Authentication codes under impersonation attack

2Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Performance of authentication codes under impersonation attack is considered. We assume two classes of strategies for the enemy and give expressions for the probability of success in each case and study the relationship of the two classes. We prove a new lower bound on the probability of deception which points out the importance of the average. distance between the encoding rules of the code in the protection provided by it. Codes with perfect protection for each class are characterized and some constructions based on error correcting codes are proposed.

Cite

CITATION STYLE

APA

Safavi-Naini, R., & Tombak, L. (1993). Authentication codes under impersonation attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 718 LNCS, pp. 35–47). Springer Verlag. https://doi.org/10.1007/3-540-57220-1_50

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free