International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Stream Authentication Using Trapdoor Hash Function

Dodla Padmaja, P. Srilatha

Web based services engage distribution of contents like digital audio, video, games, software, stock quotes, Streaming presentations and live news feeds throughout distributed networking technologies, like Content Distribution Networks (CDNs), multicast networks, and peer-to-peer networks. We guard delay sensitive streams against malicious attacks, auditing mechanisms and security mechanisms need to be designed to efficiently process long sequence of bits. We have proposed a novel signature amortization technique based on trapdoor hash functions for authenticating each and every individual data blocks in the stream. Our technique affords for each and every intermediate blocks in the stream we want to stay away from the transmission loss and we will afford constant memory requirements for sender as well as receiver and we want to authenticate and verify the stream to keep away from unauthenticated user and to avoid malicious content.

Keywords: Stream authentication, cryptography, content distribution network, trap door functions

Edition: Volume 3 Issue 9, September 2014

Pages: 1292 - 1295


How to Cite this Article?

Dodla Padmaja, P. Srilatha, "Stream Authentication Using Trapdoor Hash Function", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14343, Volume 3 Issue 9, September 2014, 1292 - 1295

30 PDF Views | 28 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1720 - 1723

Text Steganography using Helping Verbs

Rahul Sanwal, Rishabh Jain

Share this article



Similar Articles with Keyword 'content distribution network'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1292 - 1295

Stream Authentication Using Trapdoor Hash Function

Dodla Padmaja, P. Srilatha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 710 - 714

A Novel Approach Where Cloud Computing Meets Content Delivery Network

Shipra Goswami

Share this article
Top