27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Natarajan Vijayarangan<br />

Client and Server negotiate an m-bit shared secret key using ECDH algorithm.<br />

Client and Server have Session key of m bits for Encryption. Client and Server have a cipher<br />

suite.<br />

A secure communication is established between Client and Server.<br />

6. Description of NSP 3<br />

It is similar to Network security protocol 1 and the difference can be seen in Signature generation.<br />

Client uses Jacobi identity, a special product on Lie algebras [8], to authenticate server. The Jacobi<br />

identity (Jacobson 1979) performs on a random challenge RC = x || y ||z (divide into 3 parts -<br />

trifurcation) and satisfies the relationship [[x,y],z] + [[y,z],x] + [[z,x],y] = 0. It is important to know that<br />

Lie product (Lie bracket) has a special property: [x, y] = -[y, x].<br />

Following is the workflow of NSP 3:<br />

(Pre-Shared Key Mechanism) Every client has a pair of Public and Private keys generated by the<br />

server which acts as a Key Generation Center (KGC).<br />

Client initiates the communication to server by sending a message ‘Client Hello!’.<br />

Server generates Random challenge (RC) of n-bits using Pseudo Random Number Generator<br />

(PRNG). Further, Server encrypts RC with client's public key using Elliptic Curve Encryption<br />

(ECE) method.<br />

Client decrypts the encrypted RC with its private key using ECE.<br />

Client computes Jaboci identity on RC = x||y||z and sends the Lie product [[x,y],z] to server.<br />

Server verifies the relationship [[x,y],z] + [[y,z],x] + [[z,x],y] = 0. Server sends its public key using<br />

ECC to Client.<br />

Client and server negotiate an m-bit shared secret key using ECDH algorithm.<br />

Client and server have Session key of m bits for Encryption. Client and server have a cipher suite.<br />

A secure communication is established between Client and Server.<br />

7. Analysis<br />

The proposed network security protocols do not allow replay and rushing attacks. An attacker cannot<br />

guess a random challenge (RC) in NSP 1, since it traverses in an encrypted form. It is safe to use<br />

NSP 1 in different nodes/channels.<br />

Considering NSP 2 that is different from NSP 1 and sends RC in plain with MP(RC). It is interesting to<br />

see the notion of bijective property in MP where an attacker can change RC, but not MP(RC). Given<br />

two distinct random challenges RC1 and RC2, MP(RC1) is not the same as MP(RC2). If the attacker<br />

tries to insert another random challenge, then server could detect this fraud by verifying a client's<br />

signature. Since MP function has Shuffling, T-function and LFSR operations that are invertible<br />

(Vijayarangan and Vijayasarathy 2005, Vijayarangan 2009), the inverse operations of MP -1 { MP(RC1)}<br />

and MP -1 { MP(RC2)} are performed through a primitive polynomial of LFSR, T -1 -function and deshuffling<br />

and their values RC1 and RC2 must be distinct.<br />

In NSP 3, the server will not satisfy Jacobi identity if an attacker changes RC. The rationale behind on<br />

using Jacobi identity is that a Lie product computed on RC from client end must match with the server.<br />

Then the server checks Jacobi identity and ensures that the same client has sent the Lie product. If<br />

the attacker alters a Lie product, then the server could detect this fraud by verifying Jaboci identity. It<br />

is important to know that Abelian Lie algebras (for every x and y , [x,y] = 0 ) should not be considered.<br />

From the above protocols, we can make out a proposition that dishonest clients can be eliminated in a<br />

Mesh Topology Network (MTN) based on NSP 1,2 and 3. Thus, a system of protocols 1,2,3 can be<br />

plugged into an MTN which brings out a strong and secure network.<br />

322

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!