viii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION ....................................................................................... iii DEDICATION ........................................................................................... iv ACKNOWLEDGEMENT ......................................................................... v ABSTRACT ............................................................................................... vi ABSTRAK ................................................................................................ vii TABLE OF CONTENTS........................................................................ viii LIST OF TABLES .................................................................................... xi LIST OF FIGURES ................................................................................. xii 1 INTRODUCTION ..................................................................................... 1.1 Introduction .................................................................................... 1 1.2 Background of the problem ............................................................ 7 1.2.1 Reduce complex problem with different methods ............... 7 1.2.2 Addressing the Protection of Information Processing Applications ....................................................... 7 1.2.3 Future Key Management Methods: David McGrew, Cisco .................................................................................... 8 1.2.4 Problem of key management in an access hierarchy ........... 9 1.3 Problem Statement ........................................................................ 10 1.4 Project Objective .......................................................................... 11 1.5 Research Questions....................................................................... 11 1.6 Project Scope ................................................................................ 11 1.7 The Project Importance ................................................................ 12 1.8 Organization Report ..................................................................... 12 2 LITERATURE REVIEW ......................................................................... ix 2.1 Introduction .................................................................................. 14 2.2 Importance of Symmetric Key Management ................................ 16 2.3 Key Management .......................................................................... 17 2.3.1 Key Management Techniques............................................ 18 2.3.2 Key Management Requirements ........................................ 19 2.4 Key Management in an Access Hierarchy.................................... 20 2.5 Distributed Key Management ....................................................... 22 2.5.1 Distributed Logical Key Hierarchy .................................... 23 2.5.2 Distributed One-way Function Tree .................................. 24 2.6 The Key Distribution Problem ..................................................... 25 2.6.1 Sharing Keys in Advance................................................... 27 2.6.2 Problems with Sharing Keys in Advance .......................... 28 2.6.3 Using a Trusted Third Party ............................................... 30 2.6.3.1 Problems with trusted third party (TTP) Scheme ......... 32 2.7 Key Derivation Function .............................................................. 33 2.8 The Implementation Language for This Study ............................. 34 2.9 Summary ....................................................................................... 38 3 RESEARCH METHODOLOGY ............................................................ 3.1 Introduction .................................................................................. 39 3.2 Research Framework .................................................................... 40 3.3 Research Roadmap ....................................................................... 41 3.4 Phase I: Literature Review............................................................ 43 3.5 Phase II : Design and Analysis ..................................................... 45 3.5.1 System Requirements Analysis.......................................... 45 3.5.2 Systems Analysis and Design ............................................ 45 3.6 Phase III: Implementation and Test .............................................. 46 3.6.1 Program Writing ................................................................ 47 3.6.2 Test ..................................................................................... 47 3.6.3 Evaluation .......................................................................... 48 3.7 Summary ....................................................................................... 48 4 ANALYSIS AND DESIGN ....................................................................... 4.1 INTRODUCTION ........................................................................ 49 x 4.2 Analysis and Design of This Project ............................................ 51 4.3 Flow Diagram ............................................................................... 58 4.4 Pseudo code .................................................................................. 62 4.5 Communication between two employees ..................................... 63 4.6 Summery ....................................................................................... 63 5 IMPLEMENTATION AND TEST .......................................................... 5.1 Introduction .................................................................................. 65 5.2 Software Instructor ....................................................................... 66 5.2.1 User Interface ..................................................................... 66 5.2.2 Preferences ......................................................................... 67 5.3 Final Interface ............................................................................... 72 5.4 Test and Evaluate.......................................................................... 74 5.5 Summary ....................................................................................... 74 6 CONCLUSION .......................................................................................... 6.1 Introduction .................................................................................. 76 6.2 Research Contribution .................................................................. 78 6.3 Aims and Objectives of This Project ............................................ 80 6.4 Further Work ................................................................................ 80 7 REFERENCES ...................................................................................... 81 xi LIST OF TABLES TABLE NO. TITLE PAGE 1.1 Definition of existing keys 3 1.2 NIST guidelines for public key sizes 10 6.1 NIST guidelines for public key sizes 79 xii LIST OF FIGURES FIGURE NO. TITLE PAGE 1.1 Key distribution center model 3 1.2 Key management Activities 4 2.1 LKH tree 24 2.2 The key distribution problem 26 2.3 Trusted third party, distributing keys between Pao- Chi and Gwen 31 Creating a hierarchy that Pao-Chi and Daniel in the two cities 32 3.1 Research Framework 41 3.2 Research Roadmap 42 3.3 Literature Review Phase I of Framework 43 3.4 Design and Analysis Phase II of Framework 45 3.5 Implementation and Test Phase III of Framework 47 4.1 The sample of Hierarchical government organization 52 4.2 Key Generation Diagram 58 4.3 Bits Determine from 64bits with 72 bits 60 4.4 The key generation functions 61 4.5 Pseudocode of the program 61 5.1 Software User Interface (startup) 67 5.2 Preference Window (Chart Specification) 68 5.3 Hash/ Encryption specification 69 5.4 Lists of Hash Functions (First Hash) 70 5.5 Lists of Hash Functions (Final Hash) 71 5.6 Lists of Encryption Algorithm (Final Encryption) 72 5.7 User Interface Key management Draw 73 2.4