On a fallacious bound for authentication codes (Q1304974)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: On a fallacious bound for authentication codes |
scientific article; zbMATH DE number 1340535
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | On a fallacious bound for authentication codes |
scientific article; zbMATH DE number 1340535 |
Statements
On a fallacious bound for authentication codes (English)
0 references
22 May 2000
0 references
An authentication code provides a way to transmit information over an insecure channel. A possible attack by an opponent is to try to deceive the receiver by replacing the legitimate message by a different one, hoping the receiver will accept it as valid. For this so-called substitution attack one can compute the probability of success. A lower bound on this probability was derived in \textit{M. De Soete} [J. Cryptology 3, No. 3, 173-186 (1991; Zbl 0739.94010)]. In the current paper it is shown that the lower bound by De Soete is false. Firstly, the authors introduce a small counterexample. Then the flaw in the original proof by De Soete is spotted and corrected, resulting in a new lower bound. Finally, some published results from the theory of authentication codes and secret sharing schemes, that were originally based on the flawed bound by De Soete, are corrected.
0 references
authentication codes
0 references
substitution attack
0 references