Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 12

Batch Signature used in Multicast Authentication

Guide Details
Project guide: Mrs Amutha Batch members: P.Anitha R.Rajashree B.Saranya

Literature Survey
Authenticated Batch-signature for Multicasting P. Shrividhya and T. Aarthy, Dec 2010. Batch Verification and Finding Invalid Signatures in a Group Signature Scheme Kitae Kim, Ikkwon Yie, Seongan Lim, and Daehun Nyang, Mar 2010. Fast Batch Verification of Multiple Signatures Jung Hee Cheon, Jeong Hyun Yi, 2007. Multicast Authentication over Lossy Channels Zhou, Yun Fang, Yuguang, 2008. MABS: Multicast Authentication Based on Batch Signature Yun Zhou, Xiaoyan Zhu, Yuguang Fang, July 2010.

Abstract
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms.

The correlation among packets makes them vulnerable to packet loss, which is inherent in the Internet and wireless networks. Moreover, the lack of Denial of Service (DoS) resilience renders most of them vulnerable to packet injection in hostile environments.

Existing System
Efficiency and packet loss resilience can hardly be supported simultaneously by conventional multicast schemes. As is well known that existing digital signature algorithms are computationally expensive, the ideal approach of signing and verifying each packet independently raises a serious challenge to resourceconstrained devices

They are suitable for RSA which is expensive on signing while cheap on verifying. For each packet, however, each receiver needs to perform one more verification on its one-time or k-time signature plus one ordinary signature verification. Moreover, the length of onetime signature is too long (on the order of 1,000 bytes).

Drawbacks
1. Vulnerability to packet loss 2. Lack of resilence to denial of service (DoS)

Proposed System
We propose a novel multicast authentication protocol, namely MABS, including two schemes The basic scheme (MABS-B) eliminates the correlation among packets and thus provides the perfect resilience to packet loss, and it is also efficient in terms of latency, computation, and communication overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets, Simultaneously.

Advantages
1. Perfectly resilient to packet loss 2. Efficiency

Hardware Requirements
System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 256 Mb.

Software Requirements
Operating system : - Windows XP Front End : - Visual Studio 2005.

Coding Language : - JAVA Tool used : -Eclipse

You might also like