By Topic

Security Aspects of Soft Verified Messages Protected by Message Authentication Codes

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Zivic, N. ; Univ. of Siegen, Siegen, Germany

The subject of this paper is the security analysis of soft verification. Soft verification is used, when messages protected by Message Authentication Codes (MAC) are transmitted over the noisy channel without Automatic Re-peat Request (ARQ) protocol. This situation is given with the secure real-time, satellite or broadband communication. Forward Error Correction (FEC) Codes are able to correct many errors, but not all of them. These remaining errors disable a successful authentication of messages protected by MACs. Many applications, multimedia or biometric for example, would accept messages with a few or local errors. Therefore, an authentication method is requested, which accepts messages as authentic, although they would be rejected by the standard verification. Such a method is supported by soft authentication. Two groups of soft authentication algorithms will be described: algorithms, which generate error tolerant MACs, whose security aspects were already published, and an soft verification, based on soft decision decoding, whose security aspects have not yet been published. The security level of soft verified messages is reduced. The risk of forgery and security loss will be calculated. Formulas will be presented for the extension of the lengths of MACs to compensate for the reduction of the security level. Results show remarkable coding gains. Many more messages can be accepted as authentic by soft verification at the same security level compared to standard verification without soft verification.

Published in:

Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on

Date of Conference:

25-27 June 2012