A New Approach to Communicate Secret Message (Key) Among a Group using Chain Matrix Multiplication Based on Public Key Crypto System
Nageswara Rao Eluri1, K. Venkata Rao2, M. Soma Sundara Rao3, Mohammed Abazeed Bazeed4

1Mr. Nageswara Rao Eluri, Lecturer, Department of Information Systems, King Khalid University Abha, Kingdom of Saudi Arabia.
2Dr. K. Venkata Rao, HOD, Department of Computer Science Engineering, Vignan’s Institute of Information Technology, VisakhaPatnam (Andhra Pradesh), India.
3Prof. Soma Sundara Rao, HOD of MCA, Vignan IIT, Duvvada, VisakhaPatnam, (Andhra Pradesh), India.
4Mohammed Abazeed Bazeed, Pursuing PhD, Department of Information Systems, Khammis Mushait Community College, King Khalid University, Abha, Kingdom of Saudi Arabia.
Manuscript received on 8 December 2013 | Revised Manuscript received on 18 December 2013 | Manuscript Published on 30 December 2013 | PP: 86-89 | Volume-3 Issue-7, December 2013 | Retrieval Number: G1359123713/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Group key management is a fundamental building block for secure group communication systems. It is required for many applications such as teleconference, group meeting etc. Proposed System, Secure Group Communication in public key cryptography systems is proposed for dynamic groups which are secure. In this scheme a group is established and a master key is generated using the dynamic approach chain matrix multiplication and text messages are transmitted between users of group with help of Master key and also between sub groups. In our approach, group key will be updated when a user joins or leaves the group. Confidentiality can be achieved through changing re-keying when user joins or leaves the group.
Keywords: Key Distribution, Chain Matrix Multiplication, Server/Client Communication, RSA, Encryption And Decryption.

Scope of the Article: Adaptive Systems