Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/3614
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Şahin, Serap | en |
dc.contributor.author | Aslanoğlu, Rabia | - |
dc.date.accessioned | 2014-07-22T13:51:57Z | - |
dc.date.available | 2014-07-22T13:51:57Z | - |
dc.date.issued | 2013 | en |
dc.identifier.uri | http://hdl.handle.net/11147/3614 | - |
dc.description | Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2013 | en |
dc.description | Includes bibliographical references (leaves: 97-103) | en |
dc.description | Text in English; Abstract: Turkish and English | en |
dc.description | x, 154 leaves | en |
dc.description.abstract | The aim of this study is to establish a common secret key over an open network for a group of user to be used then symmetrical secure communication between them. There are two methods of GKE protocol which are key agreement and key distribution. Key agreement is a mechanism whereby the parties jointly establish a common secret. As to key distribution, it is a mechanism whereby one of the parties creates or obtains a secret value and then securely distributes it to other parties. In this study, both methods is applied and analyzed in two different GKE protocols. Desirable properties of a GKE are security and efficiency. Security is attributed in terms of preventing attacks against passive and active adversary. Efficiency is quantified in terms of computation, communication and round complexity. When constructing a GKE, the challenge is to provide security and efficiency according to attributed and quantified terms. Two main cryptographic tools are selected in order to handle the defined challenge. One of them is bilinear pairing which is based on elliptic curve cryptography and another is verifiable secret sharing which is based on multiparty computation. In this thesis, constructions of these two GKE protocols are studied along with their communication models, security and efficiency analysis. Also, an implementation of four-user group size is developed utilizing PBC, GMP and OpenSSL Libraries for both two protocols. | en |
dc.language.iso | en | en_US |
dc.publisher | Izmir Institute of Technology | en |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject.lcsh | Computer networks--Security measures | en |
dc.subject.lcsh | Computer network protocols | en |
dc.subject.lcsh | Data encryption (Computer science) | en |
dc.subject.lcsh | Public key infrastructure (Computer security) | en |
dc.title | Group key establishment protocols: Pairing cryptography and verifiable secret sharing scheme | en_US |
dc.type | Master Thesis | en_US |
dc.institutionauthor | Aslanoğlu, Rabia | - |
dc.department | Thesis (Master)--İzmir Institute of Technology, Computer Engineering | en_US |
dc.relation.publicationcategory | Tez | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Master Thesis | - |
Appears in Collections: | Master Degree / Yüksek Lisans Tezleri |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
T001154.pdf | MasterThesis | 2.09 MB | Adobe PDF | View/Open |
CORE Recommender
Page view(s)
188
checked on Nov 18, 2024
Download(s)
64
checked on Nov 18, 2024
Google ScholarTM
Check
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.