On the cardinality of systematic authentication codes via error-correcting codes

被引:27
|
作者
Kabatianskii, GA [1 ]
Smeets, B [1 ]
Johansson, T [1 ]
机构
[1] LUND UNIV, DEPT INFORMAT THEORY, S-22100 LUND, SWEDEN
基金
瑞典研究理事会;
关键词
authentication codes; error-correcting codes; universal hash functions; information integrity;
D O I
10.1109/18.485725
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In both open and private communication the participants face potential threats from a malicious enemy who has access to the communication channel and can insert messages (impersonation attack) or alter already transmitted messages (substitution attack), Authentication codes (A-codes) have been developed to provide protection against these treats. In this paper we introduce a new distance, called the authentication distance (A-distance), and show that an A-code can be described as a code for the A-distance, The A-distance is directly related to the probability P-S of success in a substitution attack, We show how to transform an error-correcting code into an A-code and vice versa, We further use these transformations to provide both upper and lower bounds on the size of the information to be authenticated, and study their asymptotic behavior, As examples of obtained results, we prove that the cardinality of the source state space grows exponentially with the number of keys provided P-S > P-I, we generalize the square-root bound given by Gilbert, MacWilliams, and Sloane in 1979, and we provide very efficient constructions using concatenated Reed-Solomon codes.
引用
收藏
页码:566 / 578
页数:13
相关论文
共 50 条
  • [31] A note on the decoding complexity of error-correcting codes
    Gronemeier, Andre
    INFORMATION PROCESSING LETTERS, 2006, 100 (03) : 116 - 119
  • [32] On error-correcting fingerprinting codes for use with watermarking
    Hans Georg Schaathun
    Multimedia Systems, 2008, 13 : 331 - 344
  • [33] A Library for Formalization of Linear Error-Correcting Codes
    Affeldt, Reynald
    Garrigue, Jacques
    Saikawa, Takafumi
    JOURNAL OF AUTOMATED REASONING, 2020, 64 (06) : 1123 - 1164
  • [34] Introduction to Quantum Deletion Error-Correcting Codes
    Hagiwara, Manabu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2025, E108A (03) : 363 - 375
  • [35] Influences of some families of error-correcting codes
    Egan, Hailey
    Legrow, Jason T.
    Matthews, Gretchen L.
    Suliga, Jeff
    INVOLVE, A JOURNAL OF MATHEMATICS, 2025, 18 (02):
  • [36] Message authentication codes with error correcting capabilities
    Lam, CCY
    Gong, G
    Vanstone, SA
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 354 - 366
  • [37] Linear covering codes and error-correcting codes for limited-magnitude errors
    Torleiv Kløve
    Moshe Schwartz
    Designs, Codes and Cryptography, 2014, 73 : 329 - 354
  • [38] Linear covering codes and error-correcting codes for limited-magnitude errors
    Klove, Torleiv
    Schwartz, Moshe
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (02) : 329 - 354
  • [39] Binary Error-Correcting Codes with Minimal Noiseless Feedback
    Gupta, Meghal
    Guruswami, Venkatesan
    Zhang, Rachel Yun
    PROCEEDINGS OF THE 55TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2023, 2023, : 1475 - 1487
  • [40] Recent results on ring constructions for error-correcting codes
    Alfaro, R
    Kelarev, A
    ALGEBRAIC STRUCTURES AND THEIR REPRESENTATIONS, 2005, 376 : 1 - 12