Professional Documents
Culture Documents
Enhanced Service Through Batch Signature
Enhanced Service Through Batch Signature
S.Santhi Priya
Abstract
Utilizes an efficient asymmetric cryptographic primitive Supports the authentication of any number of packets simultaneously with one signature verification Provides data integrity, origin authentication, and no repudiation
Existing System
packet loss - very frequent.
Disadvantage
Authentication is critical for securing multicast environment. Does not provide any loss recovery support.
Proposed System
The proposed system overcomes the above mentioned drawbacks. Asymmetric cryptographic primitive called batch signature Address the efficiency and packet loss problems
Data integrity: Each receiver should be able to assure that received packets have not been modified during transmissions.
Data origin authentication: Each receiver should be able to assure that each received packet comes from the real sender as it claims.
Non repudiation: The sender of a packet should not be able to deny sending the packet to receivers in case there is a dispute between the sender and receivers.
Advantage
MABS provides packet filtering to avoid packet loss. Authenticates any number of packets simultaneously. Highly unforgeable
SOFTWARE REQUIREMENTS
HARDWARE REQUIREMENTS
SYSTEM HARD DISK RAM
: Pentium IV : 40 GB : 512 MB
generate key
Public Key
Private Key
/ : User
9 : enter mailid()
/ : User
/ : MABS
1 : prompt to enter username, password and security code() 2 : enter username,password and security code()
/ : MABS
/ : Key
5 : keys saved()
/ : sender
/ : MABS
/ : MFile
/ : PartFile
2 : display file details to browse() 3 : select multimedia file() 4 : selct media file() 5 : check file()
6 : success()
10 : apply split()
11 : generate parts()
5 : prompt to enter keys() 6 : select keys through browse() 7 : browse the keys() 8 : verify keys and apply BLs()
/ : MABS
/ : PartFile
/ : Key
2 : browse files()
5 : aplly BLS() 7 : merge partfiles() 6 : use key() 8 : check key() 9 : merge successfull()
Implementation
BonehLynnShacham consists of three functions - generate, sign, and verify Key generation: selects a random integer x {private } publishes the public key, gx. Signing : signature by hashing as h = H(m). = hx. Verification: Given a signature and a public key gx, we verify that e(,g) = e(H(m),gx). Batch signature , has e(ni=1 , i,gi).
Testing
Testing is made by giving improper inputs, the errors occurred handled through exceptions. This system is also checked for errors like runtime errors and long run errors.
Screen shots
CONCLUSION Novel authentication scheme for vulnerability to packet loss. Deal with DoS attack. Data authentication
Future scope
To this batch signature, we are used the BLS cryptographic algorithm In future, the bit rate can be 1024 and be more securable.
Papers published
S.Santhi Priya and Dr. S.M. Afroz , Security Issues and Solutions in Multicast Environment through Tree based Scheme in Global Journal of Computer Science and Technology. S.Santhi Priya and Dr. S.M. Afroz, Implementing key Technologies in Multicast Environment through IP Multicast - International Journal of Advanced Research in Computer Science .
References
[1]. Yun Zhou, Xiaoyan Zhu, and Yuguang Fang , Multicast Athentication based on batch signature IEEE volume 9, 2010 [2]. Challal,Y.;Bettahar,H.;Bouabdallah,A. A taxonomy of multicast data origin authentication: Issues and solutions Communications Surveys & Tutorials, IEEE 2000. *3+.C.K. Wong and S.S. Lam, Digital Signatures for Flows and Multicasts, Proc. Sixth Intl Conf. Network Protocols (ICNP 98), pp. 198-209, Oct. 1998. [4]. Perrig,A.; Canetti,R.; Tygar,J.D.; Dawn Song; California Univ., Berkeley, CA Efficient authentication and signing of multicast streams over lossy channels Security and Privacy (SP), 2010 IEEE Symposium. [5]. Zhishou Zhang, Qibin Sun, Wai-Choong Wong A Proposal of butterfly graph based stream authentication over lossy networks 2005 IEEE. [6]. Stephen , E. Deering Multicast Routing in Internetworks and LANs Comm. ACM, vol. 21, no. 2, pp. 130-136, Feb. 1978.
Queries ?
THANK YOU