© 2014, IJARCSMS All Rights Reserved 1 | P age ISSN: 2321-7782 (Online) Volume 2, Issue 6, June 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Group Communication Using-A Dynamic Key Generation Protocol B. T. Geetha 1 Research Scholar Sathyabama University Chennai India Dr. M. V. Srinath 2 Head Content Development Efuture Soft Chennai India V. Perumal 3 Associate Professor Saveetha Engineering College Chennai India Abstract: The objective of this paper is to generate a dynamic key protocol to achieve the group communication using the Key Generation Centre and prevent possible attacks in communication. Key transfer protocols rely on a mutually trusted key Generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol based on secret sharing scheme that KGC can broadcast group key information to all group members at once and only authorized group members can recover the group key; but unauthorized users cannot recover the group key. The confidentiality of this transformation is secure. We also provide authentication for transporting this group key. Keywords: KGC, Dynamic Key, Group key. I. INTRODUCTION The most important issue in communication is security, in most secure communication, the following two security functions are commonly considered Message confidentiality ensures the sender that the message can be read only by an intended receiver. Message authentication ensures the receiver that the message was sent by a specified sender and the message was not altered en route. To implement these two functions, one-time session keys need to be shared among communication entities to encrypt and authenticate messages. Thus, before exchanging communication messages, a key establishment protocol needs to distribute one- time secret session keys to all participating entities. The key establishment protocol also needs to provide confidentiality and authentication for session keys. According to there are two types of key establishment protocols: key transfer protocols and key agreement protocols. Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and then transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret key shared with each entity during registration. In key agreement protocols, all communication entities are involved to determine session keys. The most commonly used key agreement protocol is Diffie-Hellman (DH) key agreement protocol. In DH protocol, the session key is determined by exchanging public keys of two communication entities. Since the public key itself does not provide any authentication, a digital signature can be attached to the public key to provide authentication.