Message authentication with arbitration of transmitter/receiver disputes

  • Authors:
  • Gustavus J. Simmons

  • Affiliations:
  • Sandia National Laboratories, Albuquerque, NM

  • Venue:
  • EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
  • Year:
  • 1987

Quantified Score

Hi-index 0.01

Visualization

Abstract

In the most general model of message authentication, there are four essential participants: a transmitter who observes an information source, such as a coin toss, and wishes to communicate these observations to a remotely located receiver over a publicly exposed, noiseless, communications channel; a receiver who wishes to not only learn the state of the source (as observed by the transmitter) but also to assure himself that the communications (messages) he accepts actually were sent by the transmitter and that no alterations have been made to them subsequent to the transmitter having sent them, and two other parties, the opponent and the arbiter. The opponent wishes to deceive the receiver into accepting a message that will misinform him as to the state of the source. We assume, in accordance with Kerckhoffs' criteria in cryptography, that the opponent is fully knowledgeable of the authentication system and that in addition he is able to both eavesdrop on legitimate communications in the channel and to introduce fraudulent communications of his own choice. We also assume that he has unlimited computing power, i.e., that any computation which can be done in principal can in fact be done in practice. Given this, the opponent can achieve his objective in either of two ways: 1) he can impersonate the transmitter and send a fraudulent message when in fact no message was sent by the transmitter, or 2) he can wait to intercept a legitimate message from the transmitter and substitute in its stead some other message of his own devising.