Message Authentication, Digital Signature, and Key Management

2021 ◽  
pp. 101-128
Author(s):  
Siva Charan Muraharirao ◽  
Manik Lal Das

Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit (LSB) is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security services. On the other hand, digital signature-based image authentication provides better security, but with added computational cost in comparison with LSB approach. Furthermore, digital signature-based authentication approach requires managing public key infrastructure. Considering security weakness of LSB-based approach and cost overhead of public key based approach, the authors present a digital image authentication scheme using LSB and message authentication codes (MAC). The MAC-based approach for authenticating digital image is secure and efficient approach without public key management overhead. The authors also provide experimental results of the proposed scheme using MATLAB. The experimental results show that the proposed scheme is efficient and secure in comparisons with other schemes.


2021 ◽  
Author(s):  
Jie Xiao

The first design presents a novel location-based key management and en-route data authentication proposal. It divides the whole sensing area into a number of location cells. A group of location cells consist of a logical group. A pairwise key between two sensor nodes is established based on grid-based bivariate t-degree polynomials. Any valid reading report needs to collect enough message authentication code (MACs) from different neighbours. These pairwise keys used for generating the MAC are forwarded several hops down to the base station for future en-route data authentication. The second design proposes a greedy location-based secure and energy-efficient data aggregation approach. It further utilizes data aggregation based on the previous design by setting up control groups, applying pattern codes, selecting and switching control head nodes dynamically and periodically. In addition, different from the first design, it only requires control head nodes to collect enough MACs in each reading report. Extensive analysis, evaluations and experiments show us that both designs are secure, efficient and resilient.


2021 ◽  
Vol 10 (1) ◽  
pp. 449-457
Author(s):  
Farah Maath Jasem ◽  
Ali Makki Sagheer ◽  
Abdullah M. Awad

Bitcoin is a peer-to-peer electronic cash system largely used for online financial transactions. It gained popularity due to its anonymity, privacy, and comparatively low transaction cost. Its wallet heavily relies on Elliptic Curve Digital Signature Algorithm (ECDSA). Weaknesses in such algorithms can significantly affect the safety and the security of bitcoin wallets. In this paper, a secure key management wallet was designed based on several changes in the wallet parts. In the cold wallet, we employed an image-based passphrase to achieve a strong entropy source of master seed. The hot wallet, the proposed key_ Gen algorithm is modifying to the key generation step of the ECDSA that it is to generate a fresh key pair at each transaction. The final part ensures recovering all keys on both hot and cold wallets without daily backups in case of losing the wallet. The findings prove that the proposed cold wallet is resisting against a dictionary attack and overcoming the memorizing problem. The proposed hot wallet model acquires good anonymity and privacy for bitcoin users by eliminating transaction likability without additional cost. The execution time for signing a transaction of the proposed model is~70 millisecond, which is then important in the bitcoin domain.


2021 ◽  
Author(s):  
Jie Xiao

The first design presents a novel location-based key management and en-route data authentication proposal. It divides the whole sensing area into a number of location cells. A group of location cells consist of a logical group. A pairwise key between two sensor nodes is established based on grid-based bivariate t-degree polynomials. Any valid reading report needs to collect enough message authentication code (MACs) from different neighbours. These pairwise keys used for generating the MAC are forwarded several hops down to the base station for future en-route data authentication. The second design proposes a greedy location-based secure and energy-efficient data aggregation approach. It further utilizes data aggregation based on the previous design by setting up control groups, applying pattern codes, selecting and switching control head nodes dynamically and periodically. In addition, different from the first design, it only requires control head nodes to collect enough MACs in each reading report. Extensive analysis, evaluations and experiments show us that both designs are secure, efficient and resilient.


Sensors ◽  
2020 ◽  
Vol 20 (6) ◽  
pp. 1543 ◽  
Author(s):  
Erdong Yuan ◽  
Liejun Wang ◽  
Shuli Cheng ◽  
Naixiang Ao ◽  
Qingrui Guo

The secure transmission of data within a network has received great attention. As the core of the security management mechanism, the key management scheme design needs further research. In view of the safety and energy consumption problems in recent papers, we propose a key management scheme based on the pairing-free identity based digital signature (PF-IBS) algorithm for heterogeneous wireless sensor networks (HWSNs). Our scheme uses the PF-IBS algorithm to complete message authentication, which is safer and more energy efficient than some recent schemes. Moreover, we use the base station (BS) as the processing center for the huge data in the network, thereby saving network energy consumption and improving the network life cycle. Finally, we indirectly prevent the attacker from capturing relay nodes that upload data between clusters in the network (some cluster head nodes cannot communicate directly). Through performance evaluation, the scheme we proposed reasonably sacrifices part of the storage space in exchange for entire network security while saving energy consumption.


Sign in / Sign up

Export Citation Format

Share Document