Performance of authentication codes under impersonation attack is considered. We assume two classes of strategies for the enemy and give expressions for the probability of success in each case and study the relationship of the two classes. We prove a new lower bound on the probability of deception which points out the importance of the average. distance between the encoding rules of the code in the protection provided by it. Codes with perfect protection for each class are characterized and some constructions based on error correcting codes are proposed.
CITATION STYLE
Safavi-Naini, R., & Tombak, L. (1993). Authentication codes under impersonation attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 718 LNCS, pp. 35–47). Springer Verlag. https://doi.org/10.1007/3-540-57220-1_50
Mendeley helps you to discover research relevant for your work.