REPEATED USE OF CODES WHICH DETECT DECEPTION

被引:13
作者
FAK, V
机构
[1] Department of Electrical Engineering, Linköping University
关键词
D O I
10.1109/TIT.1979.1056011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A sender A wants to send N messages xi, i =1,…,N, chosen from a set containing M different possible messages, M >N, to a receiver B. Every xi has to pass through the hands of a dishonest messenger C. Therefore A and B agree on a mathematical transformation f and a secret parameter, or key k, that will be used to produce the authenticator yi=f(xi,k), which is sent together with xi. The key is chosen at random from a set of L elements. C knows f and can find all elements in the set G(xoyd= (k/f(xj,k)= yi) given enough time and computer resources. C wants to change xiinto x’ without B suspecting. This means that C must find the new authenticator y’ = (x‘, k). Since G(xi, yi) can be found for any (xi,yi), it is obvious that C will always succeed unless G(xi,yi) contains more than one element. Here it is proved that the average probability of success for C is minimized if (a) G(xi,yi) contains L(N-1)/N elements and (b) each new known pair (xjyj) will diminish this set of solutions by a factor of L-1/N. The minimum average probability will then be L -1/N. © 1979 IEEE
引用
收藏
页码:233 / 234
页数:2
相关论文
共 2 条
[1]   CODES WHICH DETECT DECEPTION [J].
GILBERT, EN ;
MACWILLIAMS, FJ ;
SLOANE, NJA .
BELL SYSTEM TECHNICAL JOURNAL, 1974, 53 (03) :405-424
[2]   TOWARD A THEORY OF UNKNOWN FUNCTIONS [J].
INGEMARSSON, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (02) :238-240