{"title":"Data authentication algorithms","authors":"S. Al-Shareeda","doi":"10.1049/PBSE009E_CH3","DOIUrl":null,"url":null,"abstract":"Data authentication algorithms represent the baseline on which advanced authentication protocols can be built. In the realm of cloud computing, IoT, and big data, data authentication algorithms play a vital role to secure the transmitted, stored, and exchanged data and information. These basic and advanced algorithms are categorized into four main types. Passwords and hash functions represent the simplest authentication schemes. Hash functions are used into the more complex constructions of authentication algorithms such as MACs and digital signatures. The choice of the underlined mathematical building blocks, such as ECs, contributed to the improvement of authentication algorithms; nowadays, we have algorithms with efficient computation performance and shorter cryptographic keys. Besides the cryptographic realm of authentication, biometric and steganography schemes have been used as other means of authentication algorithms where the featured of the user are the keys to authenticate him/her into the system. Below, we summarize the overall learned lessons and list some future trends in this area of research.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"177 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Authentication Technologies for Cloud Computing, IoT and Big Data","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/PBSE009E_CH3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Data authentication algorithms represent the baseline on which advanced authentication protocols can be built. In the realm of cloud computing, IoT, and big data, data authentication algorithms play a vital role to secure the transmitted, stored, and exchanged data and information. These basic and advanced algorithms are categorized into four main types. Passwords and hash functions represent the simplest authentication schemes. Hash functions are used into the more complex constructions of authentication algorithms such as MACs and digital signatures. The choice of the underlined mathematical building blocks, such as ECs, contributed to the improvement of authentication algorithms; nowadays, we have algorithms with efficient computation performance and shorter cryptographic keys. Besides the cryptographic realm of authentication, biometric and steganography schemes have been used as other means of authentication algorithms where the featured of the user are the keys to authenticate him/her into the system. Below, we summarize the overall learned lessons and list some future trends in this area of research.