Performance evaluation of keyless authentication based on noisy channel

被引:12
作者
Korzhik, Valery [1 ]
Yakovlev, Viktor [1 ]
Morales-Luna, Guillermo [2 ]
Chesnokov, Roman [1 ]
机构
[1] State Univ Telecommun, St Petersburg, Russia
[2] CINVESTAV, Dept Comp Sci, Mexico City, DF, Mexico
来源
COMPUTER NETWORK SECURITY, PROCEEDINGS | 2007年 / 1卷
关键词
authentication; Bhattacharyya distance; error correcting codes; wiretap channels;
D O I
10.1007/978-3-540-73986-9_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a cryptographic scenario of two honest parties which share no secret key initially, but their final goal is to generate an information-theoretical secure key. In order to reach this goal they use assistance of some trusted center (as a satellite) that broadcasts a random string to legal users over noisy channels. An eavesdropper is able to receive also this string over another noisy channel. After an execution of the initialization phase, legal parties use discussion over noiseless public channels existing between them. The eavesdropper can intervene in the transmission and change the messages transmitted by legal parties. Thus, it is necessary to provide authentication of these messages. Otherwise the legal parties may agree a false key with the eavesdropper instead. In this paper we develop a concept of authentication based on noisy channels and present a performance evaluation of authentication procedures both for non-asymptotic and asymptotic cases.
引用
收藏
页码:115 / +
页数:2
相关论文
共 9 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
[Anonymous], 2001, Probability, Random Variables, and Stochastic Processes
[3]   DIVERGENCE AND BHATTACHARYYA DISTANCE MEASURES IN SIGNAL SELECTION [J].
KAILATH, T .
IEEE TRANSACTIONS ON COMMUNICATION TECHNOLOGY, 1967, CO15 (01) :52-&
[4]  
Mac Williams F., 1977, THEORY ERROR CORRECT
[5]  
MAURER UM, 1997, LECT NOTES COMPUTER, V1233, P209
[6]  
Peterson W. W., 1972, ERROR CORRECTING COD
[7]  
Pless V., 1998, HDB CODING THEORY
[8]  
Proakis J. G., 2001, DIGITAL COMMUNICATIO
[9]  
YAKOVLEV V, 2007, UNPUB IEEE T INFORM