Hubbry Logo
search button
Sign in
Group key
Group key
Comunity Hub
History
arrow-down
starMore
arrow-down
bob

Bob

Have a question related to this hub?

bob

Alice

Got something to say related to this hub?
Share it here.

#general is a chat channel to discuss anything related to the hub.
Hubbry Logo
search button
Sign in
Group key
Community hub for the Wikipedia article
logoWikipedian hub
Welcome to the community hub built on top of the Group key Wikipedia article. Here, you can discuss, collect, and organize anything related to Group key. The purpose of the hub is to connect people, foste...
Add your contribution
Group key

In cryptography, a group key is a cryptographic key that is shared between a group of users. Typically, group keys are distributed by sending them to individual users, either physically, or encrypted individually for each user using either that user's pre-distributed private key.

A common use of group keys is to allow a group of users to decrypt a broadcast message that is intended for that entire group of users, and no one else.

For example, in the Second World War, group keys (known as "iodoforms", a term invented by a classically educated non-chemist, and nothing to do with the chemical of the same name[1]) were sent to groups of agents by the Special Operations Executive. These group keys allowed all the agents in a particular group to receive a single coded message. [2] [3]

In present-day applications, group keys are commonly used in conditional access systems, where the key is the common key used to decrypt the broadcast signal, and the group in question is the group of all paying subscribers. In this case, the group key is typically distributed to the subscribers' receivers using a combination of a physically distributed secure cryptoprocessor in the form of a smartcard and encrypted over-the-air messages.

References

[edit]
  1. ^ Richard Clayton, Hiding: Anonymity Systems, http://www.cl.cam.ac.uk/~rnc1/notes/AT02_hiding.pdf, lecture notes, 2002.
  2. ^ Between Silk and Cyanide – a Codemaker’s War 1941-1945, Leo Marks, HarperCollins 1998.
  3. ^ Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, chapter 20, page 428, Wiley 2001, ISBN 0-471-38922-6 (paperback, 641pp.) Available online at http://www.cl.cam.ac.uk/~rja14/book.html