DocumentCode :
2092224
Title :
Coding theorems for secret-key authentication systems
Author :
Koga, Hiroki ; Yamamoto, Hirosuke
Author_Institution :
Dept. of Math. Eng. & Inf. Phys., Tokyo Univ., Japan
fYear :
1998
fDate :
22-26 Jun 1998
Firstpage :
150
Lastpage :
151
Abstract :
This paper provides Shannon theoretic coding theorems on the impersonation attack and the substitution attack against authentication systems constructed by secret key cryptography. Though several lower bounds on the success probability of the impersonation attack and the substitution attack have been developed, their upper bounds are rarely discussed. This paper treats an extended authentication system including blocklength K and permits the decoding error probability tending to zero as K→∞. It is shown that 2-KI(W:E) is the smallest attainable upper bound of the success probability of the impersonation attack, where I(W;E) denotes the mutual information between cryptogram W and key E. A relationship between the success probability of the substitution attack and H(E|W) is also characterized, where H(E|W) denotes the conditional entropy of E given W
Keywords :
cryptography; decoding; encoding; entropy; error statistics; message authentication; probability; Shannon theory; coding theorems; conditional entropy; decoding error probability; impersonation attack; mutual information; secret key cryptography; secret-key authentication systems; substitution attack; success probability; upper bound; Authentication; Codes; Cryptography; Decoding; Entropy; Error probability; Physics; Probability distribution; Random variables; Upper bound;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory Workshop, 1998
Conference_Location :
Killarney
Print_ISBN :
0-7803-4408-1
Type :
conf
DOI :
10.1109/ITW.1998.706487
Filename :
706487
Link To Document :
بازگشت