DocumentCode :
1055021
Title :
A survey of information authentication
Author :
Simmons, Gustavus J.
Author_Institution :
Sandia Nat. Lab., Albuquerque, NM, USA
Volume :
76
Issue :
5
fYear :
1988
fDate :
5/1/1988 12:00:00 AM
Firstpage :
603
Lastpage :
620
Abstract :
The general principles that underlie all authentication schemes are reviewed and illustrated using the examples of an early telegraphy cable code, a US military authentication protocol, and authentication of electronic funds transfers in the US Federal Reserve System. Authentication threats from inside the system (i.e. untrustworthy sender or receiver) are described. The classification of authentication schemes as computationally secure, provably secure, or unconditionally secure is explained, and theoretical results are presented showing that a large number of encoding rules must be available in any unconditionally secure authentication code. Current authentication practices are examined
Keywords :
codes; cryptography; encoding; protocols; reviews; security of data; authentication code; authentication schemes; authentication threats; classification; computationally secure; cryptography; data security; electronic funds transfers; encoding rules; encryption; information authentication; military authentication protocol; provably secure; review; telegraphy cable code; unconditionally secure; Authentication; Context; Fingerprint recognition; Instruments; Physics computing; Protocols; Relays; Software; Terminology; Transmitters;
fLanguage :
English
Journal_Title :
Proceedings of the IEEE
Publisher :
ieee
ISSN :
0018-9219
Type :
jour
DOI :
10.1109/5.4445
Filename :
4445
Link To Document :
بازگشت