A construction for authentication/secrecy codes from certain combinatorial designs (Q1112007)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: A construction for authentication/secrecy codes from certain combinatorial designs |
scientific article; zbMATH DE number 4077118
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | A construction for authentication/secrecy codes from certain combinatorial designs |
scientific article; zbMATH DE number 4077118 |
Statements
A construction for authentication/secrecy codes from certain combinatorial designs (English)
0 references
1988
0 references
If we agree to use one of v possible messages to communicate one of k possible source states, then an opponent can successfully impersonate a transmitter with probability at least k/v, and can successfully substitute a message with a fraudulent one with probability at last (k- 1)/(v-1). We wish to limit an opponent to these bounds. In addition, we desire that the observation of any two messages in the communication channel will give an opponent no clue as to the two source states. We describe a construction for a code which achieves these goals, and which does so with the minimum possible number of encoding rules (namely, \(v\cdot (v-1)/2)\). The construction uses a structure from combinatorial design theory known as a perpendicular array.
0 references
authentication code, Secrecy code
0 references
communication channel
0 references
perpendicular array
0 references