Ask a Librarian

Threre are lots of ways to contact a librarian. Choose what works best for you.

HOURS TODAY

11:00 am - 3:00 pm

Reference Desk

CONTACT US BY PHONE

(802) 656-2022

Voice

(802) 503-1703

Text

MAKE AN APPOINTMENT OR EMAIL A QUESTION

Schedule an Appointment

Meet with a librarian or subject specialist for in-depth help.

Email a Librarian

Submit a question for reply by e-mail.

WANT TO TALK TO SOMEONE RIGHT AWAY?

Library Hours for Friday, May 3rd

All of the hours for today can be found below. We look forward to seeing you in the library.
HOURS TODAY
8:00 am - 9:00 pm
MAIN LIBRARY

SEE ALL LIBRARY HOURS
WITHIN HOWE LIBRARY

MapsM-Th by appointment, email govdocs@uvm.edu

Media Services8:00 am - 4:30 pm

Reference Desk11:00 am - 3:00 pm

OTHER DEPARTMENTS

Special Collections10:00 am - 5:00 pm

Dana Health Sciences Library7:30 am - 6:00 pm

 

CATQuest

Search the UVM Libraries' collections

UVM Theses and Dissertations

Browse by Department
Format:
Online
Author:
Zhang, Annie
Dept./Program:
Mathematics and Statistics
Year:
2023
Degree:
M.S.
Abstract:
Group key exchange protocols are used to establish session keys, which can then be used as encryption keys to set up secure channels of communication, between more than two parties simultaneously. Many different group key exchange protocols exist and require security proofs in order to determine the strength of the protocol and answer the following questions: does the protocol provide authentication, and if so, to what degree? Does the protocol provide key secrecy? In this thesis we examine a particular group key exchange protocol that we call the extit{vector space projection protocol} as first described in "A Group Key Establishment Scheme" by Guzey, Kurt, and Ozdemir, and show using a particular type of security proof - the game based security model - that the protocol as described does not achieve key secrecy. We show that there are at least four adversaries with non-negligible probabilities of winning the key secrecy security game, which indicates that this key exchange protocol is not one that should be implemented.