© 2014, IJARCSMS All Rights Reserved 1 | P age
ISSN: 2321-7782 (Online)
Volume 2, Issue 6, June 2014
International Journal of Advance Research in
Computer Science and Management Studies
Research Article / Survey Paper / Case Study
Available online at: www.ijarcsms.com
Group Communication Using-A Dynamic Key Generation
Protocol
B. T. Geetha
1
Research Scholar
Sathyabama University
Chennai – India
Dr. M. V. Srinath
2
Head – Content Development
Efuture Soft
Chennai – India
V. Perumal
3
Associate Professor
Saveetha Engineering College
Chennai – India
Abstract: The objective of this paper is to generate a dynamic key protocol to achieve the group communication using the
Key Generation Centre and prevent possible attacks in communication. Key transfer protocols rely on a mutually trusted key
Generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most often,
KGC encrypts session keys under another secret key shared with each entity during registration.
In this paper, we propose an authenticated key transfer protocol based on secret sharing scheme that KGC can broadcast
group key information to all group members at once and only authorized group members can recover the group key; but
unauthorized users cannot recover the group key. The confidentiality of this transformation is secure. We also provide
authentication for transporting this group key.
Keywords: KGC, Dynamic Key, Group key.
I. INTRODUCTION
The most important issue in communication is security, in most secure communication, the following two security
functions are commonly considered Message confidentiality ensures the sender that the message can be read only by an
intended receiver. Message authentication ensures the receiver that the message was sent by a specified sender and the
message was not altered en route.
To implement these two functions, one-time session keys need to be shared among communication entities to encrypt and
authenticate messages. Thus, before exchanging communication messages, a key establishment protocol needs to distribute one-
time secret session keys to all participating entities.
The key establishment protocol also needs to provide confidentiality and authentication for session keys. According to there
are two types of key establishment protocols: key transfer protocols and key agreement protocols.
Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and then transport
session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret key shared
with each entity during registration.
In key agreement protocols, all communication entities are involved to determine session keys. The most commonly used
key agreement protocol is Diffie-Hellman (DH) key agreement protocol.
In DH protocol, the session key is determined by exchanging public keys of two communication entities. Since the public
key itself does not provide any authentication, a digital signature can be attached to the public key to provide authentication.