B. Groza, D. Petrica, Simona Barbu, Mariana Bilanin
{"title":"Implementation of an Authentication Protocol for Sending Audio-Video Information in Java","authors":"B. Groza, D. Petrica, Simona Barbu, Mariana Bilanin","doi":"10.1109/SACI.2007.375517","DOIUrl":null,"url":null,"abstract":"An application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java media framework to send audio and video information over RTP (real-time transport protocol). In order to guarantee that information is not altered during transmission over public networks by malicious adversaries some cryptographic functions and protocols are used for achieving information authenticity. More concrete, a cryptographic protocol which uses message authentication codes and elements of a one-way chain as keys is implemented. The solution proves to be efficient and the computational costs are kept to a minimum.","PeriodicalId":138224,"journal":{"name":"2007 4th International Symposium on Applied Computational Intelligence and Informatics","volume":"188 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 4th International Symposium on Applied Computational Intelligence and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SACI.2007.375517","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
An application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java media framework to send audio and video information over RTP (real-time transport protocol). In order to guarantee that information is not altered during transmission over public networks by malicious adversaries some cryptographic functions and protocols are used for achieving information authenticity. More concrete, a cryptographic protocol which uses message authentication codes and elements of a one-way chain as keys is implemented. The solution proves to be efficient and the computational costs are kept to a minimum.