Advertisement

Introduction and the Need for Noise Tolerant Data Authentication

  • Obaid Ur-Rehman
  • Natasa Zivic
Chapter
Part of the Signals and Communication Technology book series (SCT)

Abstract

In this chapter, the concept of noisy data and its authentication mechanisms are introduced. Standard message authentication codes are good at authenticating data as long as the data or its authentication tags have not changed. However, the techniques for authenticating noisy data, i.e., data which has changed during storage or transmission, are relatively new and not standardized at the time of this writing. The minor modifications in the data could be introduced due to multiple reasons such as storage and transmission errors, especially when the data is transmitted over a wireless medium.

Keywords

Noisy data Message authentication codes MAC verification Data authentication Content authentication 

References

  1. 1.
    ISO/IEC 7498–2:1989, Information processing systems – Open Systems Interconnection – Basic Reference Model – Part 2: Security ArchitectureGoogle Scholar
  2. 2.
    ISO/IEC 9797–2:2011, Information technology – Security techniques – Message Authentication Codes (MACs) – Part 2: Mechanisms using a dedicated hash functionGoogle Scholar
  3. 3.
    ISO/IEC 9797–1:2011, Information technology – Security techniques – Message Authentication Codes (MACs) – Part 1: Mechanisms using a block cipherGoogle Scholar
  4. 4.
    ISO/IEC 9797–3:2011, Information technology – Security techniques – Message Authentication Codes (MACs) – Part 3: Mechanisms using a universal hash-functionGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Obaid Ur-Rehman
    • 1
  • Natasa Zivic
    • 1
  1. 1.Data Communications SystemsUniversity of SiegenSiegenGermany

Personalised recommendations