Eavesdropping Attack Clause Samples

Eavesdropping Attack. The purpose of the eavesdropping attack in B-GKAP is to capture the computed group key by sniffing the communication between the entities. In order to generate a group key, the attacker must grab secret keys (CKi) of all participants (CK1,CK2,...,CKN ). In B-GKAP, extraction of secret keys occurs in veri f ySecretKeys(·) and querySecretKeys(·) functions. In those functions, secret keys are extracted using c, d0 variables of the sender and temporary private key (t) of the receiver. Since only the participants in the key agreement group U knows their temporary private key (t), to compute k = (ct modp) equation, attacker should try to extract t j from ▇ ▇ = gtj modp for each participant Uj in U . Eventually, because of solving this equation is infeasible due to discrete logarithm problem, B-GKAP is secure against eavesdropping attack.