CFP last date
20 May 2024
Reseach Article

An Efficient Signature Scheme for Securing Multicast Communication

Published on April 2012 by R. Krishnaveni, N. Shanthi
International Conference in Recent trends in Computational Methods, Communication and Controls
Foundation of Computer Science USA
ICON3C - Number 7
April 2012
Authors: R. Krishnaveni, N. Shanthi
26f0f3d8-3f62-45b5-ad3c-d234ae78ae89

R. Krishnaveni, N. Shanthi . An Efficient Signature Scheme for Securing Multicast Communication. International Conference in Recent trends in Computational Methods, Communication and Controls. ICON3C, 7 (April 2012), 1-5.

@article{
author = { R. Krishnaveni, N. Shanthi },
title = { An Efficient Signature Scheme for Securing Multicast Communication },
journal = { International Conference in Recent trends in Computational Methods, Communication and Controls },
issue_date = { April 2012 },
volume = { ICON3C },
number = { 7 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icon3c/number7/6048-1049/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Recent trends in Computational Methods, Communication and Controls
%A R. Krishnaveni
%A N. Shanthi
%T An Efficient Signature Scheme for Securing Multicast Communication
%J International Conference in Recent trends in Computational Methods, Communication and Controls
%@ 0975-8887
%V ICON3C
%N 7
%P 1-5
%D 2012
%I International Journal of Computer Applications
Abstract

Multicasting is an efficient communication mechanism for group oriented applications such as video conferencing, distance learning etc. Assuring certain level of security over multicast communication has become vital in Internet applications. Various cryptographic algorithms have been used to provide different security services. One among the cryptographic scheme is the digital signature which ensures authentication, message integrity and sender non repudiation. Digital signature algorithm such as RSA/DSA with SHA-1 can be used. In order to prevent passive attack, confidentiality has to be ensured. Confidentiality can be achieved by using the symmetric key encryption approach. The main objective of this paper is to provide all the above security services with low communication overhead. RSA with SHA-1 is one of the efficient public key cryptographic algorithms to provide security and therefore, its efficient hardware implementation is of great importance. This paper also proposes the design of SHA-1 implementation in FPGA.

References
  1. Judge, P. , and Ammar, M. 2003. Security Issues and Solutions in Mulicast Content Distribution: A Survey, IEEE Network Magazine: 30-36.
  2. Challal, Y. , Bettahar, H. , and Bouabdallah, A. 2004. A Taxonomy of Multicast Data Origin Authentication: Issues and Solutions, IEEE Comm. Surveys & Tutorials: 34-57.
  3. Zhou, Y. , and Fang, Y. 2007. Multimedia Broadcast Authentication Based on Batch Signature, IEEE Comm. Magazine: 72-77.
  4. Even, S. , Goldreich, O. , and Micali, S. On-Line/Offline Digital Signatures, J. Cryptology: 35-67, 1996.
  5. Perrig, A. , Canetti, R. , Tygar, J. D. , and Song, D. 2000. Efficient Authentication and Signing of Multicast Streams over Lossy Channels, Proc. IEEE Symp. Security and Privacy (SP '00): 56-75.
  6. Pannetrat, A. , and Molva, R. 2002 . Authenticating Real Time Packet Streams and Multicasts, Proc. Seventh IEEE Int'l Symp. Computers and Comm. (ISCC '02): 490-495.
  7. Pannetrat, A. , and Molva, R. 2003. Efficient Multicast Packet Authentication, Proc. 10th Ann. Network and Distributed System Security Symp. (NDSS '03).
  8. Rivest, R. L. , Shamir, A. , and Adleman, L. 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Comm. ACM: 120-126.
  9. Harn, L. 1998. Batch Verifying Multiple RSA Digital Signatures, IEE Electronic Letters: 1219-1220.
  10. FIPS PUB 186. 1994. Digital Signature Standard (DSS).
  11. Canetti, R. , Garay, J. , Itkis, G. , Micciancio, D. , Naor, M. , and Pinkas,B. 1999. Multicast Security: A Taxonomy and Some Efficient Constructions, Proc. IEEE INFOCOM: 708-716.
  12. Perrig, A. , Canetti, R. , Song, D. , and Tygar, J. 2001. Efficient and Secure Source Authentication for Multicast, Proc. Network and Distributed System Security Symp. (NDSS '01).
  13. Merkle, R. 1980. Protocols for Public Key Cryptosystems, Proc. IEEE Symp. Security and Privacy.
  14. Zhou, Y. , Zhu. , X and Fang, Y. 2010. MABS: Multicast authentication based on batch Signature, IEEE Trans. Mobile Computing: 982-993.
  15. Hui, C. X. , Zhi, D. J. 2010. Design of SHA-1 algorithm based om FPGA, Proc. International Conference on Networks Security, Wireless Communications and Trusted Computing.
  16. Harold, E. R . 2004. Java Network Programming, Third edition, O'Reilly publications.
  17. Harte, L. 2008. Introduction to Data Multicasting, Althos publications.
  18. Jaworski, J. , and Perrone, P. 2000. Java Security Handbook, Sams Publications.
  19. Paar, C. , Pelzl, J. 2009. Understanding Cryptography, Springer publications.
  20. Stallings, W. 2005. Cryptography and Network Security Principles and Practices, Fourth edition, Prentice hall publications.
  21. Pitt, E. 2006. Fundamental Networking in Java , Springer publications.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Client Confidentiality Encryption Server Verification