University of Wollongong
Browse

Bounds on authentication systems in query mode

Download (174.59 kB)
conference contribution
posted on 2024-11-18, 16:51 authored by Reihaneh Safavi-Naini, P Wild
Unconditionally secure authentication codes provide information theoretic security against an adversary who observes authenticated messages and then wants to construct a fraudulent message that is acceptable by the receiver. The attack model for these codes has recently been strengthened and adaptive adversaries with oracle access have been introduced. In this paper we give an analysis of this new model and derive information theoretic bounds on the success probability and key size of the codes. Our analysis treats two games that an adversary can play: an offline attack in which the adversary is allowed to query a verification oracle and then to construct the spoofing query; and an on-line attack in which the adversary interacts with the verification oracle and wins as soon as he constructs an acceptable message. We describe the best strategy of the adversary in each case.

History

Citation

This article was originally published as: Safavi-Naini, R & Wild, P, Bounds on authentication systems in query mode, IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security 2005, 16-19 October 2005, 85-91. Copyright IEEE 2005.

Language

English

Usage metrics

    Categories

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC