Font Size: a A A

Securit Group Data Source Authentication Protocol Based On Error-correcting Code

Posted on:2011-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:C M LiFull Text:PDF
GTID:2178360308455606Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Along with the development of Internet and video/audio technology at very fast speed, more and more applications of multimedia and high-bandwidth appear. Multicast is a communication way on the Internet. Compared with unicast, it not only saves bandwidth, but also can implement on different structures and layers on the network; Compared with broadcast, it can be managed easily and know the situation of the multicast members easily. But because of the opening and the limitations of the network, the Multicast can hardly obtain the security guarantees.The basic and primary questions of security multicast are key management and source authentication now. Source authentication is the key and difficulty problem through the multicast. And it also become the basis and precondition for realizing the security multicast. In order to make the data stream spread on the Internet widely and credible, we must apply a safeguard mechanism which is safe enough. The most threatening problem is the authenticity of the data. The data can easily suffer the attack such as falsify, forge, distort, steal. So it is important to ensure the integrality, correctness and non-repudiation of the data.In this paper, on the basis of several authentication protocols which are submit home and abroad, we analyzed and compared several kind of typical protocols. First, we propose a Low Load Authentication schemes based on Merkle hash tree ,and introduce error-correcting idea to enhance the capacity of resisting the packets lost; after, in order to resist the packets insert, we proposed another schemes based error correcting code and hash-chain, and explain the process of the authentication in detail, and analyze the performance and security. At the same time, simulate the scheme by the tool of crypto. At last, we analyze the security performance, computation overhead, transportation overhead, delay of sender and received ,verification probability of the protocol .
Keywords/Search Tags:multicast, security, data source authentication, Merkle hash tree, error- correcting code, hash-chain
PDF Full Text Request
Related items