Explore chapters and articles related to this topic
Hash Functions and Data Integrity
Published in Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, 2018
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
Hash functions are used for data integrity in conjunction with digital signature schemes, where for several reasons a message is typically hashed first, and then the hash-value, as a representative of the message, is signed in place of the original message (see Chapter 11). A distinct class of hash functions, called message authentication codes (MACs), allows message authentication by symmetric techniques. MAC algorithms may be viewed as hash functions which take two functionally distinct inputs, a message and a secret key, and produce a fixed-size (say n-bit) output, with the design intent that it be infeasible in practice to produce the same output without knowledge of the key. MACs can be used to provide data integrity and symmetric data origin authentication, as well as identification in symmetric-key schemes (see Chapter 10).
Analysis of Threats to WiMAX/802.16 Security
Published in Yan Zhang, Hsiao-Hwa Chen, Mobile Wimax, 2007
Michel Barbeau, Christine Laurendeau
Weaknesses in management message authentication open the door to aggressions such as the man in the middle attack, active attack, and replay attack. However, the following authentication mechanisms are available: the HMAC tuple and the one-key message authentication code (OMAC) tuple. The OMAC is AES-based and includes replay protection. The HMAC authentication originally specified in the IEEE 802.16 standard did not provide a counter to protect against replay attacks, but 802.16e does, so we distinguish both possibilities in our analysis. The technical difficulty in defeating the four different possibilities for authentication is as follows: none where no authentication is used, solvable for the HMAC case with no replay protection, and strong for both cases where the HMAC with replay protection or the OMAC defense is used. The likelihood of the management message modification threat is therefore possible for the first two cases and unlikely for the latter two. In all cases, the impact of an attack of that type can be high because it might affect the operation of the communications. The risk is therefore ranked as major for both cases where no authentication or HMAC without the replay counter is used, and minor for both the HMAC with the replay counter and the OMAC cases. As a result, it might be safe to provide a second line of defense against this type of attack.
Fundamentals of Multimedia Encryption Techniques
Published in Borko Furht, Darko Kirovski, Multimedia Encryption and Authentication Techniques and Applications, 2006
Borko Furht, Daniel Socek, Ahmet M. Eskicioglu
Confidentiality refers to the protection of information from unauthorized access. An undesired communicating party, called an adversary, must not be able to access the communication material. Data integrity ensures that information has not been manipulated in an unauthorized way. Finally, authentication methods are studied in two groups: entity authentication and message authentication. Message authentication provides assurance of the identity of the sender of a message. This type of authentication also includes evidence of data integrity because if the data is modified during transmission, the sender cannot be the originator of the message. Entity authentication ensures the receiver of a message of both the identity of the sender and his active participation.
A collaborative auditing scheme with dynamic data updates based on blockchain
Published in Connection Science, 2023
Jie Xiao, Hui Huang, Chenhuang Wu, Qunshan Chen, Zhenjie Huang
Wang et al. (2011) solved the problem by using random mask technology to prevent third-party auditors from disclosing users' privacy. This scheme can prevent data privacy disclosure in the process of proof calculation. Wang et al. (2014) used the concept of ring signature to construct a homomorphic authenticator and named it ‘Oruta’, making TPA and CSP unable to know the data. Kumar (2020) proposed a system to enhance data privacy protection. Before data is stored in the cloud, the RSA and AES algorithms encrypt data. The user will send the hash-based message authentication code (HMAC) to the TPA. The TPA performs the cloning procedure followed by the CSP and audit data with the SHA-512 algorithm. Susilo et al. (2022) proposed a cloud data audit scheme in which tags are not generated from block tags but are bunch tags, enabling integrity proofs to reduce the number of bits while maintaining privacy.
An Enhanced Elliptic Curve Cryptography Scheme for Secure Data Transmission to Evade Entailment of Fake Vehicles in VANET
Published in Cybernetics and Systems, 2022
Mayur Jagdish Patil, Krishnakant P. Adhiya
Tangade, Manvi, and Lorenz (2020) have demonstrated a novel topology network to secure data sharing over VANET, named a Trust Management scheme based on Hybrid Cryptography (TMHC). The authentication played a prime role in preserving the data to establish the trust based communication network. For verifying the intruder between the vehicles, TMHC has employed a hybrid-based cryptographic technique. The symmetric Hash Message Authentication Code (HMAC) was superimposed with the asymmetric IDentity-based (ID-based) digital signature to construct the hybrid network. The RSU was used to compute the trust value and the entailment of Agent Trusted Authority (ATA) for calculating the trust factor based on its reward points. The performance was validated in terms of various metrics like computation, storage, communication, and end-to-end delay, which has achieved the desired value as 23%, 19%, 15%, and 15.85% improved, correspondingly. Hence, the suggested method has attained impressive results to ensure the significance of the network.
Secured Model for Internet of Things (IoT) to Monitor Smart Field Data with Integrated Real-Time Cloud Using Lightweight Cryptography
Published in IETE Journal of Research, 2021
Fill Tangade et al. [19] suggested a Hybrid Cryptography-based Trust Protection System for secure correspondence. It incorporates composite cryptography authentication to provide effective stable protection. Authentication is an imperative chunk of the trust formation and stable inter-device communication. Hybrid cryptography involves asymmetric ID-based digital signature and symmetric HMAC (Hash-Message-Authentication-Code). The trusted RSU (Road-Side-Unit) measures the estimation of confidence, while the trusted agent (ATA) determines the estimation of the vehicle on the basis of its award points. Certificate-Based-Signature (CBS) not only determine the problem of certificate revocation in standard public key cryptography, but also solves the problem of key revocation in the ID Based Signature Scheme.