Title :
A survey of information authentication
Author :
Simmons, Gustavus J.
Author_Institution :
Sandia Nat. Lab., Albuquerque, NM, USA
fDate :
5/1/1988 12:00:00 AM
Abstract :
The general principles that underlie all authentication schemes are reviewed and illustrated using the examples of an early telegraphy cable code, a US military authentication protocol, and authentication of electronic funds transfers in the US Federal Reserve System. Authentication threats from inside the system (i.e. untrustworthy sender or receiver) are described. The classification of authentication schemes as computationally secure, provably secure, or unconditionally secure is explained, and theoretical results are presented showing that a large number of encoding rules must be available in any unconditionally secure authentication code. Current authentication practices are examined
Keywords :
codes; cryptography; encoding; protocols; reviews; security of data; authentication code; authentication schemes; authentication threats; classification; computationally secure; cryptography; data security; electronic funds transfers; encoding rules; encryption; information authentication; military authentication protocol; provably secure; review; telegraphy cable code; unconditionally secure; Authentication; Context; Fingerprint recognition; Instruments; Physics computing; Protocols; Relays; Software; Terminology; Transmitters;
Journal_Title :
Proceedings of the IEEE