A Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless Environment
Loading...
Date
2010-06-25T16:22:10Z
Authors
Miller, Daniel
Advisor
Journal Title
Journal ISSN
Volume Title
Publisher
University of Waterloo
Abstract
Real-time media streams are a common application on the Internet today. For many such streams, it is necessary to provide authentication, data integrity, and non-repudiation. Some applications where this type of security may be necessary include voice-over-IP (VoIP) calls, transmission of sensitive data such as medical records or personal information, or financial data that needs to be updated in real-time. It is important to be able to balance the need for security with the constraints of the environment, where data must be delivered in a limited amount of time.
This thesis examines and classifies the different types of authentication based on a
number of factors, mainly the type of authentication (user or data), the way in which authentication information is transmitted (embedded or appendix), and the secrecy of the authentication information (covert or overt). This thesis then presents a specific real-time communication system, and develops a novel method of achieving data authentication for the system, based on previous work done in the area of hash-chaining authentication schemes. Theoretical and simulated results are presented, showing that the new method,
the modified butterfly scheme, outperforms the original method, the butterfly scheme,
using the same amount of overhead.