DocumentCode :
568512
Title :
Security Aspects of Soft Verified Messages Protected by Message Authentication Codes
Author :
Zivic, N.
Author_Institution :
Univ. of Siegen, Siegen, Germany
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
1316
Lastpage :
1322
Abstract :
The subject of this paper is the security analysis of soft verification. Soft verification is used, when messages protected by Message Authentication Codes (MAC) are transmitted over the noisy channel without Automatic Re-peat Request (ARQ) protocol. This situation is given with the secure real-time, satellite or broadband communication. Forward Error Correction (FEC) Codes are able to correct many errors, but not all of them. These remaining errors disable a successful authentication of messages protected by MACs. Many applications, multimedia or biometric for example, would accept messages with a few or local errors. Therefore, an authentication method is requested, which accepts messages as authentic, although they would be rejected by the standard verification. Such a method is supported by soft authentication. Two groups of soft authentication algorithms will be described: algorithms, which generate error tolerant MACs, whose security aspects were already published, and an soft verification, based on soft decision decoding, whose security aspects have not yet been published. The security level of soft verified messages is reduced. The risk of forgery and security loss will be calculated. Formulas will be presented for the extension of the lengths of MACs to compensate for the reduction of the security level. Results show remarkable coding gains. Many more messages can be accepted as authentic by soft verification at the same security level compared to standard verification without soft verification.
Keywords :
channel coding; cryptography; decoding; forward error correction; message authentication; telecommunication security; FEC codes; MAC protection; broadband communication security; coding gains; forgery risk; forward error correction; local errors; message authentication codes; noisy channel; real-time communication security; satellite communication security; security analysis; security aspects; security loss risk; soft authentication algorithm; soft decision decoding; soft verification; soft verified messages; Authentication; Decoding; Forgery; Message authentication; Reliability; Standards; Complexity; Forgery Attacks; Fuzzy Authentication; Message Authentication Codes; Security; Soft Output; Soft Verification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.257
Filename :
6296132
Link To Document :
بازگشت