Abstract
A critical promotion factor of e-Commerce is message authentication, the procedure that allows communicating parties to verify received messages as authentic. The client-server system has been traditionally used for authentication service. As distributed computing environment has been complicated more and more, Agent system is developed and used extensively for security service. We have designed and successfully tested an agent model for security service which we have named NMAP(New Message Authentication Protocol) to deal with message authentication in the public key cryptosystem. The NMAP’s performance has been shown by various trials of message authentication based on file size and key length. The NMAP’s overall performance on the processing speed is shown to be superior to that of client-server system named PGP. This suggested system will provide an active e-Commerce and non-interactive authentication service.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Puliafto, A., Riccobene, S., Scarpa, M.: An analytical comparison of the client-server, remote evaluation and mobile agents paradigms. In: Proceedings of First International Symposium on Agents Systems and Applications, pp. 248–292 (1999)
Denning, D.: Timestamps in Key Distribution Protocols. Communications of the ACM (1981)
Kaufman, C., Radia, P., Mike, S.: Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs (1995)
Mitchell, C., Wallker, M., Rush, D.: CCITT/ISO Standards for Security Message Handling. IEEE J. Sel. Areas in Comm., 517–524 (1989)
Stallings, W.: Network and Internetwork Security: Principles and Practice. Prentice-Hall, Englewood Cliffs (1995)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
King, J.: X.400 Security. Computers & Security, 707–710 (1992)
Manros, C.: The X.400 Blue Book Companion. Technology Appraisals, Twickenham (1981)
Schneider, B.: E-Mail Security: How to Keep Your Electronic Messages Private. John Wiley & Sons, Chichester (1995)
Study on the Authentication Implementation and Access Control. Korea Electronic & Communication Research Center (1996)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. on Computer Systems, 18–36 (1990)
Kille, S.: Implementing X.400 and X500: The PP and QUIPU Systems. Artech House Inc., Boston (1991)
Bellare, M., Namprempre, C.: Authenticated encryption, pp. 531–545. Springer, Berlin (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, YS., Choi, SJ., Lee, GS., Lee, G. (2007). Entity Based Message Authentication System. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2007. Lecture Notes in Computer Science(), vol 4496. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72830-6_100
Download citation
DOI: https://doi.org/10.1007/978-3-540-72830-6_100
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72829-0
Online ISBN: 978-3-540-72830-6
eBook Packages: Computer ScienceComputer Science (R0)