Broadcast Authentication with Practically Unbounded One-way Chains

نویسنده

  • Bogdan Groza
چکیده

A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains constructed with the squaring function which gives the possibility to construct a one-way chain of whose length is unbounded in practice. Although the computational cost is somewhat increased, compared to the use of hash chains, these computational requirements are affordable for the addressed scenario. In brief, the protocol assures information authenticity at the reduced cost of almost one modular multiplication for each broadcasted packet. Time synchronization issues are discussed and the security of the protocol is equivalent to the integer factorization problem since the squaring function is used in the construction of the one-way chain. A failure mode analysis of the protocol is done; this is an aspect of novelty and applies to other protocols based on time synchronization as well. Also, a formal proof on the security of the protocol is sketched. Index Terms — authentication, broadcast, one-way chain, protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Addressing the Shortcomings of One-Way Chains

One-way hash chains have been the preferred choice, over the symmetric and asymmetric key cryptography, in security setups where efficiency mattered; despite the ephemeral confidentiality and authentication they assure. Known constructions of one-way chains (for example, SHA-1 based), only ensure the forward secrecy and have limitations over their length i.e., a priori knowledge of chain’s leng...

متن کامل

Maximum Life-time Broadcast Authentication Protocol for Wireless Sensor Networks

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows a sender to broadcast messages to multiple nodes in an authenticated way. Symmetric key based schemes such as μTESLA and μTESLA-like schemes have been proposed to provide such services for WSNs, however, the life-time of these schemes is constrained by the length of the key chains. To addres...

متن کامل

Secure Authenticated Broadcast Communication in Fully Connected Networks

We address the problem of secure authenticated broadcast in fully connected networks where every user has a communication channel with every other user. The problem poses interesting challenges and current solutions tradeoff either storage or computational overhead. We describe three solutions that provide a good balance of storage and computational complexity. Our solutions use concepts like c...

متن کامل

Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET

Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, bandwidth, and energy resources. Additionally, frequent packet loss errors require a security solution that can tolerate missed packets. The existing cryptography techniques are in...

متن کامل

DoS Protection for Reliably Authenticated Broadcast

Authenticating broadcast packet communications poses a challenge that cannot be addressed efficiently with public key signatures on each packet, or securely with the use of a pre-distributed shared secret key, or practically with unicast tunnels. Unreliability is an intrinsic problem: many broadcast protocols assume that some information will be lost, making it problematic to amortize the cost ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JSW

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2008