The Secure Key Management in Multicast Groups Project is used as the middle thing of many internet and multimedia applications inclusive of pay-tv, teleconferencing, actual-time distribution of stock marketplace price and etc.
The main challenges for relaxed multicast are scalability, performance, and authenticity. In this project, we advise a scalable, green, authenticated group key agreement scheme for massive and dynamic multicast systems. the proposed key agreement scheme is identity-based totally which uses the bilinear map over the elliptic curves.
Compared with the present gadget, the proposed device presents institution member authenticity without implementing extra mechanism. Moreover, we give a scalability answer based totally at the subgroups, which has advantages over the present schemes.Protection evaluation shows that our scheme satisfies each forward secrecy and backward secrecy.

The targets of the venture are as follows:

  • Layout the single multicast group.
  • Era of personal keys for customers.
  •  Encoding and deciphering of text message
  •  Cozy transmission of consultation key via the usage of the algorithm facts encryption fashionable (des).
  •  Layout the multi-organization with more than one information flow in any such manner that reduced overhead of key server.

Existing System:

Within the existing System, we use Iolus approach proposed the perception of hierarchy subgroup for scalable and secure multicast.On this method, a huge communique institution is split into smaller subgroups. every subgroup is handled almost like a separate multicast group and is controlled with the aid of a depended on organization security intermediary (gsi). gsi join between the subgroups and share the subgroup key with every of their subgroup participants. Gsis act as message relays and key translators between the subgroups by means of receiving the multicast messages from one subgroup, decrypting them and then re multicasting to the subsequent subgroup after encrypting them with the aid of the subgroup key of the following subgroup.The gsis also are grouped in a top-level group that is managed by means of a collection security controller (gsc).
When a group member joins or leaves simplest have an effect on subgroup most effective even as the opposite subgroup will not be affected. it has the drawback of affecting records course. this occurs inside the feel that there is a need for translating the statistics that goes from one subgroup, and thereby one key, to another. this becomes even more complex whilst it takes under consideration that the gsi has to control the subgroup and carry out the interpretation wished. the gsi may additionally, as a result, grow to be the bottleneck.

  • The group controller takes all responsibilities for the institution inclusive of key generation, re-keying method and message switch to every other business
  • The group participants are not able to communicate with another corporation at some point of the re-keying manner
  • The organization controller keeps logical key tree wherein each node represents a key encryption key. the foundation of the important thing tree is the group key used for encrypting information in institution communications and it is shared via all Customers

Proposed System:

The advantages over the existing machine are, we use an identity tree in place of key tree in our scheme. each node within the identification tree is related to an identification. the leaf node’s identification is corresponding to the user’s identification and the intermediate node’s identity is generated by its children’s identity. consequently, in an identification tree, an intermediate node represents a hard and fast person in the subtree rooted at this node.
The keys used in each subgroup can be generated by means of a group of key era facilities (kgcs) in parallel. all of the members of the identical subgroup can compute the equal subgroup key through the keys for them are generated by exclusive kgcs. that is a desirable feature especially for the huge-scale network systems because it minimizes the trouble of concentrating the workload on an unmarried entity.

  • The group controller duties are shared by using the institution manage more intermediate which includes rekeying system and scalability of the group method
  • Use the identity tree based totally shape
  • The group individuals are not laid low with the important thing generation procedure whilst they’re willing to talk with another group individuals
  • The centralized key server used for key era technique and the kgc is likewise acting as a router for an institution to organization conversation
  • The re-keying manner is carried out most effective to the particular institution contributors now not to the complete organization members

Download Secure Key Management in Multicast Groups Project in Java source code, Proejct Report, PPT