Abstract
We consider a cryptographic scenario where some center broadcasts a random binary string to Alice, Bob and Eve over binary symmetric channels with bit error probabilities εA, εB and εE respectively. Alice and Bob share no secret key initially, and their goal is to generate, after public discussion, a common information-theoretically secure key facing an active eavesdropper Eve. Under the condition εA<εE and εB<εE, code authentication (CA) can be used as part of a public discussion protocol to solve this problem. This authentication exploits parts of substrings received by Alice and Bob from the broadcasting center as authenticators to messages transmitted in a public discussion. Unfortunately, it happens to be ineffective because it produces a key of small length. We propose a hybrid authentication (HA) that combines both keyless code authentication and key authentication based on an almost strong universal class of hash functions. We prove a theorem that allows estimation of the performance evaluation of hybrid authentication. The selection algorithm for the main HA parameters, given security and reliability thresholds, is presented in detail.
Similar content being viewed by others
References
Bennett CH, Brassard G, Crepeau C, Maurer UM (1995) Generalized privacy amplification. IEEE Trans Inf Theory 41(6):1915–1923
Cover T, Thomas J (1991) Elements of information theory. Wiley, New York
Gemmel P, Naor M (1993) Codes for interactive authentication. In: Stinson DR (ed) Advances in cryptology: CRYPTO ’93. Lecture notes in computer science, vol 773. Springer, Berlin Heidelberg New York
Kløve V, Korjik V (1995) Error detecting codes: general theory and their application in feedback communication systems. Kluwer, Boston, Mass.
Korjik V, Bakin M (2000) Information-theoretically secure keyless authentication. In: IEEE international symposium on information theory, Sorrento, Italy, 25–30 June 2000
Korjik V, Morales-Luna G, Balakirsky V (2001) Privacy amplification theorem for noisy main channel. In: Davida GI, Frankel Y (eds) Information security. Lecture notes in computer science, vol 2200. Springer, Berlin Heidelberg New York
Maurer U (1997) Information-theoretically secure secret-key agreement by not authenticated public discussion. In: Fumy W (ed) Advances in cryptology: EUROCRYPT ’97. Lecture notes in computer science, vol 1233. Springer, Berlin Heidelberg New York
Maurer U, Wolf S (1997) Privacy amplification secure against active adversaries. In: Kaliski BS Jr. (ed) Advances in cryptology: CRYPTO ’97. Lecture notes in computer science, vol 1294. Springer, Berlin Heidelberg New York
Peterson W, Weldon E (1972) Error-correcting codes. MIT Press, Cambridge, Mass.
Stinson DR (1991) Universal hashing and authentication codes. In: Feigenbaum J (ed) Advances in cryptology: CRYPTO ’91. Lecture notes in computer science, vol 576. Springer, Berlin Heidelberg New York
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Korzhik , V., Morales-Luna , G. Hybrid authentication based on noisy channels . IJIS 1, 203–210 (2003). https://doi.org/10.1007/s10207-002-0017-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-002-0017-x