Selecting cryptographic technique in peer to peer to Systems
1. Presented By:
Ubaidullah Alias kashif
MS (Computer Communication and
Networks)
Sukkur Institute of Business Administration
Airport Road Sukkur
Presented at:
4th International Conference on Computer and
Emerging Technologies 2014 (ICCET 14) at
Shah Abdul Latif University khairpur, Sindh,
Pakistan
Selecting Cryptographic
Techniques in Peer to Peer to
Systems
2. Introduction
Security in communication network is
crucial specially in public network.
Specifically talking about decentralized
communication system i.e. Peer to Peer
system.
Open, flexible decentralized and self-
organizing nature of these systems
attracts users and intruders and makes
it more complex in regard of
implementing security.
3. Cont.…
Paper presents a comparative study of
cryptographic techniques that are used
to provide management, authentication
and confidentiality in P2P networks.
This works aims a survey that highlights
merits and demerits of selected half a
dozen of such approaches.
We discuss in terms of parameters
necessary to accomplish the security
requirements
4. Problem Statement
Selecting a good technique in P2P
systems for authentic and safe
communication is an open question.
Authentication and confidentiality may
be achieved like client-server
environment, but in P2P this model may
not work.
The key size and Key exchange is also
pivotal in this regard.
So, authentication, confidentiality,
5. P2P Network
G(V, E) be a directed
graph, where V= {V1,
V2,V3…..Vn} is a set of
nodes and V= {x:x ∈ V x V}
is sets of links connecting
N nodes as shown Figure.
Figure shows the
communication process
between two peers that
may have issue of
6. Methodology
We present a comparative analysis
based on some important parameters
needed for network security.
Parameters such as
Generation, distribution and
management of keys;
Type of cryptography, authentication
and confidentiality mechanism for node
and data;
Vulnerability and probability of
7. Comparison
Self-Organized PKC
System
OneSwarm Secure
Network
Coding
Distribut-ed
PKI
Pseudo Trust Likir
Key Public-Private Key
Pairs By The User
Pub/Pri Key Pair
1024-Bit
Public And
Secrete Key
Public And
Secrete Key
1024-Bit
Session Key,
Deffie-Hellman
Public,
Private
RSA
1024
Attack Cybil Collision Not Evaluate Cybil MIMA Fails Mitigate
Sybil,
Avoid
MIMA
Cryptography Identifier Based PKC PKC PKC Threshold
Cryptography
Identity Based PKC, IBC
Anonymity No Yes No No Yes No
Probability for
Malicious Peer
Not Defined Not Defined Reply Attack2-
K
Not
Defined
Key Distribution Discrete Hash Table Social Networks, E-
Mail Invitation,
Manually
BitTorrent
Based
Homo-morphic
Property Of
RSA
No RSA
Overlay Chord Mesh Depends Kademlia (Tree
Structure)
Unstructured Secure
Kademlia
Involvement of TTP
No No Yes No No Yes Less
C
C
r
N
rr
rN
P
2/
2/
k
pfP )1(