Abstract
This paper presents an efficient approach to provide data origin authentication service with a multimedia stream application. The proposed approach is intended to achieve not only fast signing/verifying transaction but also low transmission overhead. In particular, the consideration on the performance is one of key issues for increasingly widespread using of wireless communication since there are lots of limitations including scarce network resources, low computing power and limited energy of nodes. To meet such requirements, we take advantage of using a short-lived key(s) that allow an authentication system to overcome the performance degradation caused by applying highly expensive cryptographic primitives such as digital signature. The major concern of this paper, therefore, is to derive an appropriate length of a key and hash value without compromising the security of an authentication system.
This work was supported by the Korea Research Foundation Grant. (KRF-2004-005-D00147).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Diot, C., Levine, B., Lyles, B., Kassem, H., Balensiefen, D.: Deployment Issues for the IP Multicast Service and Architecture. IEEE Network magazine (January/February 2000)
Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. IETF RF 2401 (November 1998)
Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. Journal of Cryptology 14(4), 255–293 (2001)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Security and Privacy Symposium (2000)
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Infocom 1999 (1999)
Gennaro, R., Rohatgi, P.: How to sign digital streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. In: Proc. IEEE ICNP 1998 (1998)
Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: NDSS 2001, pp. 13–22 (Feburary 2001)
Park, J.M., Chong Efficient, E.K.P.: multicast stream authentication using erasure codes. ACM Trans. Inf. Syst. Secur. 6(2), 258–285 (2003)
Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.D.: Distillation Codes and Applications to DoS Resistant Multicast Authentication. In: NDSS 2004 (2004)
Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, April 1980, pp. 122–134 (1980)
Kang, N., Park, I., Kim, Y.: Secure and Scalable Routing Protocol for Mobile Ad-hoc Networks. In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I.S. (eds.) MATA 2005. LNCS, vol. 3744, pp. 334–343. Springer, Heidelberg (2005)
Baugher, M., Weis, B., Hardjono, T., Harney, H.: The Group Domain of Interpretation. RFC 3547 (July 2003)
Crypto++ class library, http://www.eskimo.com/weidai/cryptlib.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kang, N., Kim, Y. (2006). A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia Stream. In: Gavrilova, M., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3982. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751595_53
Download citation
DOI: https://doi.org/10.1007/11751595_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34075-1
Online ISBN: 978-3-540-34076-8
eBook Packages: Computer ScienceComputer Science (R0)