Professional Documents
Culture Documents
1 Abstract:
Using Multicast key distribution computation complexity is significantly reduced. It drastically reduces the computation load of each group member compared to existing schemes employing traditional encryption algorithms. Such a scheme is desirable for many wireless applications where portable devices or sensors need to reduce their computation as much as possible due to battery power limitations. Easily combined with any key-tree-based schemes, this scheme provides much lower computation complexity while maintaining low and balanced communication complexity and storage complexity for secure dynamic multicast key distribution. 1.2 ABBREVIATIONS MD5 Message-Digest algorithm 5 DSK Different Session Key
1.3 References
http://tldp.org/HOWTO/Multicast-HOWTO.html http://www.ipmulticast.com/ http://www.cdt.luth.se/~peppar/java/multicast_example/ http://www.cdt.luth.se/~peppar/java_multicast/ http://java.sun.com/docs/books/tutorial/networking/datagrams/broadcasting.html
Project Modules
User interface design Transferring message using multicast Key establishment using MD5 cryptography algorithm Session key generation for multicast receivers Audio chatting
Shared secret key is used between encryption and decryption of message being transferred from source to number of receivers. Cryptographic Implementation: To prevent the attacker (Middle-man-attack, etc.) from reading the data, we go for the encryption and decryption of the data. Here we use the MD5 symmetric key algorithm for secure message transfer. Since there is a separate common key for each pair of user, the data is secured from others.
Audio Chatting:
User can interact by audio chatting. By giving the IP of the user whom want to interact can have a voice chat. VOIP (Voice over internet protocol) is used to chat. Audio chat is processed in WAN in former but its implemented in LAN also using UDP (User Datagram Protocol). Transferring audio is in the form of encryption and decryption form so its used to avoid third man interaction.
ScreenShots :