Data authentication algorithms

S. Al-Shareeda
{"title":"Data authentication algorithms","authors":"S. Al-Shareeda","doi":"10.1049/PBSE009E_CH3","DOIUrl":null,"url":null,"abstract":"Data authentication algorithms represent the baseline on which advanced authentication protocols can be built. In the realm of cloud computing, IoT, and big data, data authentication algorithms play a vital role to secure the transmitted, stored, and exchanged data and information. These basic and advanced algorithms are categorized into four main types. Passwords and hash functions represent the simplest authentication schemes. Hash functions are used into the more complex constructions of authentication algorithms such as MACs and digital signatures. The choice of the underlined mathematical building blocks, such as ECs, contributed to the improvement of authentication algorithms; nowadays, we have algorithms with efficient computation performance and shorter cryptographic keys. Besides the cryptographic realm of authentication, biometric and steganography schemes have been used as other means of authentication algorithms where the featured of the user are the keys to authenticate him/her into the system. Below, we summarize the overall learned lessons and list some future trends in this area of research.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"177 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Authentication Technologies for Cloud Computing, IoT and Big Data","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/PBSE009E_CH3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Data authentication algorithms represent the baseline on which advanced authentication protocols can be built. In the realm of cloud computing, IoT, and big data, data authentication algorithms play a vital role to secure the transmitted, stored, and exchanged data and information. These basic and advanced algorithms are categorized into four main types. Passwords and hash functions represent the simplest authentication schemes. Hash functions are used into the more complex constructions of authentication algorithms such as MACs and digital signatures. The choice of the underlined mathematical building blocks, such as ECs, contributed to the improvement of authentication algorithms; nowadays, we have algorithms with efficient computation performance and shorter cryptographic keys. Besides the cryptographic realm of authentication, biometric and steganography schemes have been used as other means of authentication algorithms where the featured of the user are the keys to authenticate him/her into the system. Below, we summarize the overall learned lessons and list some future trends in this area of research.
数据认证算法
数据身份验证算法是构建高级身份验证协议的基础。在云计算、物联网、大数据等领域,数据认证算法对数据和信息的传输、存储和交换的安全性起着至关重要的作用。这些基本的和高级的算法主要分为四种类型。密码和哈希函数代表最简单的身份验证方案。哈希函数用于更复杂的认证算法结构,如mac和数字签名。选择下划线的数学构建块,如ec,有助于改进认证算法;目前,我们已经有了计算效率高、密钥更短的算法。除了密码学领域的身份验证之外,生物识别和隐写方案已被用作其他身份验证算法的手段,其中用户的特征是验证他/她进入系统的关键。下面,我们总结了总的经验教训,并列出了这一研究领域的一些未来趋势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信