A construction for authentication/secrecy codes from certain combinatorial designs (Q1112007)

From MaRDI portal
scientific article
Language Label Description Also known as
English
A construction for authentication/secrecy codes from certain combinatorial designs
scientific article

    Statements

    A construction for authentication/secrecy codes from certain combinatorial designs (English)
    0 references
    0 references
    1988
    0 references
    If we agree to use one of v possible messages to communicate one of k possible source states, then an opponent can successfully impersonate a transmitter with probability at least k/v, and can successfully substitute a message with a fraudulent one with probability at last (k- 1)/(v-1). We wish to limit an opponent to these bounds. In addition, we desire that the observation of any two messages in the communication channel will give an opponent no clue as to the two source states. We describe a construction for a code which achieves these goals, and which does so with the minimum possible number of encoding rules (namely, \(v\cdot (v-1)/2)\). The construction uses a structure from combinatorial design theory known as a perpendicular array.
    0 references
    0 references
    authentication code, Secrecy code
    0 references
    communication channel
    0 references
    perpendicular array
    0 references
    0 references