Universal hashing and authentication codes (Q1335421)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Universal hashing and authentication codes |
scientific article |
Statements
Universal hashing and authentication codes (English)
0 references
20 May 1995
0 references
In this paper (for a preliminary version see [Lect. Notes Comput. Sci. 576, 74-85 (1992; Zbl 0789.68050)]) the author studies the applications of universal hashing to the construction of unconditionally secure authentication codes without secrecy. He generalizes the construction given by \textit{M. N. Wegman} and \textit{J. L. Carter} [J. Comput. Syst. Sci. 22, 265-279 (1981; Zbl 0461.68074)], which is useful when the number of authenticators is exponentially small compared to the number of possible source states (plaintext messages), by formally defining some new classes of hash functions. He presents two lower bounds on the size of certain universal classes of hash functions, gives both direct and recursive constructions for universal classes of hash functions and discusses the implications of this theory to the construction of authentication codes. The presented method of universal hashing to construct authentication codes is used by \textit{J. Bierbrauer}, \textit{T. Johansson}, \textit{G. Kobatianskij} and \textit{B. Smeets} [Lect. Notes Comput. Sci. 773, 331-342 (1994)]. In [J. Combinatorial Design 2, 161-166 (1994)] \textit{Tran Van Trung} gives a design-theoretic characterization of those classes of hash functions that meet one of the lower bounds with equality.
0 references
universal hashing
0 references
authentication codes
0 references
hash functions
0 references