The MIIS Eprints Archive

Cryptographic techniques used to provide integrity of digital content in long-term storage

Magorzata, Bladoszewska and Tomasz, Brozek and Michal, Zajac and Lucyna, Cieslik and Maria, Donten-Bury and Kamil, Kulesza and John, Ockendon and Lukasz, Stettner and Piotr, Wojdyllo and Wladimir, Zubkov (2011) Cryptographic techniques used to provide integrity of digital content in long-term storage. [Study Group Report]



The main objective of the project was to obtain advanced mathematical methods to guarantee the verification that a required level of data integrity is maintained in long-term storage. The secondary objective was to provide methods for the evaluation of data loss and recovery. Additionally, we have provided the following initial constraints for the problem: a limitation of additional storage space, a minimal threshold for desired level of data integrity and a defined probability of a single-bit corruption.

With regard to the main objective, the study group focused on the exploration methods based on hash values. It has been indicated that in the case of tight constraints, suggested by PWPW, it is not possible to provide any method based only on the hash values. This observation stems from the fact that the high probability of bit corruption leads to unacceptably large number of broken hashes, which in turn stands in contradiction with the limitation for additional storage space.

However, having loosened the initial constraints to some extent, the study group has proposed two methods that use only the hash values. The first method, based on a simple scheme of data subdivision in disjoint subsets, has been provided as a benchmark for other methods discussed in this report. The second method ("hypercube" method), introduced as a type of the wider class of clever-subdivision methods, is built on the concept of rewriting data-stream into a n-dimensional hypercube and calculating hash values for some particular (overlapping) sections of the cube.

We have obtained interesting results by combining hash value methods with error-correction techniques. The proposed framework, based on the BCH codes, appears to have promising properties, hence further research in this field is strongly recommended.

As a part of the report we have also presented features of secret sharing methods for the benefit of novel distributed data-storage scenarios. We have provided an overview of some interesting aspects of secret sharing techniques and several examples of possible applications.

Item Type:Study Group Report
Problem Sectors:Information and communication technology
Study Groups:European Study Group with Industry > ESGI 77 (Warsaw, Poland, Sep 27-Oct 1, 2010)
Company Name:Polish Security Printing Works (PWPW)
ID Code:322
Deposited By: Dr Kamel Bentahar
Deposited On:31 May 2011 16:22
Last Modified:29 May 2015 19:56

Repository Staff Only: item control page