. We show that the key management in the LKH model is subject to some attacks. In particular, these attacks can be performed by entities external to the multicast group, as well as from internal users of the multicast group. The spectrum of these attacks is spread from the denial of service (DoS) to the session hijack that is the attacker is able to have legitimate users to commit on a session key that is provided by the attacker. The contributions of this paper are: (1) the definition of the threats the LKH key management is subject to; and (2) a reliable key authentication scheme that solves the weaknesses previously identified. This objective is achieved without resorting to public key signatures.

A reliable key authentication schema for secure multicast communications / Di Pietro, Roberto; Durante, Antonio; Mancini, Luigi Vincenzo. - STAMPA. - (2003), pp. 231-240. (Intervento presentato al convegno 22nd IEEE International Symposium on Reliable Distributed Systems tenutosi a Florence, Italy nel 2003) [10.1109/RELDIS.2003.1238073].

A reliable key authentication schema for secure multicast communications

MANCINI, Luigi Vincenzo
2003

Abstract

The paper analyzes the Logical Key Hierarchy (LKH) secure multicast protocol focusing on the reliability of the re-keying authentication process. We show that the key management in the LKH model is subject to some attacks. In particular, these attacks can be performed by entities external to the multicast group, as well as from internal users of the multicast group. The spectrum of these attacks is spread from the denial of service (DoS) to the session hijack that is the attacker is able to have legitimate users to commit on a session key that is provided by the attacker. The contributions of this paper are: (1) the definition of the threats the LKH key management is subject to; and (2) a reliable key authentication scheme that solves the weaknesses previously identified. This objective is achieved without resorting to public key signatures.
2003
22nd IEEE International Symposium on Reliable Distributed Systems
Security, Multicast communication; Authentication; Confidentiality; Group key management; Key distribution; Logical key hierarchy; Re-keying; Secure multicast communications; Security; Hardware and Architecture; Public key cryptography; TV
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
A reliable key authentication schema for secure multicast communications / Di Pietro, Roberto; Durante, Antonio; Mancini, Luigi Vincenzo. - STAMPA. - (2003), pp. 231-240. (Intervento presentato al convegno 22nd IEEE International Symposium on Reliable Distributed Systems tenutosi a Florence, Italy nel 2003) [10.1109/RELDIS.2003.1238073].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/881071
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 12
  • ???jsp.display-item.citation.isi??? 6
social impact