CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Error Correction for a Secure Multicast Group Key Management using Gray Code

by R. Varalakshmi, V. Rhymend Uthariaraj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 1
Year of Publication: 2013
Authors: R. Varalakshmi, V. Rhymend Uthariaraj
10.5120/11047-5939

R. Varalakshmi, V. Rhymend Uthariaraj . Error Correction for a Secure Multicast Group Key Management using Gray Code. International Journal of Computer Applications. 66, 1 ( March 2013), 9-14. DOI=10.5120/11047-5939

@article{ 10.5120/11047-5939,
author = { R. Varalakshmi, V. Rhymend Uthariaraj },
title = { Error Correction for a Secure Multicast Group Key Management using Gray Code },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 1 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number1/11047-5939/ },
doi = { 10.5120/11047-5939 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:21:11.042543+05:30
%A R. Varalakshmi
%A V. Rhymend Uthariaraj
%T Error Correction for a Secure Multicast Group Key Management using Gray Code
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 1
%P 9-14
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Key agreement protocols are designed to provide two or more specified parties communicating over public channels with a common shared secret key, which may subsequently be used to exchange information among communicating parties. Therefore, building secure key agreement protocols over open networks is essential in information security. Error Correcting Codes (ECC) is one of many tools made available for achieving data transmission. Low Density Parity-Check codes (LDPC), a linear block code which has the advantage that they provide the performance at that close to the limited capacity for many different channels and linear time complex algorithms for decoding. In this paper, we propose a new group key computation protocol that provides more security and also integrates a Gallager code and it is proved that this proposed approach takes less decoding time complexity.

References
  1. A. Bellardie, 1996, "Scalable Multicast Key Distribution" RFC 1949.
  2. Chung Kei Wong, Mohamed Gouda, and Simon S Lam, 1998, "Secure Group Communication Using Key Graphs", Proceedings of ACMSIGCOMM, Vancouver, British Columbia.
  3. Debby M. Wallner, Eric J. Harder, Ryan C. Agee, 1997, "Key Management for Multicast: Issues and Architectures", Informational RFC, draft-Wallnerkey-arch-ootxt.
  4. H. Harney, C. Muckenhirn, 1997, "Group Key Management Protocol (GKMP) Architecture", RFC 2094.
  5. D. McGrew and A. Sherman, 1998, "Key establishment in large dynamic groups using one way function trees".
  6. C Berrou, A. Glavieux and P. Thitimajshima, 1993, "Near Shannon limit error-correcting Coding and Decoding," Proc. IEEE Int. Conf. Comm. , pp. 1064-1070.
  7. R. M. Tanner, 1981, "A Recursive Approach to Low Complexity Code," IEEE Trans. Information Theory, pp. 533-547.
  8. J. L. Fan, 2000, "Array Codes as low-density parity-check codes," Proc. 2nd Int. Symp. Turbo Code, Beit, France, pp. 543-546.
  9. R. Gallager, 1962, "Low-density Parity-check Code," IRE Trans. Information Theory, pp. 21-28.
  10. Jin Lu. , and Jose M. F. Moura, 2010, "Linear Time Encoding of LDPC Codes" IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 233-249.
  11. Ran Canetti, Benny Pinkas, 1998, "A Taxonomy of Multicast security issues", Internet Draft.
  12. SuvoMittra, 1997, "Iolus: A Framework for Scalable Secure Multicasting", Proceedings of ACMSIGCOMM'97, Cannes, France, pp. 277-288.
  13. Rafaeli and D. Hutchinson, 2003, "A Survey of Key Management for Secure group communication", ACM Computing Surveys, 35:309-329.
  14. D. J. C. Mackay, 1999, "Good error-correcting codes based on very sparse matrices," IEEE Trans. Inform. Theory, vol. 45, no. 2, pp. 399–431.
  15. G. Berrou and A. Glavieux and P. Thitimajshima, 1993, "Near Shannon limit error-correcting coding: Turbo codes," Proc. 1993, International Conf. Comm, pp. 1064-1070, Geneva, Switzerland.
  16. J. Lu, Jos´e M. F. Moura, and H. Zhang, 2003, "Efficient encoding of cycle codes: a graphical approach," Proc. of 37th Asilomar Conference on Signals, Systems, and Computers, pp. 69-73, PACIFIC GROVE, CA, Nov. 9-12.
  17. J. Katz and M. Yung, 2007, "Scalable Protocols for Authenticated Group Key Exchange," J. Cryptology, vol. 20, pp. 85-113.
  18. Wei Yu, Yan (Lindsay) Sun, Member, IEEE, and K. J. Ray Liu, Fellow, IEEE, 2007, "Optimizing the Rekeying Cost for Contributory Group Key Agreement Schemes", IEEE transactions on dependable and secure computing, vol. 4, no. 3.
  19. S. Mittra, 1997, "Iolus: A framework for scalable secure multicasting," Proceedings of the ACM SIGCOMM, vol. 27, no. 4, pp. 277-288, New York.
  20. R. Varalakshmi, Dr. V. Rhymend Uthariaraj, 2011, "A New Secure Multicast Group Key Management Using Gray Code" IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011, pp 85-90.
Index Terms

Computer Science
Information Sciences

Keywords

Key agreement protocols Error Correcting Codes Gallager code Low Density Parity-Check codes Key Computation