Affiliation:
1. Qualys(China) Information Technology Limited Corporation
2. CAS
Abstract
An authentication protocol is a procedure by which a sender tries to convey n bits of information, which we call an input message, to a receiver. An adversary controls the network over which the sender and the receiver talk and may change any message before it reaches its destination. This paper deals with the simple scenario where two parties, Alice and Bob, communicate and want to assure that the message received by Bob is the one sent by Alice. Unconditional cryptographic security cannot be generated simply from scratch, but must be based on some given primitive to start with. In this paper, we introduce a message authentication protocol with unconditional cryptographic security. More precisely, we give protocols using a weakly secret key allowing for the exchange of authenticated messages.
Publisher
Trans Tech Publications, Ltd.
Reference11 articles.
1. E. Gilbert, F. J. MacWiUiams, and N. Sloane, Codes which detect deception, The Bell System Technical Journal, 53(3), March (1974).
2. M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, J. Computer and System Sci., vol. 22, pp.265-279, (1981).
3. D. W. Davies and D. O. Clayden, A message authenticator algorithm suitable for a main frame computer, NPL Report DITC 17/83, (1983).
4. P. Gemmell and M. Naor, Codes for interactive authentication", Advances in Cryptology — CRYPTO, 93, LNCS, Vol. 773, pp.355-367, Springer-Verlag, (1993).
5. Y. Dodis and J. Spencer, On the (non)universality of the one-time pad, Proceedings of FOCS 2002, pp.376-388, IEEE press, (2002).