Skip to main content

A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3982))

Included in the following conference series:

  • 1443 Accesses

Abstract

This paper presents an efficient approach to provide data origin authentication service with a multimedia stream application. The proposed approach is intended to achieve not only fast signing/verifying transaction but also low transmission overhead. In particular, the consideration on the performance is one of key issues for increasingly widespread using of wireless communication since there are lots of limitations including scarce network resources, low computing power and limited energy of nodes. To meet such requirements, we take advantage of using a short-lived key(s) that allow an authentication system to overcome the performance degradation caused by applying highly expensive cryptographic primitives such as digital signature. The major concern of this paper, therefore, is to derive an appropriate length of a key and hash value without compromising the security of an authentication system.

This work was supported by the Korea Research Foundation Grant. (KRF-2004-005-D00147).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Diot, C., Levine, B., Lyles, B., Kassem, H., Balensiefen, D.: Deployment Issues for the IP Multicast Service and Architecture. IEEE Network magazine (January/February 2000)

    Google Scholar 

  2. Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. IETF RF 2401 (November 1998)

    Google Scholar 

  3. Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. Journal of Cryptology 14(4), 255–293 (2001)

    MATH  MathSciNet  Google Scholar 

  4. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Security and Privacy Symposium (2000)

    Google Scholar 

  5. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Infocom 1999 (1999)

    Google Scholar 

  6. Gennaro, R., Rohatgi, P.: How to sign digital streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)

    Google Scholar 

  7. Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. In: Proc. IEEE ICNP 1998 (1998)

    Google Scholar 

  8. Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: NDSS 2001, pp. 13–22 (Feburary 2001)

    Google Scholar 

  9. Park, J.M., Chong Efficient, E.K.P.: multicast stream authentication using erasure codes. ACM Trans. Inf. Syst. Secur. 6(2), 258–285 (2003)

    Article  Google Scholar 

  10. Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.D.: Distillation Codes and Applications to DoS Resistant Multicast Authentication. In: NDSS 2004 (2004)

    Google Scholar 

  11. Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, April 1980, pp. 122–134 (1980)

    Google Scholar 

  12. Kang, N., Park, I., Kim, Y.: Secure and Scalable Routing Protocol for Mobile Ad-hoc Networks. In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I.S. (eds.) MATA 2005. LNCS, vol. 3744, pp. 334–343. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Baugher, M., Weis, B., Hardjono, T., Harney, H.: The Group Domain of Interpretation. RFC 3547 (July 2003)

    Google Scholar 

  14. Crypto++ class library, http://www.eskimo.com/weidai/cryptlib.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, N., Kim, Y. (2006). A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream. In: Gavrilova, M., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3982. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751595_53

Download citation

  • DOI: https://doi.org/10.1007/11751595_53

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34075-1

  • Online ISBN: 978-3-540-34076-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics