A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs

  • Authors:
  • Douglas R. Stinson

  • Affiliations:
  • -

  • Venue:
  • CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
  • Year:
  • 1987

Quantified Score

Hi-index 0.00

Visualization

Abstract

If we agree to use one of v possible messages to communicate one of k possible source states, then an opponent can successfully impersonate a transmitter with probability at least k / v, and can successfully substitute a message with a fraudulent one with probability at least (k - 1) / (v - 1). We wish to limit an opponent to these bounds. In addition, we desire that the observation of any two messages in the communication channel will give an opponent no clue as to the two source states. We describe a construction for a code which achieves these goals, and which does so with the minimum possible number of encoding rules (namely, v(v -1) / 2). The construction uses a structure from combinatorial design theory known as a perpendicular array.