On the cardinality of systematic authentication codes via error-correcting codes

被引:27
|
作者
Kabatianskii, GA [1 ]
Smeets, B [1 ]
Johansson, T [1 ]
机构
[1] LUND UNIV, DEPT INFORMAT THEORY, S-22100 LUND, SWEDEN
基金
瑞典研究理事会;
关键词
authentication codes; error-correcting codes; universal hash functions; information integrity;
D O I
10.1109/18.485725
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In both open and private communication the participants face potential threats from a malicious enemy who has access to the communication channel and can insert messages (impersonation attack) or alter already transmitted messages (substitution attack), Authentication codes (A-codes) have been developed to provide protection against these treats. In this paper we introduce a new distance, called the authentication distance (A-distance), and show that an A-code can be described as a code for the A-distance, The A-distance is directly related to the probability P-S of success in a substitution attack, We show how to transform an error-correcting code into an A-code and vice versa, We further use these transformations to provide both upper and lower bounds on the size of the information to be authenticated, and study their asymptotic behavior, As examples of obtained results, we prove that the cardinality of the source state space grows exponentially with the number of keys provided P-S > P-I, we generalize the square-root bound given by Gilbert, MacWilliams, and Sloane in 1979, and we provide very efficient constructions using concatenated Reed-Solomon codes.
引用
收藏
页码:566 / 578
页数:13
相关论文
共 50 条
  • [1] Authenticated Error-Correcting Codes with Applications to Multicast Authentication
    Lysyanskaya, Anna
    Tamassia, Roberto
    Triandopoulos, Nikos
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (02)
  • [2] Systematic Error-Correcting Codes for Rank Modulation
    Zhou, Hongchao
    Schwartz, Moshe
    Jiang, Anxiao
    Bruck, Jehoshua
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (01) : 17 - 32
  • [3] RFID Authentication Protocols Based on Error-Correcting Codes: A Survey
    Noureddine Chikouche
    Foudil Cherif
    Pierre-Louis Cayrel
    Mohamed Benmohammed
    Wireless Personal Communications, 2017, 96 : 509 - 527
  • [4] RFID Authentication Protocols Based on Error-Correcting Codes: A Survey
    Chikouche, Noureddine
    Cherif, Foudil
    Cayrel, Pierre-Louis
    Benmohammed, Mohamed
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 509 - 527
  • [5] METACYCLIC ERROR-CORRECTING CODES
    SABIN, RE
    LOMONACO, SJ
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 1995, 6 (03) : 191 - 210
  • [6] Steganography and error-correcting codes
    Munuera, C.
    SIGNAL PROCESSING, 2007, 87 (06) : 1528 - 1533
  • [7] Error-correcting codes and genetics
    Battail, Gerard
    TRIPLEC-COMMUNICATION CAPITALISM & CRITIQUE, 2006, 4 (02): : 217 - 229
  • [8] On the trustworthiness of error-correcting codes
    Faldum, Andreas
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (12) : 4777 - 4784
  • [9] Error-correcting Codes in Communication Systems
    Almazrouei, Khawla
    Alnajjar, Khawla A.
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1 - 6
  • [10] Error-correcting codes and information in biology
    Battail, Gerard
    BIOSYSTEMS, 2019, 184