An Overview of Streamed Data Authentication Techniques
In the chapter we present some of the techniques proposed for authenticating digital streams. We start with the so-called block signatures, where every packet contains full information needed for its authentication. Then, we describe two techniques based on a simple hash chain for an off-line authentication and its modification where one-time signatures are used for an on-line authentication. Later, we consider the TESLA scheme for authenticating streams in case of synchronous systems. This is followed by augmented hash chains with signature packets used once per a sequence of packets rather than for the whole stream. The chapter is concluded with a short comparison of the considered techniques.
Key wordsStreamed Data Authentication Hash Chain Digital Signature Gilbert-Elliot Channel
Unable to display preview. Download preview PDF.
- 1.W. Stalings: Data and Computer Communications, 6th ed., Prentice Hall, Upper Saddle River, 2000.Google Scholar
- 2.J. Lu: “Signal Processing for Internet Video Streaming,” Proc. of SPIE, Image and Video Communications and Processing, January 2000.Google Scholar
- 3.G. Pipkin: http://www.itc.virginia.edu/atg/techtalks/powerpoint/video/sld001.htm “Video on the Web,” (accessed on 23/11/01).
- 4.Utah Education Network-http://www.uen.org/technical/html/streamingfaq.html (accessed on 23/11/01)
- 5.R. Gennaro, P. Rohatgi: “How to Sign Digital Streams,” Cypto’ 97, Springer-Verlag, 1998, pp. 180–197.Google Scholar
- 6.C. K. Wong, S. S. Lam: “Digital signatures for Flows and Multicasts,” IEEE/ACM Transactions on Networking, Vol.7.No.4, Aug. 1999, pp. 502–513.Google Scholar
- 7.M.J. Moyer, J.R. Rao and P. Rohatgi: “A Survey of Security Issues in Multicast Communications,” IEEE Network, Nov/Dec. 1999, pp. 12–23.Google Scholar
- 8.D.R. Stinson: “Cryptography Theory and Practice” CRC Press.Google Scholar
- 9.A. Perrig, R. Canetti, J.D. Tygar, D. Song: “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” Proc. of IEEE Security and Privacy Symposium, May 2000, pp. 56–73.Google Scholar
- 10.P. Golle, N. Modadugu: “Authenticating Streamed Data in the Presence of Random Packet Loss”, Proc. of Network and Distributed System Security Symposium, 8–9 February 2001.Google Scholar
- 11.S. Miner, J. Staddon: “Graph-Based Authentication of Digital Streams,” http://www-cse.ucsd.edu/users/sminer/abstracts/GraphAuth.html (accessed on: 11/01/02).
- 12.B.J. Wysocki, Y. Wang, and R. Safavi-Naini: “On a Method to Authenticate and Verify Digital Streams,” Journal of Telecommunications and Information technology, vol., No.2, pp. pp.45–52, 2002.Google Scholar
- 13.W. Stalings: “Cryptography and Network Security: Principles and Practice” 2nd ed., Prentice Hall, Upper Saddle River, 1998.Google Scholar
- 14.E. N. Gilbert, “Capacity of Burst-Noise Channel”, The Bell System Technical Journal, Sept. 1960, pp.1253–1265.Google Scholar
- 15.E. O. Elliott, “Estimates of Error Rates for Codes on Burst-Noise Channels”, The Bell System Technical Journal, Sept. 1963, pp. 1977–1997.Google Scholar