On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2

Ben Smeets, Peter Vanroose, Zhe Xian Wan

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

We present an analysis of some known cartesian authentication codes and their modification into authentication codes with secrecy, with transmission rate R = r/n, where n = 2, 3, …, and 1 ≤ r ≤ n - 1 using (n - r)(r + 1) q-ary key digits. For this purpose we use a grouping technique. Essentially the same key grouping technique is used for the construction of codes that withstand spoofing attacks of order L ≥ 2. The information rate of this scheme is also r/n, and it requires (L + r)(n - r) q-ary key digits. Moreover these codes allow that previously transmitted source states can be reused.

Original languageEnglish
Title of host publicationAdvances in Cryptology — EUROCRYPT 1990
Subtitle of host publication Workshop on the Theory and Application of Cryptographic Techniques, Proceedings
EditorsIvan Bjerre Damgard
PublisherSpringer
Pages306-312
Number of pages7
ISBN (Electronic)9783540468776
ISBN (Print)9783540535874
DOIs
Publication statusPublished - 1991
EventConference on the Theory and Application of Cryptology, 1990 - Aarhus, Denmark
Duration: 1990 May 211990 May 24

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume473 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceConference on the Theory and Application of Cryptology, 1990
Country/TerritoryDenmark
CityAarhus
Period1990/05/211990/05/24

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1991.

Subject classification (UKÄ)

  • Telecommunications

Fingerprint

Dive into the research topics of 'On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2'. Together they form a unique fingerprint.

Cite this