Data Authentication Algorithms


Al Shareeda S. Y. A.

in: Authentication Technologies for Cloud Technology, IoT, and Big Data, Yasser M. Alginahi,Muhammad Nomani Kabir, Editor, IET, London, pp.37-65, 2019

  • Publication Type: Book Chapter / Chapter Research Book
  • Publication Date: 2019
  • Publisher: IET
  • City: London
  • Page Numbers: pp.37-65
  • Editors: Yasser M. Alginahi,Muhammad Nomani Kabir, Editor
  • Istanbul Technical University Affiliated: No

Abstract

Data authentication algorithms represent the baseline for building advanced authentication protocols. In cloud computing, IoT, and big data, data authentication algorithms play a vital role in securing the transmitted, stored, and exchanged data and information. These basic and advanced algorithms are categorized into four main types. Passwords and hash functions represent the simplest authentication schemes. Hash functions are used in the more complex constructions of authentication algorithms such as MACs and digital signatures. The choice of the underlined mathematical building blocks, such as ECs, contributed to improving authentication algorithms; nowadays, we have algorithms with efficient computation performance and shorter cryptographic keys. Besides the cryptographic realm of authentication, biometric and steganography schemes have been used as other authentication algorithms where the features of the user are the keys to authenticate them into the system. Below, we summarize the lessons learned and list future trends in this area of research.