Introducing Robustness into Message Authentication

نویسنده

  • Natasa Zivic
چکیده

Message Authentication Codes are very sensitive to any change of the message they are appended to. If one or more bits of the message change, Message Authentication Codes change about 50\% of their bits, making the message useless. The successful verification of Message Authentication Codes demands equality of all of bits of the received Message Authentication Code and that one recalculated of the received message. Such a hard condition for the successful verification of messages protected by Message Authentication Codes is not suitable for some applications. The introduction of a softer condition for the successful verification can enable the correction and improve the successful of messages corrupted by transmission over a noisy channel. An algorithm is presented, which introduces robustness into the verification of messages protected by Message Authentication Codes together with a correction of messages corrupted due to the noisy channel. Results show how promising the algorithm is for correction of messages, which have an error rate despite of the use of channel codes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

A Routing Protocol with Byzantine Robustness¤

We present a routing protocol with Byzantine robustness and detection. The protocol utilizes a topological map and a packet forwarding mechanism with fault detection. The correctness of the protocol is based on authentication of data and control packets. We also present how such authentication can be done e¢ciently using Message Authentication Codes.

متن کامل

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

Message Authentication over Noisy Channels

The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily inves...

متن کامل

Secure Image Encryption Authentication Compression System

A two-phase content-based image authentication scheme is constructed based on a combination of hard and soft authentication implementing previous existing generic approximate message authentication codes which is a error-correcting codes with cryptographic message authentication codes and symmetric encryption techniques. The message authentication codes which used for hard authentication. The t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012