共 2 条
REPEATED USE OF CODES WHICH DETECT DECEPTION
被引:13
作者:
FAK, V
机构:
[1] Department of Electrical Engineering, Linköping University
关键词:
D O I:
10.1109/TIT.1979.1056011
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
A sender A wants to send N messages xi, i =1,…,N, chosen from a set containing M different possible messages, M >N, to a receiver B. Every xi has to pass through the hands of a dishonest messenger C. Therefore A and B agree on a mathematical transformation f and a secret parameter, or key k, that will be used to produce the authenticator yi=f(xi,k), which is sent together with xi. The key is chosen at random from a set of L elements. C knows f and can find all elements in the set G(xoyd= (k/f(xj,k)= yi) given enough time and computer resources. C wants to change xiinto x’ without B suspecting. This means that C must find the new authenticator y’ = (x‘, k). Since G(xi, yi) can be found for any (xi,yi), it is obvious that C will always succeed unless G(xi,yi) contains more than one element. Here it is proved that the average probability of success for C is minimized if (a) G(xi,yi) contains L(N-1)/N elements and (b) each new known pair (xjyj) will diminish this set of solutions by a factor of L-1/N. The minimum average probability will then be L -1/N. © 1979 IEEE
引用
收藏
页码:233 / 234
页数:2
相关论文