DocumentCode :
929793
Title :
Repeated use of codes which detect deception (Corresp.)
Author :
Fak, Viiveke
Volume :
25
Issue :
2
fYear :
1979
fDate :
3/1/1979 12:00:00 AM
Firstpage :
233
Lastpage :
234
Abstract :
A sender A wants to send N messages x_{i} = 1 , \\ldots ,N , chosen from a set containing M different possible messages, M > N , to a receiver B . Every x_{i} has to pass through the hands of a dishonest messenger C . Therefore A and B agree on a mathematical transformation f and a secret parameter, or key k , that will be used to produce the authenticator y_{i} = f(x_{i} , k ) , which is sent together with x . The key is chosen at random from a set of L elements. C knows f and can find all elements in the set G(x_{i},y_{i}) = {k|f(x_{i}, k) = y_{i}} given enough time and computer resources. C wants to change x_{i} \\in\\to x^{\\prime } without B suspecting. This means that C must find the new anthenticator y^{\\prime } = f(x^{\\prime } , k) . Since G(x_{i},y_{i}) can be found for any (x_{i},y_{i}) , it is obvious that C will always succeed unless G(x_{i},y_{i}) contains more than one element. Here it is proved that the average probability of success for C is minimized if (a) G(x_{i}, y_{i}) contains L^{(N-1)/N} elements and (b) each new known pair (x_{j}, y_{j}) will diminish this set of solutions by a factor of L^{-l/N} . The minimum average probability will then be L^{-l/N} .
Keywords :
Cryptography; Algorithm design and analysis; Art; Digital signatures; Entropy; Notice of Violation; Probability distribution; Public key cryptography; Stochastic processes; Testing;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.1979.1056011
Filename :
1056011
Link To Document :
بازگشت