scispace - formally typeset
Topic

Data Authentication Algorithm

About: Data Authentication Algorithm is a(n) research topic. Over the lifetime, 4593 publication(s) have been published within this topic receiving 87271 citation(s). The topic is also known as: DAA.
Papers
More filters

Journal ArticleDOI
Leslie Lamport1
TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Abstract: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a microcomputer in the user's terminal.

2,740 citations


Book ChapterDOI
Mihir Bellare1, Phillip Rogaway1
22 Aug 1993-
TL;DR: This work provides the first formal treatment of entity authentication and authenticated key distribution appropriate to the distributed environment and presents a definition, protocol, and proof that the protocol meets its goal, assuming only the existence of a pseudorandom function.
Abstract: We provide the first formal treatment of entity authentication and authenticated key distribution appropriate to the distributed environment. Addressed in detail are the problems of mutual authentication and authenticated key exchange for the symmetric, two-party setting. For each we present a definition, protocol, and proof that the protocol meets its goal, assuming only the existence of a pseudorandom function.

1,855 citations


Journal ArticleDOI
TL;DR: The authors concentrate on authentication for real-time, interactive services that are offered on computer networks, which includes remote login, file system reads and writes, and information retrieval for applications like Mosaic.
Abstract: When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it to falsely claim another's identity. Kerberos is the most commonly used example of this type of authentication technology. The authors concentrate on authentication for real-time, interactive services that are offered on computer networks. They use the term real-time loosely to mean that a client process is waiting for a response to a query or command so that it can display the results to the user, or otherwise continue performing its intended function. This class of services includes remote login, file system reads and writes, and information retrieval for applications like Mosaic. >

1,500 citations


01 Jan 2002-
TL;DR: The TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol is presented, an efficient protocol with low communication and computation overhead, which scales to large numbers of receivers, and tolerates packet loss.
Abstract: One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route. This problem is complicated by mutually untrusted receivers and unreliable communication environments where the sender does not retransmit lost packets. This article presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol, an efficient protocol with low communication and computation overhead, which scales to large numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Despite using purely symmetric cryptographic functions (MAC functions), TESLA achieves asymmetric properties. We discuss a PKI application based purely on TESLA, assuming that all network nodes are loosely time synchronized.

936 citations


01 Aug 1995-
TL;DR: This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6, and obsoletes RFC 2402 (November 1998).
Abstract: This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6. This document obsoletes RFC 2402 (November 1998). [STANDARDS-TRACK]

920 citations


Network Information
Related Topics (5)
Authentication protocol

13.2K papers, 250.1K citations

88% related
Authentication

74.7K papers, 867.1K citations

87% related
Message authentication code

5.9K papers, 134.2K citations

87% related
Cryptography

37.3K papers, 854.5K citations

86% related
Cryptographic protocol

11.7K papers, 268.8K citations

86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202112
202017
201925
201836
2017150
2016277

Top Attributes

Show by:

Topic's top 5 most impactful authors

Natasa Zivic

10 papers, 44 citations

Mrudula Sarvabhatla

8 papers, 57 citations

Kee-Young Yoo

8 papers, 172 citations

Robert H. Deng

6 papers, 260 citations

Muhammad Khurram Khan

6 papers, 157 citations