Perfect and essentially perfect authentication schemes

  • Authors:
  • Albrecht Beutelspacher

  • Affiliations:
  • Siemens AG, München, Federal Republicof Germany

  • Venue:
  • EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
  • Year:
  • 1987

Quantified Score

Hi-index 0.00

Visualization

Abstract

Suppose that A wants to send a message M to B. It is important that B receives the message without any alteration. On the other hand, a bad guy X looks for his chance to alter M in his favour. In order t o make the bad guy's life difficult, A authenticates the message M. For this, A and B have to agree on an authentication function f and a secret key K. The function f has M and K as its input, and the authenticator (also called message authentication code) f(M,K) as its output.