HOME

TheInfoList



OR:

Multicast encryption is the use of
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
to ensure that only the chosen recipient(s) has access to multicast data.


Multicasting

Multicast In computer networking, multicast is a type of group communication where data transmission is addressed to a group of destination computers simultaneously. Multicast can be one-to-many or many-to-many distribution. Multicast differs from ph ...
is what enables a node on a network to address one unit of data to a specific group of receivers.Micciancio, Daniele and Saurabh Panjwani
“Multicast Encryption: How to maintain secrecy in large, dynamic groups?”
/ref> In interactive multicast at the
data link A data link is a means of telecommunications link, connecting one location to another for the purpose of transmitting and receiving digital information (data communication). It can also refer to a set of electronics assemblies, consisting of a t ...
or
network layer In the seven-layer OSI model of computer networking, the network layer is layer 3. The network layer is responsible for packet forwarding including routing through intermediate Router (computing), routers. Functions The network layer provides t ...
, such as
IP multicast IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is the IP-specific form of multicast and is used for streaming media and other network applications. It uses speci ...
, Ethernet multicast or
MBMS Multimedia Broadcast Multicast Services (MBMS) is a point-to-multipoint interface specification for existing 3GPP cellular networks, which is designed to provide efficient delivery of broadcast and multicast services, both within a cell as well a ...
service over
cellular network A cellular network or mobile network is a telecommunications network where the link to and from end nodes is wireless network, wireless and the network is distributed over land areas called ''cells'', each served by at least one fixed-locatio ...
, receivers may join and leave the group using an interaction channel. Only one copy of the data is sent from the source, and while copies are created and sent to the desired recipients by network infrastructure nodes. In for example IP multicast, a multicast group is identified by a class D
IP address An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
. A
host A host is a person responsible for guests at an event or for providing hospitality during it. Host may also refer to: Places * Host, Pennsylvania, a village in Berks County * Host Island, in the Wilhelm Archipelago, Antarctica People * ...
enters or exits a group using IGMP (
Internet Group Management Protocol The Internet Group Management Protocol (IGMP) is a communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group memberships. IGMP is an integral part of IP multicast and allows the network to direct ...
). A message sent via multicast is sent to all nodes on the network, but only the intended nodes accept the multicast frames.Pessi, Pekka. Department of Computer Science, Helsinki University Of Technology
“Secure Multicast”
Multicasting is useful in situations such as
video conferencing Videotelephony (also known as videoconferencing or video calling) is the use of audio signal, audio and video for simultaneous two-way communication. Today, videotelephony is widespread. There are many terms to refer to videotelephony. ''Vide ...
and online gaming. Multicast was used originally in
LAN Lan or LAN may refer to: Science and technology * Local asymptotic normality, a fundamental property of regular models in statistics * Longitude of the ascending node, one of the orbital elements used to specify the orbit of an object in space * ...
s, with
Ethernet Ethernet ( ) is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was commercially introduced in 1980 and first standardized in 198 ...
as the best example. A problem with multicast communication is that it is difficult to guarantee that only designated receivers receive the data. This is largely because multicast groups are dynamic; users come and go at any time.


Protocols

One encryption protocol gives each member of a group a key that changes upon the entrance or exit of a member of the group. Another proposes a primary key subsidized by additional keys belonging to legitimate group members. The UFTP (encrypted UDP based FTP over multicast) protocol uses three phases: announce/register, file transfer, and completion/confirmation. The latest version 5.0 was released on 4/22/2020. Another protocol uses symmetric key encryption where data is decoded by intended receivers using a traffic encryption key (TEK). The TEK is changed any time a member joins or leaves the group. This is not feasible for large groups. Users must be continuously connected to obtain the new keys. Yet another protocol involves asymmetric keys. Here, a private key is shared and those shares are given out asymmetrically. The initial member is given a number of shares, one of which is passed to each group member. Members with a valid share of the key can view the message.Duan, Yitao and John Canny. Computer Science Division, UC Berkeley
“How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack”


ISO

The
International Organization for Standardization The International Organization for Standardization (ISO ; ; ) is an independent, non-governmental, international standard development organization composed of representatives from the national standards organizations of member countries. M ...
(ISO) states that confidentiality, integrity, authentication, access control, and non-repudiation should all be considered when creating a secure system. * Confidentiality: No unauthorized party can access appropriate messages. * Integrity: Messages cannot be changed during transit without being discovered. * Authentication: The message needs to be sent by the person/machine who claims to have sent it. * Access control: Only those users enabled can access the data. * Non-repudiation: The receiver can prove that the sender actually sent the message. To be secure, members who are just being added to the group must be restricted from viewing past data. Also, members removed from a group may not access future data.Pannetrat, Alain and Refik Molva
“Multiple Layer Encryption for Multicast Groups”


See also

*
Broadcast encryption Broadcast encryption is the cryptographic problem of delivering encrypted content (e.g. TV programs or data on DVDs) over a broadcast channel in such a way that only qualified users (e.g. subscribers who have paid their fees or DVD players confor ...


References

{{Reflist