Author:
El-Mesady A., ,Hamed Y. S.,Abualnaja Khadijah M.,
Abstract
<abstract>
<p>Security of personal information has become a major concern due to the increasing use of the Internet by individuals in the digital world. The main purpose here is to prevent an unauthorized person from gaining access to confidential information. The solution to such a problem is by authentication of users. Authentication has a very important role in achieving security. Mutually orthogonal graph squares (MOGS) are considered the generalization of mutually orthogonal Latin squares (MOLS). Also, MOGS are generated from edge decompositions of complete bipartite graphs by isomorphic graphs. Graph-orthogonal arrays can be constructed by MOGS. In this paper, graph-orthogonal arrays are used for constructing authentication codes. These arrays are the encoding matrices of authentication tags. We introduce the concepts and basic theorems of MOGS, graph-orthogonal arrays, and authentication codes. After constructing graph-orthogonal arrays by MOGS, then there is an established mapping between graph-orthogonal arrays and message set. This manages us to construct perfect non-splitting and splitting Cartesian authentication codes. In both cases, we calculate the probabilities of successful impersonation attacks and substitution attacks. Besides that, the performance of constructed non-splitting and splitting authentication codes is analyzed. In the end, optimal authentication codes and secure authentication codes are constructed.</p>
</abstract>
Publisher
American Institute of Mathematical Sciences (AIMS)
Reference48 articles.
1. C. Shannon, A mathematical theory of communication, Bell System Technical Journal, 27 (1948), 379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
2. E. Gilbert, F. MacWilliams, N. Sloane, Codes which detect deception, Bell System Technical Journal, 53 (1974), 405–424. https://doi.org/10.1002/j.1538-7305.1974.tb02751.x
3. G. Simmons, A game theory model of digital message authentication, Congressus Neumerantium, 34 (1982), 413–424.
4. G. Simmons, Message authentication: a game on hypergraphs, Congressus Neumerantium, 45 (1984), 161–192.
5. G. Simmons, Authentication theory / coding theory, In: Lecture Notes in Computer Science, Berlin: Springer, 1985,411–431. https://doi.org/10.1007/3-540-39568-7_32
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献