• DocumentCode
    761623
  • Title

    On the cardinality of systematic authentication codes via error-correcting codes

  • Author

    Kabatianskii, Gregory A. ; Smeets, Ben ; Johansson, Thomas

  • Author_Institution
    Inst. of Inf. Transmission Problems, Acad. of Sci., Moscow, Russia
  • Volume
    42
  • Issue
    2
  • fYear
    1996
  • fDate
    3/1/1996 12:00:00 AM
  • Firstpage
    566
  • Lastpage
    578
  • Abstract
    In both open and private communication the participants face potential threats from a malicious enemy who has access to the communication channel and can insert messages (impersonation attack) or alter already transmitted messages (substitution attack). Authentication codes (A-codes) have been developed to provide protection against these threats. In this paper we introduce a new distance, called the authentication distance (A-distance), and show that an A-code can be described as a code for the A-distance. The A-distance is directly related to the probability PS of success in a substitution attack. We show how to transform an error-correcting code into an A-code and vice versa. We further use these transformations to provide both upper and lower bounds on the size of the information to be authenticated, and study their asymptotic behavior. As examples of obtained results, we prove that the cardinality of the source state space grows exponentially with the number of keys provided PS>PI, we generalize the square-root bound given by Gilbert, MacWilliams, and Sloane in 1979, and we provide very efficient constructions using concatenated Reed-Solomon codes
  • Keywords
    Reed-Solomon codes; concatenated codes; error correction codes; message authentication; probability; public key cryptography; A-codes; A-distance; asymptotic behavior; authentication distance; cardinality; communication channel; concatenated Reed-Solomon codes; error-correcting codes; impersonation attack; information integrity; lower bounds; open communication; private communication; probability; source state space; square-root bound; substitution attack; systematic authentication codes; threats; universal hash functions; upper bounds; Associate members; Authentication; Communication channels; Concatenated codes; Cryptography; Error correction codes; Performance gain; Protection; Reed-Solomon codes; State-space methods;
  • fLanguage
    English
  • Journal_Title
    Information Theory, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0018-9448
  • Type

    jour

  • DOI
    10.1109/18.485725
  • Filename
    485725