Three constructions of authentication codes from power function over finite fields with perfect secrecy. (Q2846638)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Three constructions of authentication codes from power function over finite fields with perfect secrecy. |
scientific article; zbMATH DE number 6206707
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Three constructions of authentication codes from power function over finite fields with perfect secrecy. |
scientific article; zbMATH DE number 6206707 |
Statements
9 September 2013
0 references
authentication codes
0 references
impersonation attack
0 references
substitution attack
0 references
cryptography
0 references
key
0 references
rings
0 references
perfect nonlinear mapping
0 references
secrecy
0 references
splitting
0 references
random variable
0 references
entropy
0 references
Three constructions of authentication codes from power function over finite fields with perfect secrecy. (English)
0 references
The paper presents algebraic constructions of authentication codes with secrecy and without splitting, related to the authentication model introduced in [\textit{G. J. Simmons}, Advances in cryptology, Proc. Workshop, Santa Barbara/Calif. 1984, Lect. Notes Comput. Sci. 196, 411--431 (1985; Zbl 0575.94011)]. Two kinds of attacks are considered: the impersonation attack, when an opponent inserts his message into the channel, and the substitution attack, when the opponent replaces a message with his own one. The codes defined by two of the three constructions are optimal. One of the constructions leads to the class of codes that consists of optimal codes as well as the codes that are merely asymptotically optimal. All authentication codes from the three classes provide perfect secrecy.
0 references