Outline

  • Abstract
  • Research Highlights
  • Keywords
  • 1. Introduction
  • 2. Related Works
  • 2.1. Redefined Liaw’s Broadcasting Cryptosystem
  • 2.1.1. System Setup Phase
  • 2.1.2. Broadcasting Phase
  • 2.1.3. Decryption Phase
  • 2.2. Zhu–wu’s Cryptanalysis
  • 3. Further Cryptanalysis
  • 3.1. Integrity Violence of the Session Key from Illegal Modification
  • 3.2. Session Key Modification Attack
  • 3.3. Message Modification Attack
  • 4. Proposed Authenticated Broadcasting Cryptosystem and Its Application to Grid Computing
  • 4.1. the Proposed Authenticated Broadcasting Cryptosystem
  • 4.1.1. System Setup Phase
  • 4.1.2. Broadcasting Phase
  • 4.1.3. Decryption Phase
  • 4.2. Application to Grid Computing Environments
  • 5. Security Analysis
  • 6. Performance Analysis
  • 7. Conclusions
  • Acknowledgements
  • References

رئوس مطالب

  • چكيده
  • 1. مقدمه
  • 2. آثار مرتبط
  • 1.2. سيستم رمز راديويي اصلاح شده لياو
  • 1.1.2. فاز راه اندازی سيستم
  • 2.1.2. فاز انتشار
  • 3.1.2. فاز رمزگشایی
  • 2.2. آناليز رمز ژو - وو
  • 3. تحليل رمز بيشتر
  • 1.3. نقض بي نقصي كليد دستور كار از اصلاح غيرقانونی
  • 2.3. حمله تغيير كليد جلسه
  • 3.3. حمله تغيير پيام
  • 4. سيستم رمزگذاري راديويي معتبر بيان شده و كاربرد آن برای محاسبه شبكه
  • 1.4. سيستم رمزي انتقالي معتبر بيان شده
  • 1.1.4. فاز راه اندازي سيستم
  • 2.1.4. فاز انتشار
  • 3.1.4. فاز رمزگشايی
  • 2.4. كاربرد برای محيط های محاسبه شبكه
  • 5. تحليل امنيت
  • 6. تحليل عملكرد
  • نتيجه گيری

Abstract

Security is one of the major requirements of grid computing. In grid computing environments, it should be guaranteed that efficient and secure authenticated broadcasting technologies have been applied for users and servers. In addition, it should be ensured that resources and data are not provided by an attacker. The main purpose of a broadcasting cryptosystem is to establish a secure communication channel from a sender to a group of legal receivers. Recently, several broadcasting cryptosystems have been proposed based upon various cryptographic techniques. However, many researchers pointed out the several security weaknesses in the many previously proposed broadcasting cryptosystems. This paper proposes a new secure broadcasting cryptosystem that can withstand various security attacks and is applicable to grid computing environment. As a result, the proposed broadcasting cryptosystem not only has advantages of the broadcasting cryptosystem, but also is more secure and practical compared with previous related broadcasting cryptosystems.

Research highlights ► This research presents a new secure broadcasting cryptosystem. ► It is suitable for grid computing environments. ► It provides strong security compared with related cryptosystems. ► It provides secure authentication and secure session key establishment.

Keywords: - - -

Conclusions

The purpose of a broadcasting cryptosystem is to establish a secure communication channel from a sender to a group of legal receivers. This paper pointed out that the redefined Liaw’s broadcasting cryptosystem is still insecure to the integrity violence of the session key from illegal modification, the session key modification attack and the message modification attack. In addition, this paper proposed a new authenticated broadcasting cryptosystem in order to overcome the weaknesses of the the redefined Liaw’s broadcasting cryptosystem. Moreover, this paper also presented an application example to grid computing environments of the proposed cryptosystem. As a result, the proposed cryptosystem not only has the advantages of the redefined Liaw’s broadcasting cryptosystem, but is also more secure and practical compared with previous related broadcasting cryptosystems.

دانلود ترجمه تخصصی این مقاله دانلود رایگان فایل pdf انگلیسی