Advertisement

Authentication codes with perfect protection

  • L. Tombak
  • R. Safavi-Naini
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 718)

Abstract

In this paper we prove new results on authentication codes with perfect protection. We will prove that perfect protection for impersonation follows from perfect protection for substitution only if the source is uniform and derive a necessary and sufficient condition for codes that provide perfect protection for both types of attack. We prove a new lower bound on the probability of deception in substitution for codes with perfect protection and characterize the codes that satisfy the bound with equality.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    J.L. Massey, Cryptography, a selective survey, Digital Communications, ed. E. Biglieri and G. Pratti, Elsvier Science Publ., North-Holland, (1986), 3–25.Google Scholar
  2. 2.
    D.R. Stinson, Some constructions and bounds for authentication codes, Journal Cryptology 1, (1988), 37–51Google Scholar
  3. 3.
    D.R. Stinson, The combinatorics of authentication and secrecy codes, Journal Cryptology 2, (1990), 23–49Google Scholar
  4. 4.
    D.R. Stinson, Combinatorial characterization of authentication codes, Proceedings Crypto 91, Lecture Notes in Computer Science 576, (1992), 62–72Google Scholar
  5. 5.
    G.J. Simmons, Message authentication: a game on gypergraphs, Congressus Numerantium 45, (1984), 161–192Google Scholar
  6. 6.
    G.J. Simmons, Authentication theory/coding Theory, Proc. of Crypto '84, Lect. Notes in Comp. Science 196, (1985), 411–432Google Scholar
  7. 7.
    G.J. Simmons, A game theory model of digital message authentication, Congressus Numerantium 34, (1982), 413–424Google Scholar
  8. 8.
    E. Brickell, A Few Results in Message Authentication, Congressus Numerantium 43, (1984), 141–154Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1993

Authors and Affiliations

  • L. Tombak
    • 1
  • R. Safavi-Naini
    • 1
  1. 1.Department of Computer ScienceUniversity of WollongongWollongongAustralia

Personalised recommendations