Quantifying effect of network latency and clock drift on time-driven key sequencing

G.G. Xie1,2, C. Irvine2, T. Levin2
1Department of Computer Science, Naval Postgraduate School, Monterrey, CA, USA
2Department of Computer Science, Naval Postgraduate Schoo Montereyl, CA

Tóm tắt

Time-driven key sequencing (TKS) is a key management technique that synchronizes the session key used by a set of communicating principals based on time of day. This relatively low cost method of session key synchronization has been used in specialized distributed systems with low-end communicating devices where sessions are sparse and each session spans a short time period comprising a small number of messages. In this paper, we describe how TKS may be useful in several scenarios involving high speed computer networks. More importantly, we present a performance model of TKS and conduct a detailed analysis to determine the impact of clock drift and network latency on the required key refresh rate. We give the exact conditions for determining the range of adequate key refresh rates, and demonstrate that the derived conditions are sufficient to ensure that data are both protected and deliverable. Interestingly, these conditions may be used to obtain a key refresh rate that can tolerate a maximum amount of clock drift after other parameters in the system are fixed.

Từ khóa

#Delay #Clocks #Synchronization #Cryptography #Data security #Costs #Smart cards #Computer science #Computer network management #Computer networks

Tài liệu tham khảo

daemen, 1998, csrc nist gov/encryption/aes/round2/AESAlgs/RijndaeI/Rijndael pdJ briscoe, 1999, MARKS: Zero side effect multicast key management using arbitrarily revealed key sequences, Presented at 46th IETF meeting xie, 1999, LLPA:A protocol for high speed packet authentication, Technical Report NPS-CS-99–003 10.1109/2.920607 xie, 0, Conditions for time-driven key sequencing, Technical Report NPS-CS-00-001 harkins, 1998, The Internet key exchange (IKE) RFC 2409 0, Initial cryptanalysis of the RSA SecurID algorithm, On-line White Paper kent, 1998, Security architecture for the internet protocol RFC 2401 10.1145/383059.383077 0, PeiterZ silence secnet com Weakness in Se-curID On-line White Paper alaettinoglu, 2000, Towards millisecond igp convergence, Internet Draft draft-alaettlnoglu-isis-convergence-00 txt