The application of coding theory to security scenarios is studied. Authentication systems are introduced that are based on algebraic codes and provide high protection against an intruder's impersonation and substitution attacks. It is shown that a subliminal channel can be embedded into these systems and that there is a trade-off between the authentication capability, subliminal capacity and error protection capability.
History
Citation
Reihaneh Safavi-Naini and Jennifer Seberry, Error correcting codes for authentication and subliminal channels, IEEE Transactions on Information Theory, 37, (1991), 13-17.