Abstract
Performance of authentication codes under impersonation attack is considered. We assume two classes of strategies for the enemy and give expressions for the probability of success in each case and study the relationship of the two classes. We prove a new lower bound on the probability of deception which points out the importance of the average-distance between the encoding rules of the code in the protection provided by it. Codes with perfect protection for each class are characterized and some constructions based on error correcting codes are proposed.
Support for this work was provided in part by Australian Research Council grant A49030136.
Support for this work was provided by Australian Research Council grant A49030136.
Preview
Unable to display preview. Download preview PDF.
We’re sorry, something doesn't seem to be working properly.
Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.
References
J.L. Massey, Cryptography, a selective survey, Digital Communications, ed. E. Biglieri and G. Pratti, Elsvier Science Publ., North-Holland, (1986), 3–25.
G.J. Simmons, Authentication theory/coding Theory, Proc. of Crypto '84, Lect. Notes in Comp. Science 196, (1985), 411–432
G.J. Simmons, A game theory model of digital message authentication, Congressus Numerantium 34, (1982), 413–424
E.G. Gilbert, F.J. MacWilliams, N.J. Sloane, Codes which Detect Deception, Bell Sys. Tech. J., 53–3, (1974), 1–19
F.J. MacWilliams and N.J. Sloane, The Theory of Error-Correcting Codes, North-Holland Publishing Company, 1978
M. De Soete, Some constructions for authentication-secrecy codes, Advances in Cryptology, Eurocrypt '88, (1988), 51–55
E.F. Brickell, A few results on Message Authentication, Proc. of the 15th Southeastern Conf. on Combinatorics, Graph Theory and Computing, Boca raton LA, (1984), 141–145
D.R. Stinson, Combinatorial characterization of authentication codes, Proceedings Crypto 91, Lecture Notes in Computer Science 576, (1992), 62–72
D.R. Stinson, The combinatorics of authentication and secrecy codes, Journal Cryptology 2, (1990), 23–49
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Safavi-Naini, R., Tombak, L. (1993). Authentication codes under impersonation attack. In: Seberry, J., Zheng, Y. (eds) Advances in Cryptology — AUSCRYPT '92. AUSCRYPT 1992. Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57220-1_50
Download citation
DOI: https://doi.org/10.1007/3-540-57220-1_50
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57220-6
Online ISBN: 978-3-540-47976-5
eBook Packages: Springer Book Archive