Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Some constructions and bounds for authentication codes
Stinson D.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)4251987.Type:Proceedings
Date Reviewed: Sep 1 1988

The author of this paper uses a model of authentication theory developed by G. J. Simmons [1,2,3]. Three participants in a communications transaction are identified. These are a transmitter, a receiver, and an opponent. The first two of these play the obvious roles. The opponent can either impersonate the transmitter, making the receiver accept a fraudulent message as authentic, or modify a message that has been sent by the transmitter.

A mathematical basis is expounded for the impersonation game and the substitution game. A value is defined for each of these games, representing the possibility that the opponent can deceive the legitimate game participants. The balance of the paper is devoted to computing upper and lower bounds for such values according to the encoding rules being utilized. Some guidelines are then developed for the construction of authentication systems that can be regarded as optimal.

It is unfortunate that the author has not extended the paper to include some details of practical implementations. Overall, the level of presentation is such as to require some advanced knowledge of mathematics on the part of the reader. However, it is probable that the paper will interest those working in academic and research environments.

Reviewer:  G. K. Jenkins Review #: CR112547
1) Simmons, G. J.A game theory model of digital message authentication. Congr. Numerantium 34 (1982), 413–424.
2) Simmons, G. J.Message authentication: a game on hypergraphs. Congr. Numerantium 45 (1984), 161–192.
3) Simmons, G. J.Authentication theory/coding theory. In Advances in Cryptology: Proceedings of CRYPTO 84. G. R. Blakley and D. Chaum (eds.), Springer-Verlag, Berlin, 1985, 411–432.
Bookmark and Share
  Featured Reviewer  
 
Authentication (D.4.6 ... )
 
 
Protocol Verification (C.2.2 ... )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms
Chaum D. (ed)  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)2641990. Type: Proceedings
Jan 1 1992
A pauper’s callback scheme
Bishop M. Computers and Security 5(2): 141-144, 1986. Type: Article
Mar 1 1987
A taxonomy of computer program security flaws
Landwehr C. (ed), Bull A., McDermott J., Choi W. ACM Computing Surveys 26(3): 211-254, 1994. Type: Article
May 1 1995
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy