首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Authentication Codes in Plaintext and Chosen-Content Attacks
Authors:R Safavi-Naini  L Tombak
Institution:(1) Department of Computer Science, University of Wollongong, Northfields Ave., 2522 Wollongong, Australia;(2) Department of Computer Science, University of Wollongong, Northfields Ave., 2522 Wollongong, Australia
Abstract:We study authentication codes (A-codes) when the enemy has access to the content of the intercepted cryptogram. This is similar to plaintext attack in secrecy systems. Enemy's success is defined in two ways. The first is as in Simmons' model. We will also consider chosen-content attacks in which the success is by constructing a fraudulent cryptogram with a given content. We will obtain information theoretic bounds, define perfect protection and obtain lower bounds on the number of encoding rules for codes with perfect protection against chosen-content impersonation and chosen-content plaintext substitution. We characterize these A-codes when the number of encoding rules is minimum. We give methods of making an A-code resistant against plaintext and chosen-context plaintext attack.Support for this project was aprtly provided by Australian Research Council.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号