Introduction and the Need for Noise Tolerant Data Authentication
In this chapter, the concept of noisy data and its authentication mechanisms are introduced. Standard message authentication codes are good at authenticating data as long as the data or its authentication tags have not changed. However, the techniques for authenticating noisy data, i.e., data which has changed during storage or transmission, are relatively new and not standardized at the time of this writing. The minor modifications in the data could be introduced due to multiple reasons such as storage and transmission errors, especially when the data is transmitted over a wireless medium.
KeywordsNoisy data Message authentication codes MAC verification Data authentication Content authentication
- 1.ISO/IEC 7498–2:1989, Information processing systems – Open Systems Interconnection – Basic Reference Model – Part 2: Security ArchitectureGoogle Scholar
- 2.ISO/IEC 9797–2:2011, Information technology – Security techniques – Message Authentication Codes (MACs) – Part 2: Mechanisms using a dedicated hash functionGoogle Scholar
- 3.ISO/IEC 9797–1:2011, Information technology – Security techniques – Message Authentication Codes (MACs) – Part 1: Mechanisms using a block cipherGoogle Scholar
- 4.ISO/IEC 9797–3:2011, Information technology – Security techniques – Message Authentication Codes (MACs) – Part 3: Mechanisms using a universal hash-functionGoogle Scholar