< draft-radha-msec-ckmd-00.txt   draft-radha-msec-ckmd-01.txt >
Internet Engineering Task Force Radhakrishna Sampigethaya Internet Engineering Task Force Radhakrishna Sampigethaya
INTERNET-DRAFT Mingyan Li INTERNET-DRAFT Mingyan Li
Radha Poovendran Radha Poovendran
Dept. of Electrical Engineering Dept. of Electrical Engineering
University of Washington, Seattle University of Washington, Seattle
C. Berenstein C. Berenstein
University of Maryland, College Park University of Maryland, College Park
October, 2001 April, 2002
Centralized Key Management and Distribution for Dynamic Centralized Key Management and Distribution for Dynamic
Multicast Groups: Scalabilility Issues Multicast Groups: Scalability Issues
<draft-radha-msec-ckmd-00.txt> <draft-radha-msec-ckmd-01.txt>
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance This document is an Internet-Draft and is in full conformance
with all provisions of Section 10 of RFC2026. with all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Internet-Drafts are working documents of the Internet
Engineering Task Force (IETF), its areas, and its working Engineering Task Force (IETF), its areas, and its working
groups. Note that other groups may also distribute working groups. Note that other groups may also distribute working
documents as Internet Drafts. documents as Internet Drafts.
skipping to change at page 1, line 40 skipping to change at page 1, line 40
six months and may be updated, replaced, or obsoleted by other six months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet- documents at any time. It is inappropriate to use Internet-
Drafts as reference material or to cite them other than as Drafts as reference material or to cite them other than as
"work in progress." "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed The list of Internet-Draft Shadow Directories can be accessed
at http://www.ietf.org/shadow.html. at http://www.ietf.org/shadow.html.
This document expires on April, 2002 This document expires on October, 2002
Abstract: Abstract:
========= =========
We present our work on efficient scalable solutions to the hierarchical We present our work on efficient scalable solutions to the hierarchical
key management and distribution problem for secure multicast sessions. key management and distribution problem for secure multicast sessions.
We take two rooted-tree based schemes that solve hierarchical key We take two rooted-tree based schemes that solve hierarchical key
management and distribution problem and then present ways of making management and distribution problem and then present ways of making
these schemes more efficient by reducing the tree center key storage these schemes more efficient by reducing the tree center key storage
with an upper bound on key update communication. The objective of with an upper bound on key update communication. The objective of
skipping to change at page 14, line 35 skipping to change at page 14, line 35
of the log_a(N) tree levels. of the log_a(N) tree levels.
The GC storage would be O(N) as the number of leaf nodes will be fixed The GC storage would be O(N) as the number of leaf nodes will be fixed
by the group size N. The user storage, though numerically slightly less by the group size N. The user storage, though numerically slightly less
than OFT, will still be O(log N). than OFT, will still be O(log N).
2.2.4 Comparison between LKH, OFT, OFC: 2.2.4 Comparison between LKH, OFT, OFC:
--------------------------------------- ---------------------------------------
Comparison between LKH and OFT: Comparison between LKH and OFT:
Both the LKH, OFT and OFC have a tree structure, and the height of the Both the LKH, OFT and OFC have a tree structure, and the height of the
tree determines the user storage and the key update communication as tree determines the user st has been rigorously
O(log_a(N)) for all the schemes. The GC storage for the three schemes
is related to the group size N as O(N). However, the schemes are
different in the way the keys are computed and stored. The keys on a
LKH tree are generated independently, and the GC has to store all the
keys of a tree. Hence, the GC storage of the LKH depends on the tree
height, which is a function of the tree degree a and the group size N.
In contrast, in OFT and OFC, given all the leaf keys at the bottom
level of the tree, the GC can derive all other keys on the tree.
Therefore, the GC in OFT and OFC only stores all the leaf keys and the
GC storage is independent of the degree of the tree. Note that LKH has
the GC storage as (aN-1)/(a-1), which is a function of the degree of
the tree.Between OFT and OFC, the difference is in the function that
is used tocompute the upper level keys from the lower level keys.
Also, thesecurity of the OFC scheme, unlike OFT, has been rigorously
proved because of the solidarity of pseudo-random function used in proved because of the solidarity of pseudo-random function used in
OFC. In [Can 2] the authors have claimed the security of OFC to be OFC. In [Can 2] the authors have claimed the security of OFC to be
better than that of LKH. More specifically, if assuming that a third better than that of LKH. More specifically, if assuming that a third
party, which is capable of decrypting encryptions in a certain subpace party, which is capable of decrypting encryptions in a certain subpace
(referred to as 'weak subspace'), takes control of the GC, then the (referred to as 'weak subspace'), takes control of the GC, then the
third party could generate keys on the LKH tree such that they appear third party could generate keys on the LKH tree such that they appear
to be random, but the encryptions that use these keys would always be to be random, but the encryptions that use these keys would always be
in the weak subpace. Hence a third party could hack into the in the weak subpace. Hence a third party could hack into the
communications of a multicast group which uses the LKH scheme. communications of a multicast group which uses the LKH scheme.
However, in the OFC scheme, the root key as well all other keys on the However, in the OFC scheme, the root key as well all other keys on the
skipping to change at page 31, line 49 skipping to change at page 31, line 49
Tel: +1 301 405-6845 Tel: +1 301 405-6845
11. Acknowledgments: 11. Acknowledgments:
==================== ====================
We would like to thank Dr. Eric J. Harder at National Security Agency We would like to thank Dr. Eric J. Harder at National Security Agency
(NSA) and David A. McGrew at Cisco Systems, for their useful comments. (NSA) and David A. McGrew at Cisco Systems, for their useful comments.
Our work has been supported by the National Science Foundation under Our work has been supported by the National Science Foundation under
NSF Faculty Career Development Award ANI 00-93187. NSF Faculty Career Development Award ANI 00-93187.
This document expires on April, 2002 This document expires on October, 2002
 End of changes. 6 change blocks. 
19 lines changed or deleted 5 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/