Title :
Deception in authentication channels with multiple usage
Author_Institution :
Dept. of Math. & Appl. Math., Natal Univ., Durban, South Africa
Abstract :
By considering a simple but very general authentication code, we obtain some lower bounds on the probability of successful deception, through impersonation or substitution, if an authentication channel is used without a change of key after each message. In particular an authentication scheme proposed by Johanssen (see Designs, Codes and Cryptography, vol.4, p.69-81, 1994) is analysed, and found to be extremely vulnerable in multiple usage
Keywords :
channel coding; cryptography; game theory; message authentication; probability; telecommunication channels; authentication channels; authentication code; game theoretic model; impersonation; key; lower bounds; multiple usage; substitution; successful deception probability; Authentication; Game theory; Mathematics; Transmitters;
Conference_Titel :
Communications and Signal Processing, 1994. COMSIG-94., Proceedings of the 1994 IEEE South African Symposium on
Conference_Location :
Stellenbosch
Print_ISBN :
0-7803-1998-2
DOI :
10.1109/COMSIG.1994.512437