Skip to main content

Entity Based Message Authentication System

  • Conference paper
Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4496))

  • 764 Accesses

Abstract

A critical promotion factor of e-Commerce is message authentication, the procedure that allows communicating parties to verify received messages as authentic. The client-server system has been traditionally used for authentication service. As distributed computing environment has been complicated more and more, Agent system is developed and used extensively for security service. We have designed and successfully tested an agent model for security service which we have named NMAP(New Message Authentication Protocol) to deal with message authentication in the public key cryptosystem. The NMAP’s performance has been shown by various trials of message authentication based on file size and key length. The NMAP’s overall performance on the processing speed is shown to be superior to that of client-server system named PGP. This suggested system will provide an active e-Commerce and non-interactive authentication service.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Puliafto, A., Riccobene, S., Scarpa, M.: An analytical comparison of the client-server, remote evaluation and mobile agents paradigms. In: Proceedings of First International Symposium on Agents Systems and Applications, pp. 248–292 (1999)

    Google Scholar 

  2. Denning, D.: Timestamps in Key Distribution Protocols. Communications of the ACM (1981)

    Google Scholar 

  3. Kaufman, C., Radia, P., Mike, S.: Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs (1995)

    Google Scholar 

  4. Mitchell, C., Wallker, M., Rush, D.: CCITT/ISO Standards for Security Message Handling. IEEE J. Sel. Areas in Comm., 517–524 (1989)

    Google Scholar 

  5. Stallings, W.: Network and Internetwork Security: Principles and Practice. Prentice-Hall, Englewood Cliffs (1995)

    Google Scholar 

  6. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  7. King, J.: X.400 Security. Computers & Security, 707–710 (1992)

    Google Scholar 

  8. Manros, C.: The X.400 Blue Book Companion. Technology Appraisals, Twickenham (1981)

    Google Scholar 

  9. Schneider, B.: E-Mail Security: How to Keep Your Electronic Messages Private. John Wiley & Sons, Chichester (1995)

    Google Scholar 

  10. Study on the Authentication Implementation and Access Control. Korea Electronic & Communication Research Center (1996)

    Google Scholar 

  11. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. on Computer Systems, 18–36 (1990)

    Google Scholar 

  12. Kille, S.: Implementing X.400 and X500: The PP and QUIPU Systems. Artech House Inc., Boston (1991)

    Google Scholar 

  13. Bellare, M., Namprempre, C.: Authenticated encryption, pp. 531–545. Springer, Berlin (2000)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ngoc Thanh Nguyen Adam Grzech Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, YS., Choi, SJ., Lee, GS., Lee, G. (2007). Entity Based Message Authentication System. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2007. Lecture Notes in Computer Science(), vol 4496. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72830-6_100

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72830-6_100

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72829-0

  • Online ISBN: 978-3-540-72830-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics