Performance Evaluation for Group Key Rekeying S1080014 Tsukasa Igarashi Supervised Prof.Hiroshi Toyoizumi Purpose To evaluate the performance for group key rekeying that is important for computer security. According to the condition, changing rekeying processes. Realizing effective group key rekeying ! Public Key Cryptosystem Generate 2 keys P Public Key Receiver P Sender Secret Key S Data Encrypted Data Encrypted Data Data Group Key Group key is an encryption key that is used among particular group members. A group key is used on 1 to many communications. Rekey Rekey is changing an from old group key to a new one. Without rekey, illegal access increase by exgroup members. Illegal Access Group Key 1 Join Leave Group Key 2 GK1 Group Key 3 Where group key is used? TV Pay programs (Ex. Wowow, SkyPerfecTV, or for etc.) Particular Conferences in a company Rekeying Processes According to purpose of use, we need to separate 3 rekeying process. Immediate Once someone joins or leaves a group, rekey is done. (Ex. Conference, military communication) In fact, if particular number of members gather, rekey is done. Batch But on analysis reason, according to the probability of α, rekey is done. (Ex. Internet, TV pay program) Periodic Rekey is done in the constant period. (Ex. Internet, TV pay program) Pollaczek-Khinchin Formula With this formula, we can lead the expression of M/G/1 in waiting line theory. Below expression means M/G/1 queue expression. s E[ N ] ( ) 2(1 ) 2 s 2 2 With this expression, we can Calculate the expression of :the arrival time in the system. Rekeying processes. :the variance of the service time in the system. :the utilization in the system. Immediate Rekeying(Image) Rekey Finish S1 Rekey Finish S2 Y1 W2 Y2 Join Leave #3 #1 #2 S:Service Time(Constant) W:Waiting Time #:New Comer of a Group Y:The time from a customer arrives to leaves in the system. W3 S3 Y3 Immediate Rekeying (Performance) S (1 S ) E[Y ] 1 2 S With Pollaczek-Khinchin Formula and use E[Y ] 1 E[ N ] S Time of spending rekey rate of join or leave Assumption 1 S< 2 When S is small, E[Y] is small. If not, E[Y] ∞ Batch Rekeying(Image) 1 3 Rekey Rekey Rekey Start Start Start is the probability of rekey #1 Y1 #3 Join #4 #7 Y4 Y3 Y8 Y6 Leave #2 Y2 #:New Comer of a Group #8 Y7 #5 Y5 #6 Y9 #9 Batch Rekeying (Performance) n S (1 S ) E[Y ] (1 ) { } 1 2 S n ●n:how many members behind a group member until the rekey starts. Assumption S< When α is small, E[Y] is small. 1 2 If not, E[Y] ∞ Periodic Rekeying(Image) Rekey Rekey Rekey Start Start Start T #3 Y3 #5 Y5 T #6 #8 #10 Y10#11 Y6 Y8 Join Leave Y4 #1 #2 Y2 Y1 Y11 Y12 Y7 #4 #:New Comer of a Group #7 #9 Y9 #12 Periodic Rekeying (Performance) T E[Y ] S 2 T Constant Period Assumption S <= T If not, E[Y] ∞ When T is small, E[Y] is small. 3 Rekeying Processes Comparison <When λ is small> 1. Immediate Rekeying 2. Batch Rekeying 3. Periodic Rekeying Assumption T = 0.0011 S = 0.001, α = 1/10, n = 10 <When λ is big> 1. Periodic Rekeying 2. Batch Rekeying 3. Immediate Rekeying Out-of-Sync Problem In batch rekeying, the problem that a group member may receive a data encrypted with an old group key, or the group key it has not get yet is occurred. Why ? My partner is #1 ! GK0 #1 GK1 Join Leave Why ? My partner is #2 ! GK2 #2 GK3 Conclusion According to the number of group members and the purpose of use, the server’s administrator will need to think changing the rekeying processes. In Batch rekeying, we must think outof-sync problem.