๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Information-theoretic bounds for authentication schemes

โœ Scribed by Michael Walker


Publisher
Springer
Year
1990
Tongue
English
Weight
604 KB
Volume
2
Category
Article
ISSN
0933-2790

No coin nor oath required. For personal study only.

โœฆ Synopsis


Consider the situation whereby each member of a sequence of n distinct messages from a finite source space is provided with an authentication check, generated using one and the same encoding rule selected from a finite space of such rules. Let P(n) be the expected probability that a spoofer, who observes such a sequence of messages and their corresponding authentication checks, but does not know the encoding rule in advance, succeeds in generating the correct authentication check for a different message in the source space. The purpose of this paper is to derive a lower bound for the average "oN of the probabilities P(0), P(1) ..... P(N) in terms of the entropy of the space of encoding rules, and to derive necessary and sufficient conditions which the encoding scheme must satisfy in order to ensure that this bound cannot be exceeded.


๐Ÿ“œ SIMILAR VOLUMES


Information-theoretic bounds for authent
โœ Dingyi Pei ๐Ÿ“‚ Article ๐Ÿ“… 1995 ๐Ÿ› Springer ๐ŸŒ English โš– 480 KB

Authentication codes with secrecy and with splitting are investigated. An information-theoretic lower bound for the probability of successful deception for a spoofing attack of order r is obtained. The condition necessary on authentication codes to achieve the lower bound is determined as a single s