Skip to main content
Log in

Hybrid authentication based on noisy channels

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

We consider a cryptographic scenario where some center broadcasts a random binary string to Alice, Bob and Eve over binary symmetric channels with bit error probabilities εA, εB and εE respectively. Alice and Bob share no secret key initially, and their goal is to generate, after public discussion, a common information-theoretically secure key facing an active eavesdropper Eve. Under the condition εAE and εBE, code authentication (CA) can be used as part of a public discussion protocol to solve this problem. This authentication exploits parts of substrings received by Alice and Bob from the broadcasting center as authenticators to messages transmitted in a public discussion. Unfortunately, it happens to be ineffective because it produces a key of small length. We propose a hybrid authentication (HA) that combines both keyless code authentication and key authentication based on an almost strong universal class of hash functions. We prove a theorem that allows estimation of the performance evaluation of hybrid authentication. The selection algorithm for the main HA parameters, given security and reliability thresholds, is presented in detail.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bennett CH, Brassard G, Crepeau C, Maurer UM (1995) Generalized privacy amplification. IEEE Trans Inf Theory 41(6):1915–1923

  2. Cover T, Thomas J (1991) Elements of information theory. Wiley, New York

  3. Gemmel P, Naor M (1993) Codes for interactive authentication. In: Stinson DR (ed) Advances in cryptology: CRYPTO ’93. Lecture notes in computer science, vol 773. Springer, Berlin Heidelberg New York

  4. Kløve V, Korjik V (1995) Error detecting codes: general theory and their application in feedback communication systems. Kluwer, Boston, Mass.

  5. Korjik V, Bakin M (2000) Information-theoretically secure keyless authentication. In: IEEE international symposium on information theory, Sorrento, Italy, 25–30 June 2000

  6. Korjik V, Morales-Luna G, Balakirsky V (2001) Privacy amplification theorem for noisy main channel. In: Davida GI, Frankel Y (eds) Information security. Lecture notes in computer science, vol 2200. Springer, Berlin Heidelberg New York

  7. Maurer U (1997) Information-theoretically secure secret-key agreement by not authenticated public discussion. In: Fumy W (ed) Advances in cryptology: EUROCRYPT ’97. Lecture notes in computer science, vol 1233. Springer, Berlin Heidelberg New York

  8. Maurer U, Wolf S (1997) Privacy amplification secure against active adversaries. In: Kaliski BS Jr. (ed) Advances in cryptology: CRYPTO ’97. Lecture notes in computer science, vol 1294. Springer, Berlin Heidelberg New York

  9. Peterson W, Weldon E (1972) Error-correcting codes. MIT Press, Cambridge, Mass.

  10. Stinson DR (1991) Universal hashing and authentication codes. In: Feigenbaum J (ed) Advances in cryptology: CRYPTO ’91. Lecture notes in computer science, vol 576. Springer, Berlin Heidelberg New York

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Korzhik , V., Morales-Luna , G. Hybrid authentication based on noisy channels . IJIS 1, 203–210 (2003). https://doi.org/10.1007/s10207-002-0017-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-002-0017-x

Keywords

Navigation