REPEATED USE OF CODES WHICH DETECT DECEPTION

被引:11
作者
FAK, V
机构
[1] Department of Electrical Engineering, Linköping University
关键词
D O I
10.1109/TIT.1979.1056011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A sender A wants to send N messages xi, i =1,…,N, chosen from a set containing M different possible messages, M >N, to a receiver B. Every xi has to pass through the hands of a dishonest messenger C. Therefore A and B agree on a mathematical transformation f and a secret parameter, or key k, that will be used to produce the authenticator yi=f(xi,k), which is sent together with xi. The key is chosen at random from a set of L elements. C knows f and can find all elements in the set G(xoyd= (k/f(xj,k)= yi) given enough time and computer resources. C wants to change xiinto x’ without B suspecting. This means that C must find the new authenticator y’ = (x‘, k). Since G(xi, yi) can be found for any (xi,yi), it is obvious that C will always succeed unless G(xi,yi) contains more than one element. Here it is proved that the average probability of success for C is minimized if (a) G(xi,yi) contains L(N-1)/N elements and (b) each new known pair (xjyj) will diminish this set of solutions by a factor of L-1/N. The minimum average probability will then be L -1/N. © 1979 IEEE
引用
收藏
页码:233 / 234
页数:2
相关论文
共 2 条
  • [1] CODES WHICH DETECT DECEPTION
    GILBERT, EN
    MACWILLIAMS, FJ
    SLOANE, NJA
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1974, 53 (03): : 405 - 424
  • [2] TOWARD A THEORY OF UNKNOWN FUNCTIONS
    INGEMARSSON, I
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (02) : 238 - 240