International Journal of Engineering Trends and Technology- Volume3Issue3- 2012 EFFICIENT SIGNATURE SCHEMES BASED ON MABS (MULTICAST AUTHNETCATION BASED ON BATCH SIGNATURE) S.Backyalakshmi 1 Dr.V.PalanisamyMCA., M.Tech.,P.hd 2 M.Phil Scholar Head of the department, Associate professor Dept of computer science &engg Dept of computer science &engg Alagappa University Alagappa University Karaikudi-630 003 Karaikudi-630 003 primitive called the batch signature, it ABSTRACT: In Traditional Multicast is an provides efficient latency, computation and internet work service that provides efficient communication delivery of data from a source to multiple signature scheme called MABS-E combines receivers. the basic scheme MABS-B and a packet It requirements reduces the the network of bandwidth and the filtering mechanism computational overhead of the host devices. injection. Digital Key words: signature provides authenticity, overhead. to An tolerate Authentication, Signature. of applications in everywhere computing 1. INTRODUCTION Existing digital signature schemes are computationally expensive; the ideal approach of signing and verifying each packet independently raises a serious challenge to resource constrained devices. In order to reduce computation overhead, conventional schemes use efficient signature algorithms and are vulnerable to packet injection by malicious Here, MABS can achieve perfect resilience to packet loss in lossy channels in the sense that no matter how many packets are lost, the already received packets can still be authenticated by receivers. Basic scheme MABS-B reduces the packet loss by eliminating the relationship between packets, and due to its efficient cryptographic ISSN: 2231-5381 packet Multicast, integrity and non-repudiation to many kinds environment. enhanced Multicast [1] is an efficient method to deliver multimedia content from a sender to a group of receivers and is gaining popular applications such as real time stock quotes, interactive games, video conference, live video broadcast, or video on demand. Authentication is the act of confirming the truth of an attribute of a datum or authentication entity. Basically, may provide the multicast following security services, Data Integrity, Data origin authentication, Non repudiation. All the three services can be supported by an asymmetrickey technique called signature. In an ideal case, the sender generates a signature for each packet with its private key, which is called signing, and each receiver checks the validity of the signature with http://www.internationaljournalssrg.org Page 334 International Journal of Engineering Trends and Technology- Volume3Issue3- 2012 the sender’s public key, which is called 1. Our MABS can achieve perfect resilience to verifying. If the verification succeeds, the packetloss in lossy channels in the sense that no receiver knows the packet is authentic. matterhow many packets are lost the already- Generally, there are following issues in real world challenging the design. First, received packets can still be authenticated by receivers. efficiency needs to beconsidered, especially for 2. MABS-B is efficient in terms of less receivers. Second, packet loss is inevitable. In latency,computation, the Internet, congestion at routers is a major overhead. ThoughMABS-E is less efficient than reason causing packet loss. Though TCP MABS-B since itincludes the DoS defense. provides retransmissioncapability, 3. We propose two new batch signature schemes multicast content is mainly transmitted over basedon BLS and DSA and show they are UDP, which does not provide any loss recovery moreefficient than the batch RSA [5] signature support. In mobile environments, the situation is scheme. a certain and communication even worse. Recently, we demonstrated that batch signature schemes can be used to improve 2. RELATED WORK the performance of broadcast authentication [2], Efficiency and packet loss resilience [3]. In this paper, we present ourcomprehensive can hardly be supported simultaneously by study on this approach and propose a novel conventional multicast schemes. As is well multicast authentication protocol called MABS known that existing digital signature algorithms (in short forMulticast Authentication based on are Batch Signature). MABSincludes two schemes. approach of signing and verifying each packet The basic scheme (called MABS-Bhereafter) independently raises a serious challenge to utilizes asymmetric resource-constrained devices. Another problem cryptographicprimitive called batch signature with schemes in is that they are vulnerable to [5], [6], [7], which supports theauthentication of packet injection by malicious attackers. an efficient any number of packets simultaneouslywith one signature verification, to An attacker expensive, may the ideal compromise a the multicast system by intentionally injecting efficiencyand packet loss problems in general forged packets to consume receivers’ resource, environments. scheme (called leading to Denial of Service (DoS). Compared MABS-E hereafter) combinesMABS-B with with the efficiency requirement and packet loss packet filtering to alleviate the DoS impactin problems, the DoS attack is not common, but it hostile environments. MABS provides data is still important in hostile environments [3]. integrity, and Schemes in that follow the ideal approach of nonrepudiation as previous asymmetric key signing and verifying each packet individually, based but reduce the computation overhead at the Theenhanced origin protocols. address computationally authentication, In addition, thefollowing contributions: we make sender by using one-time signatures or k-time signatures. They are suitable for RSA which is ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 335 International Journal of Engineering Trends and Technology- Volume3Issue3- 2012 expensive on signing while cheap on verifying. wireless networks. The correlation among For each packet, however, each receiver needs to packets can incur additional latency. Consider perform one more verification on its one-time or the high layer application needs new data from k-time signature plus one ordinary signature the low layer authentication module in order to verification. sender a smooth video stream possible that the packets buffered at the low layer authentication Graph chaining was studied in which, a module are not verifiable because the correlated multicast stream is divided into blocks and each packets, especially the block signatures, have not block is associated with a signature. In each been received to the client user. It is desirable block, the hash of each packet is embedded into that the lower layer authentication module several other packets in a deterministic or delivers authenticated packets to the high layer probabilistic way. The hashes form a graph, in application at the time when the high layer which each path links a packet to the block application needs new data. signature. Each receiver verifies the block In the per-packet signature design it is signature and authenticates all the packets through the paths in the graph. In this paper, we not a problem, since each packet can be independently verifiable at any time. In view of focus on the signature approach. the problems regarding the sender-favored blockbased approach, we conceive a receiver-oriented 3. PROPOSED WORK approach by taking into account the Our target is to authenticate multicast heterogeneity of the receivers. In order to fulfill streams from a sender to multiple receivers. the requirement, the basic scheme MABS-B uses Generally, the sender is a powerful multicast an efficient cryptographic primitive called batch server managed by a central authority and can be signature trustful. The sender signs each packet with a verifying the signatures of any number of signature and transmits it to multiple receivers packets it can input them into an algorithm. through a multicast routing which supports simultaneously protocol. Authenticating a multicast stream can be PROCEDURE achieved 1. Given a batch of packets that have been signed by signing and verifying each packet[4]. However, the per-packet signature by the sender, Batch Verify() outputs True. design high 2. Given a batch of packets including some computation cost they do reduce the computation unauthentic packets, the probability that Batch cost, but also introduce new problems. Verify() outputsTrue is very low. has been criticized for its The computation complexity of Batch The block design builds up correlation Verify()comes with the fact that there are some among packets and makes them vulnerable to additional cost on processing multiple packets. packet loss, which is inherent in the Internet and The merit of batch signature is that the batch size ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 336 International Journal of Engineering Trends and Technology- Volume3Issue3- 2012 is chosen by each receiver, which can optimize proved in that when all the messages are distinct, its own batch size, so that the batch size will not batch RSA is resistant to signature forgery as be unmanageably large. In order to show the long as the underlying RSA algorithm is secure. merit of signature preaggregation, we implemented batch signature by using our Batch- 3.2. Merle tree BLS as an example. We present an enhanced scheme called MABS-E, which combines the basic scheme MABS-B uses per-packet signature instead of per-block signature and thus MABS-E and a packet filtering mechanism to tolerate packet injection. In particular, the eliminates the correlation among packets. The sender attaches each packet with a mark, which packet independency makes MABS-B perfect is unique to the packet and cannot be spoofed. resilient to packet loss. The Internet and wireless At each receiver, the multicast stream is channels tend to be lossy due to congestion or classified into disjoint sets based on mark. Merle channel instability, where packets can be lost tree used to generate marks the sender constructs according to different loss models, such as a binary tree for eight packets. Each leaf is a random loss or burst loss. In MABS-B, however, hash of one packet. Each internal node is the no matter how many packets are lost, the already hash value on the concatenation of its left and received packets can still be authenticated by right children. each receiver. constructed as the set of the siblings of the nodes For each packet, a mark is along the path from the packet to the root. 3.1 Batch RSA Signature 4. PERFORMANCE EVALUATION RSA is a very popular cryptographic algorithm in many security protocols. In order to use RSA, a sender chooses two large random primes P and Q to get N =PQ, and then calculates two exponents e,d∑* N such that ed = 1 mod ф(N), where ф (N) =(P -1)(Q -1). The sender publishes (e,N) as its public key and keeps d in secret as its private key. A signature of a message m can be generated as σ = (h (m)) d mod N, where h () is a collision-resistant hash function. The sender sends {m, σ} to a receiver that can verify the authenticity of the message m by checking σ e =h(m) mod N. Before the batch In this section, we evaluate MABS performance in terms of resilience to packet loss, efficiency, and DoS resilience. As we discussed before, MABS does not assume any particular underlying signature algorithm. This is also true for all theliterature multicast authentication schemes referenced in this paper. Therefore, all the discussions and evaluations of MABS and the literature works in Section 4.1 and Section 4.2are under the assumption that they are using the same underlying signature algorithm. The discussion of signature algorithms is in Section 4.3. verification, the receiver must ensure all the messages are distinct. Otherwise batch RSA is vulnerable to the forgery attack. ISSN: 2231-5381 It has been http://www.internationaljournalssrg.org Page 337 International Journal of Engineering Trends and Technology- Volume3Issue3- 2012 4.1 Resilience to Packet Loss Computational Overhead of Different Batch We use simulations to evaluate the resilience to Schemes packet loss. The metric here is the verification rate, i.e., the ratio of the number of authenticated packets to the number of received packets.We Schemes Sender (per packets) 1E 1E 2M compare MABS with some well-known loss tolerant schemesEMSS (AugChain) PiggyBack augmented chain tree chain (Tree) and SAIDA . These schemes are representatives of graph chaining, tree Batch RSA Batch BLS Batch DSA (E-modular Receiver(per packets) n 1 E+(2n-2)M 2 P+(2n-2)M 2 E+3n M exponentiation.M-modular multiplication.P-pairing.) Chaining, and erasure coding schemes and are widely used in performance evaluation in the literature. algorithm MD5 [9] and SHA-1 [10] and the 4.2 Efficiency We consider communication We also compare the length of two popular hash signature length of latency, computation, overhead for and efficiency evaluation under lossy channels and DoS channels. three signature algorithms in Table 2. Given the same security level as 1,024-bit RSA, BLS generates a 171-bit signature and DSA generates a 320-bit signature. It is clear that by 4.3 Comparisons of Signature Schemes using Schemes MD5 SHA-1 RSA BLS DSA We compare the computation overhead of three batch signature schemes in Table 1. RSA and BLS require one modular exponentiation at the sender and DSA requires two modular multiplications when r value is computed offline. Usually one c-bit modular exponentiationis equivalent to 1.5c modular multiplications over Length(bits) 128 160 1024 171 320 or BLS DSA, MABS can achieve more bandwidth efficiency than using RSA, and could be even more efficient than conventionalschemes using a large number of hashes. the same field. Moreover, a c-bit modular exponentiation in DLP is equivalent to ac/6bit 5. CONCLUSION modular exponentiation in BLSfor the same security level. Therefore, we can estimate thatthe computation overhead of one 1,024-bit RSA signing operation is roughly equivalent to that of 768 DSA signing operations (1,536 modular multiplications) and that of 6 BLS signing operations (each one is corresponding to255 modular multiplications). Table 1 ISSN: 2231-5381 While transmitting data in a network, existing system faces some problems like signature verification, congestion, computing block size, vulnerability to packet loss and lack of resilience to denial of service (DoS) attack. To overcome these problems related research papers have been studied. A novel authentication scheme called MABS isused in the proposed system. MABS will be a http://www.internationaljournalssrg.org Page 338 International Journal of Engineering Trends and Technology- Volume3Issue3- 2012 perfect solution to packet loss due to the can only be applied for text files. So a new and elimination of the correlation among packets and efficient can effectively deal with DoS attack. Moreover, Cryptography (ECC) which can also applied for the use of batch signature can achieve the other files like ppt,pdffiles,etc can be used. efficiency comparable with the conventional Finally, we further develop two new batch schemes. Finally, signature schemes based on BLS which are more further two new batch signature schemes based on BLS and DSA are algorithm called Elliptic Curve efficient than batch RSA signature scheme. developed which are more efficient than the batch RSA signature scheme. RSA algorithm 6. REFERENCES 1. S.E. Deering, “Multicast Routing in Internetworks and Extended LANs,” Proc. ACM SIGCOMM Symp. Comm. Architectures and Protocols, pp. 55-64, Aug. 1988 2. Y. Zhou and Y. Fang, “BABRA: Batch-Based Broadcast Authentication in Wireless Sensor Networks,” Proc. IEEE GLOBECOM, Nov. 2006. 3. Y. Zhou and Y. Fang, “Multimedia Broadcast Authentication Based on Batch Signature,” IEEE Comm. Magazine, vol. 45, no. 8, pp. 72-77, Aug. 2007. 4. P. Judge and M. Ammar, “Security Issues and Solutions in Mulicast Content Distribution: A Survey,” IEEE Network Magazine, vol. 17, no. 1, pp. 30-36, Jan./Feb. 2003. 5. R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978. 6. L. Harn, “Batch Verifying Multiple RSA Digital Signatures,” IEE Electronic Letters, vol. 34, no. 12, pp. 12191220, June 1998. 7. M. Bellare, J.A. Garay, and T. Rabin, “Fast Batch Verification for Modular Exponentiation and Digital Signatures,” Proc. Advances in Cryptology (EUROCRYPT ’98), pp. 236-250, May 1998 8. S. Even, O. Goldreich, and S. Micali, “On-Line/Offline Digital Signatures,” J. Cryptology, vol. 9, pp. 35-67, 1996. 9. R. Rivest, “The MD5 Message-Digest Algorithm,” RFC 1319, Apr. 1992. 10. D. Eastlake and P. Jones, “US Secure Hash Algorithm 1 (SHA1),” RFC 3174, Sept. 2001. BIOGRAPHY S.BACKYA LAKSHMI Ms.S.BACKYA LAKSHMI is a Research scholar in the Department of Computer Science and Engineering, Alagappa University, Karaikudi, Tamilnadu, India. She has received her M.Sc in Computer Science from Alagappa University,Karaikudi, Tamilnadu in the year of 2011. She has presented her work in International and National level conferences. Her areas ofresearch interests include network security. Dr.V.PALANISAMY Prof. Dr V.PALANISAMY is working as an Associate Professor in the Department of Computer Science and Engineering, Alagappa University, Karaikukdi, Tamilnadu. ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 339