![Page 1: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/1.jpg)
Minimizing the number of keys for secure communication in a networkBy Niels Duif
![Page 2: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/2.jpg)
Remarks
• Ask questions• Proof by example
/ Department of Mathematics and Computer Science PAGE 221-04-23
![Page 3: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/3.jpg)
Contents
• Introduction• Splitting a message• Constructions• Combining constructions• Conclusions
/ Department of Mathematics and Computer Science PAGE 321-04-23
![Page 4: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/4.jpg)
Introduction
• Network
• Symmetric cryptography
/ Department of Mathematics and Computer Science PAGE 421-04-23
![Page 5: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/5.jpg)
Introduction
• Network
• Symmetric cryptography
/ Department of Mathematics and Computer Science PAGE 521-04-23
Alice
Bob
Eve Chris
common key: kAB
![Page 6: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/6.jpg)
Introduction
• Network
• Symmetric cryptography
/ Department of Mathematics and Computer Science PAGE 621-04-23
Alice
Bob
Eve Chris
common key: kAB
Hi!
![Page 7: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/7.jpg)
Introduction
• Network
• Symmetric cryptography
/ Department of Mathematics and Computer Science PAGE 721-04-23
Alice
Bob
Eve Chris
common key: kAB
z$#
![Page 8: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/8.jpg)
Introduction
• Network
• Symmetric cryptography
/ Department of Mathematics and Computer Science PAGE 821-04-23
Alice
Bob
Eve Chris
common key: kAB
z$#
![Page 9: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/9.jpg)
Introduction
• Network
• Symmetric cryptography
/ Department of Mathematics and Computer Science PAGE 921-04-23
Alice
Bob
Eve Chris
common key: kAB
z$#
![Page 10: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/10.jpg)
Introduction
• Network
• Symmetric cryptography
/ Department of Mathematics and Computer Science PAGE 1021-04-23
Alice
Bob
Eve Chris
common key: kAB
Hi!
![Page 11: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/11.jpg)
Introduction
• Network
• Symmetric cryptography
/ Department of Mathematics and Computer Science PAGE 1121-04-23
Alice
Bob
Eve Chris
common key: kAB
Hi!
?
![Page 12: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/12.jpg)
Introduction
• Network
• Symmetric cryptography
/ Department of Mathematics and Computer Science PAGE 1221-04-23
Alice
Bob
Eve Chris
common key: kAB common key: kBC
common key: kCE
![Page 13: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/13.jpg)
Communication graph
/ Department of Mathematics and Computer Science PAGE 1321-04-23
Alice Bob Chris Eve
![Page 14: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/14.jpg)
Communication graph
• Persons are represented by nodes• Nodes that have one or more keys in common are
connected by a line
/ Department of Mathematics and Computer Science PAGE 1421-04-23
Alice Bob Chris Eve
![Page 15: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/15.jpg)
Communication graph
• Persons are represented by nodes• Nodes that have one or more keys in common are
connected by a line• The lines are labelled with the common keys
/ Department of Mathematics and Computer Science PAGE 1521-04-23
Alice Bob Chris Eve
kAB kBC kCE
![Page 16: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/16.jpg)
Communication graph
• Persons are represented by nodes• Nodes that have one or more keys in common are
connected by a line• The lines are labelled with the common keys
/ Department of Mathematics and Computer Science PAGE 1621-04-23
A B C E
1 2 3
![Page 17: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/17.jpg)
Communication graph
• Nodes may have more than one key in common
/ Department of Mathematics and Computer Science PAGE 1721-04-23
A B
C D
1
3
25
4
![Page 18: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/18.jpg)
Communication graph
• Nodes may have more than one key in common
/ Department of Mathematics and Computer Science PAGE 1821-04-23
A (1,2,5) B (1,4,5)
C (2,3) D (3,4)
1
3
25
4
![Page 19: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/19.jpg)
How to assign keys?
/ Department of Mathematics and Computer Science PAGE 1921-04-23
C
B
A
E
D
![Page 20: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/20.jpg)
How to assign keys?
• Give every pair of nodes a different key
/ Department of Mathematics and Computer Science PAGE 2021-04-23
C
B
A
E
D
![Page 21: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/21.jpg)
How to assign keys?
• Give every pair of nodes a different key
/ Department of Mathematics and Computer Science PAGE 2121-04-23
C
B
A
E
D
![Page 22: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/22.jpg)
How to assign keys?
• Give every pair of nodes a different key
• This requires keys for n nodes
/ Department of Mathematics and Computer Science PAGE 2221-04-23
C
B
A
E
D
2
)1(
2
nnn
![Page 23: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/23.jpg)
Using fewer keys
• Is secure communication possible with fewer keys?− Yes, assuming that some nodes may be trusted
• Assumption: at most t nodes cannot be trusted• Aim: minimize the total number of keys, c
/ Department of Mathematics and Computer Science PAGE 2321-04-23
![Page 24: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/24.jpg)
Splitting a message
/ Department of Mathematics and Computer Science PAGE 2421-04-23
![Page 25: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/25.jpg)
Splitting a message
• Split a message and send it through different paths• Example: communication from A to D
/ Department of Mathematics and Computer Science PAGE 2521-04-23
A (1,2) B (1,4)
C (2,3) D (3,4)
1
3
2 4
![Page 26: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/26.jpg)
Splitting a message
• Split a message and send it through different paths• Example: communication from A to D
/ Department of Mathematics and Computer Science PAGE 2621-04-23
A (1,2) B (1,4)
C (2,3) D (3,4)
1
3
2 4
part 1
![Page 27: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/27.jpg)
Splitting a message
• Split a message and send it through different paths• Example: communication from A to D
/ Department of Mathematics and Computer Science PAGE 2721-04-23
A (1,2) B (1,4)
C (2,3) D (3,4)
1
3
2 4
part 1
part 2
![Page 28: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/28.jpg)
Splitting a message
• Determine random shares: M1, M2, ... , Ms-1
• Use bitwise addition mod 2: “ ”, or “XOR”
• Ms = M1 M2 ... Ms-1 M
• M1 M2 ... Ms-1 Ms = M
/ Department of Mathematics and Computer Science PAGE 2821-04-23
![Page 29: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/29.jpg)
Splitting a message
• Example: the message is ‘Hi!’
M0 = 01001000 01101001 00100001
M1 = 11101101 11101111 10010001
M2 = 10100101 10000110 10110000
/ Department of Mathematics and Computer Science PAGE 2921-04-23
![Page 30: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/30.jpg)
Splitting a message
• Example: the message is ‘Hi!’
M0 = 01001000 01101001 00100001
M1 = 11101101 11101111 10010001
M2 = 10100101 10000110 10110000
M1 = 11101101 11101111 10010001
M2 = 10100101 10000110 10110000
/ Department of Mathematics and Computer Science PAGE 3021-04-23
![Page 31: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/31.jpg)
Splitting a message
• Example: the message is ‘Hi!’
M0 = 01001000 01101001 00100001
M1 = 11101101 11101111 10010001
M2 = 10100101 10000110 10110000
M1 = 11101101 11101111 10010001
M2 = 10100101 10000110 10110000
M0 = 01001000 01101001 00100001
/ Department of Mathematics and Computer Science PAGE 3121-04-23
![Page 32: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/32.jpg)
Splitting a message
• Example: the message is ‘Hi!’
M0 = 01001000 01101001 00100001
M1 = 11101101 11101111 10010001
M2 = 10100101 10000110 10110000
M1 = 11101101 11101111 10010001
M2 = 10100101 10000110 10110000
M0 = 01001000 01101001 00100001
/ Department of Mathematics and Computer Science PAGE 3221-04-23
![Page 33: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/33.jpg)
Sending a message
/ Department of Mathematics and Computer Science PAGE 3321-04-23
A (1,2) B (1,4)
C (2,3) D (3,4)
1
3
2 4
M1
![Page 34: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/34.jpg)
Sending a message
/ Department of Mathematics and Computer Science PAGE 3421-04-23
A (1,2) B (1,4)
C (2,3) D (3,4)
1
3
2 4
M1
M2
![Page 35: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/35.jpg)
Retrieving a message
• The message is retrieved as the XOR of all shares:
• M = M1 M2 ... Ms
• All shares are needed to retreive the message
/ Department of Mathematics and Computer Science PAGE 3521-04-23
![Page 36: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/36.jpg)
Constructions for t=1
• One corrupt node• The total number of keys is c• How large can n be?
/ Department of Mathematics and Computer Science PAGE 3621-04-23
![Page 37: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/37.jpg)
Sperner’s theorem
• n is at most
• This uses all possible key sets of size
/ Department of Mathematics and Computer Science PAGE 3721-04-23
2c
c
2
c
![Page 38: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/38.jpg)
Example
/ Department of Mathematics and Computer Science PAGE 3821-04-23
62
4
n
4c
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X X
![Page 39: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/39.jpg)
Example
• Communication from A to F
/ Department of Mathematics and Computer Science PAGE 3921-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X X
![Page 40: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/40.jpg)
Example
• Communication from A to F
/ Department of Mathematics and Computer Science PAGE 4021-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X XA (1,2) F (3,4)
E(2,4)
D (2,3)
C (1,4)
B (1,3)
4
32
1
![Page 41: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/41.jpg)
Example
• Communication from A to F
/ Department of Mathematics and Computer Science PAGE 4121-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X XA (1,2) F (3,4)
E(2,4)
D (2,3)
C (1,4)
B (1,3)
4
32
1
![Page 42: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/42.jpg)
Example
• Communication from A to F• Use all possible combinations of A’s and F’s keys
/ Department of Mathematics and Computer Science PAGE 4221-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X XA (1,2) F (3,4)
E(2,4)
D (2,3)
C (1,4)
B (1,3)
4
32
1
![Page 43: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/43.jpg)
Example
• Communication from A to F• Use all possible combinations of A’s and F’s keys
/ Department of Mathematics and Computer Science PAGE 4321-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X XA (1,2) F (3,4)
E(2,4)
D (2,3)
C (1,4)
B (1,3)
4
32
1
![Page 44: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/44.jpg)
Example
• Communication from A to F• Use all possible combinations of A’s and F’s keys
/ Department of Mathematics and Computer Science PAGE 4421-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X XA (1,2) F (3,4)
E(2,4)
D (2,3)
C (1,4)
B (1,3)
4
32
1
![Page 45: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/45.jpg)
Example
• Communication from A to F• Use all possible combinations of A’s and F’s keys
/ Department of Mathematics and Computer Science PAGE 4521-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X XA (1,2) F (3,4)
E(2,4)
D (2,3)
C (1,4)
B (1,3)
4
32
1
![Page 46: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/46.jpg)
Example
• Communication from A to F• Use all possible combinations of A’s and F’s keys
/ Department of Mathematics and Computer Science PAGE 4621-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X XA (1,2) F (3,4)
E(2,4)
D (2,3)
C (1,4)
B (1,3)
4
32
1
![Page 47: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/47.jpg)
Example
• Communication from A to F• Use all combinations of their keys
/ Department of Mathematics and Computer Science PAGE 4721-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X XA (1,2) F (3,4)
E(2,4)
D (2,3)
C (1,4)
B (1,3)
4
32
1
![Page 48: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/48.jpg)
Eavesdrop
• The following keys are needed:
/ Department of Mathematics and Computer Science PAGE 4821-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X X
![Page 49: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/49.jpg)
Eavesdrop
• The following keys are needed:
/ Department of Mathematics and Computer Science PAGE 4921-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X X
Key 1 or Key 3
![Page 50: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/50.jpg)
Eavesdrop
• The following keys are needed:
/ Department of Mathematics and Computer Science PAGE 5021-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X X
Key 1 or Key 3 Key 1 or Key 4
![Page 51: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/51.jpg)
Eavesdrop
• The following keys are needed:
/ Department of Mathematics and Computer Science PAGE 5121-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X X
Key 1 or Key 3 Key 1 or Key 4 Key 2 or Key 3
![Page 52: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/52.jpg)
Eavesdrop
• The following keys are needed:
/ Department of Mathematics and Computer Science PAGE 5221-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X X
Key 1 or Key 3 Key 1 or Key 4 Key 2 or Key 3 Key 2 or Key 4
![Page 53: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/53.jpg)
Eavesdrop
• The following keys are needed:
/ Department of Mathematics and Computer Science PAGE 5321-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X X
Key 1 or Key 3 Key 1 or Key 4 Key 2 or Key 3 Key 2 or Key 4
Conclusion: Key 1 and 2or Key 3 and 4
![Page 54: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/54.jpg)
Eavesdrop
• The following keys are needed:
/ Department of Mathematics and Computer Science PAGE 5421-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X X
Key 1 or Key 3 Key 1 or Key 4 Key 2 or Key 3 Key 2 or Key 4
Conclusion: Key 1 and 2or Key 3 and 4
![Page 55: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/55.jpg)
Eavesdrop
• The following keys are needed:
/ Department of Mathematics and Computer Science PAGE 5521-04-23
Key 1 Key 2 Key 3 Key 4
A X X
B X X
C X X
D X X
E X X
F X X
Key 1 or Key 3 Key 1 or Key 4 Key 2 or Key 3 Key 2 or Key 4
Conclusion: Key 1 and 2or Key 3 and 4
![Page 56: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/56.jpg)
Possible constructions
Number of nodes n 6 10 20 35 70 126 252
Number of keys c 4 5 6 7 8 9 10
/ Department of Mathematics and Computer Science PAGE 5621-04-23
![Page 57: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/57.jpg)
Possible constructions
Number of nodes n 6 10 20 35 70 126 252
Number of keys c 4 5 6 7 8 9 10
/ Department of Mathematics and Computer Science PAGE 5721-04-23
25.1)(log2 nc
![Page 58: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/58.jpg)
Possible constructions
Number of nodes n 6 10 20 35 70 126 252
Number of keys c 4 5 6 7 8 9 10
/ Department of Mathematics and Computer Science PAGE 5821-04-23
25.1)(log2 nc
For other values of n (Desmedt, Duif, Van Tilborg, Wang):
25.2)(log2 nc
![Page 59: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/59.jpg)
Constructions for t>1
• Similar splitting of messages• Different constructions• Dual of a 2-design is used
/ Department of Mathematics and Computer Science PAGE 5921-04-23
![Page 60: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/60.jpg)
What is a 2-design?
/ Department of Mathematics and Computer Science PAGE 6021-04-23
![Page 61: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/61.jpg)
Example
/ Department of Mathematics and Computer Science PAGE 6121-04-23
The Fano Plane
![Page 62: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/62.jpg)
Example
/ Department of Mathematics and Computer Science PAGE 6221-04-23
The dual is found by interchanging the points and lines
The Fano Plane
![Page 63: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/63.jpg)
Example
/ Department of Mathematics and Computer Science PAGE 6321-04-23
The dual is found by interchanging the points and lines
The dual of the Fano Plane
![Page 64: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/64.jpg)
Example
/ Department of Mathematics and Computer Science PAGE 6421-04-23
The dual is found by interchanging the points and lines
The dual of the Fano Plane
![Page 65: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/65.jpg)
Another example
/ Department of Mathematics and Computer Science PAGE 6521-04-23
The Affine Plane over F3
![Page 66: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/66.jpg)
Another example
/ Department of Mathematics and Computer Science PAGE 6621-04-23
The dual of the Affine Plane over F3
![Page 67: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/67.jpg)
Important property
/ Department of Mathematics and Computer Science PAGE 6721-04-23
The dual of the Affine Plane over F3
Every two lines meet in a unique point
![Page 68: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/68.jpg)
Possible constructions
Number of nodes, n 7 12 26 35 57 70
Number of keys, c 7 9 13 15 19 21
/ Department of Mathematics and Computer Science PAGE 6821-04-23
Number of nodes, n 13 20 50 63
Number of keys, c 13 16 25 28
t=2
t=3
ntc Known constructions: ntc
![Page 69: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/69.jpg)
Other values of n
• Combine constructions• Use building blocks that are t-safe• Use some extra keys
/ Department of Mathematics and Computer Science PAGE 6921-04-23
![Page 70: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/70.jpg)
Combining constructions
/ Department of Mathematics and Computer Science PAGE 7021-04-23
Safe for t=2
![Page 71: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/71.jpg)
Combining constructions
/ Department of Mathematics and Computer Science PAGE 7121-04-23
Safe for t=2 Safe for t=2
![Page 72: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/72.jpg)
Combining constructions
/ Department of Mathematics and Computer Science PAGE 7221-04-23
Safe for t=2
t+1 extra keys
![Page 73: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/73.jpg)
How many keys are needed?
• Conjecture:
• Known constructions:
• Which is better?
/ Department of Mathematics and Computer Science PAGE 7321-04-23
ntc 2
ntc
![Page 74: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/74.jpg)
PAGE 7421-04-23
![Page 75: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/75.jpg)
Conclusions
• Block designs use fewer keys than existing constructions
• Constructions may be combined• Block designs use many communication paths
(about where is possible)
/ Department of Mathematics and Computer Science PAGE 7521-04-23
3t 1t
![Page 76: Minimizing the number of keys for secure communication in a network](https://reader036.vdocuments.net/reader036/viewer/2022062519/5681506d550346895dbe6a9c/html5/thumbnails/76.jpg)
End of presentation
/ Department of Mathematics and Computer Science PAGE 7621-04-23
dual
Splitting messages Block designs
Combining constructionst=1
t>1
ntc 2
25.2)(log2 nc