Three constructions of authentication codes from power function over finite fields with perfect secrecy. (Q2846638)

From MaRDI portal





scientific article; zbMATH DE number 6206707
Language Label Description Also known as
English
Three constructions of authentication codes from power function over finite fields with perfect secrecy.
scientific article; zbMATH DE number 6206707

    Statements

    0 references
    0 references
    0 references
    9 September 2013
    0 references
    authentication codes
    0 references
    impersonation attack
    0 references
    substitution attack
    0 references
    cryptography
    0 references
    key
    0 references
    rings
    0 references
    perfect nonlinear mapping
    0 references
    secrecy
    0 references
    splitting
    0 references
    random variable
    0 references
    entropy
    0 references
    Three constructions of authentication codes from power function over finite fields with perfect secrecy. (English)
    0 references
    The paper presents algebraic constructions of authentication codes with secrecy and without splitting, related to the authentication model introduced in [\textit{G. J. Simmons}, Advances in cryptology, Proc. Workshop, Santa Barbara/Calif. 1984, Lect. Notes Comput. Sci. 196, 411--431 (1985; Zbl 0575.94011)]. Two kinds of attacks are considered: the impersonation attack, when an opponent inserts his message into the channel, and the substitution attack, when the opponent replaces a message with his own one. The codes defined by two of the three constructions are optimal. One of the constructions leads to the class of codes that consists of optimal codes as well as the codes that are merely asymptotically optimal. All authentication codes from the three classes provide perfect secrecy.
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references