Wednesday, 16 January 2013

Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting


NANO SCIENTIFIC RESEARCH CENTRE PVT.LTD.,  AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926


DOT NET PROJECTS LIST--2013
DOT NET 2013 IEEE PAPERS


Security of Bertino-Shang-Wagstaff
Time-Bound Hierarchical Key Management
Scheme for Secure Broadcasting


ABSTRACT

Recently, Bertino, Shang and Wagstaff proposed a time-bound hierarchical key management scheme for secure broadcasting. Their scheme is built on elliptic curve cryptography and implemented with tamper-resistant devices. In this paper, we present two collusion attacks on Bertino-Shang-Wagstaff scheme. The first attack does not need to compromise any decryption device, while the second attack requires to compromise single decryption device only. Both attacks are feasible and effective

EXISTING SYSTEM
Tzeng proposed a time-bound cryptographic key assignment scheme for access control in a partial-order hierarchy. Tzeng’s scheme requires the computation of Lucas functions and module exponentiations to derive a secret class key and thus, is computationally inefficient. Moreover, Yi and Ye  has shown that three users can conspire to access some secret class keys that they should not know according to Tzeng’s scheme . In 2004, Chien  improved the efficiency and security of Tzeng’s scheme, and proposed another time-bound hierarchical key assignment scheme. Chien’s scheme is built on hash function and implemented with tamper-resistant devices, and therefore, greatly reduces the computation load and implementation cost. However, Yi  has shown that three users can still conspire to decrypt some data with one of their decryption devices, which should not have derived the decryption key according to Chien’s scheme.
PROPOSED SYSTEM

Inspired by Chien’s idea, Bertino, Shang and Wagstaff [1]proposed a new time-bound hierarchical key management schemefor secure broadcasting recently. Their scheme is built on ellipticcurve cryptography and also implemented with tamper-resistant devices. In this paper, we present two collusion attacks on Bertino-Shang-Wagstaff scheme. In both attacks, two users collude todecrypt some broadcast data that they have not subscribed to,using one of their decryption devices.

SYSTEM SPECIFICATION

HARDWARE CONFIGURATION
PROCESSOR             :           PENTIUM  IV
RAM                           :           512 MD SD RAM
HARD DISK              :           50 GB

SOFTWARE CONFIGURATION
OPERATING SYSTEM                    :           Windows XP  (Version 2002)
ENVIRONMENT                              :           Visual Studio .NET 2008
.NET FRAMEWORK                        :           Version 3.5
FRONT END                                     :           C#.Net
LANGUAGE                                     :           C#
BACK END                                       :           SQL SERVER 2005









No comments:

Post a Comment