Topics in Authentication Theory
(1997) Abstract
 Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e., providing authentication protection agains an enemy equipped with unlimited computing power. Several topics in authentication theory are treated: random authentication coding, multiround authentication, group authentication, anonymous secret sharing, and fast MACs.
Random authentication encoding constructions are investigated. Expressions for the probability of a successful attack are given. We give an expression for the asymptotic behaviour of the key size of the random... (More)  Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e., providing authentication protection agains an enemy equipped with unlimited computing power. Several topics in authentication theory are treated: random authentication coding, multiround authentication, group authentication, anonymous secret sharing, and fast MACs.
Random authentication encoding constructions are investigated. Expressions for the probability of a successful attack are given. We give an expression for the asymptotic behaviour of the key size of the random construction as a function of the message size. We provide some experimental data. Unconditionally secure multiround authentication schemes are treated. We define a multiround authentication model and show how to calculate the probability of a successful attack for this model. A multiround scheme constructed by Gemmell and Naor is cryptanalysed. We propose new multiround constructions for a 3round protocol and for a protocol with an arbitrary number of rounds. A new upper bound on the key size is given.
We define an authentication model for shared generation of an authenticator among a set of participants, called group authentication. Expressions for the probability of a successful attack for this model are given. We derive information theoretic lower bounds for the probability of a successful attack. Linear schemes are investigated and constructions based on codes for the rank metric are given. We give definitions of anonymous secret sharing schemes. Two different anonymity levels are used, called anonymous and strongly anonymous. Using the new definitions, threshold schemes and general access structures are investigated. A necessary and sufficient condition for the existence of a strongly anonymous secret sharing scheme is given.
We investigate how a MAC can be calculated fast in software. Two different approaches are used: one that uses polynomial evaluation over a finite field and one tha uses random polynomial residue class codes. The binary complexity of the two suggested procedures is calculated. Examples of constructions are given. (Less)
Please use this url to cite or link to this publication:
http://lup.lub.lu.se/record/18184
 author
 Gehrmann, Christian ^{LU}
 opponent

 Prof. Kurosawa, Kaoru, Tokyo Institute of Technology
 organization
 publishing date
 1997
 type
 Thesis
 publication status
 published
 subject
 keywords
 polynomial evaluation, anonymous secret sharing, multiround authentication, group authentication, threshold cryptography, MAC, secret sharing, cryptology, Authentication, authentication codes, Systems engineering, computer technology, Data och systemvetenskap
 pages
 162 pages
 publisher
 Laila Lembke, Dept. of Information Technology, Lund University, P.O. Box 118, SE221 00 Lund,
 defense location
 E:1406, LTH
 defense date
 19970516 13:15
 external identifiers

 Other:ISRN: LUTEDX/TEIT97/1007SE
 ISBN
 9171670076
 language
 English
 LU publication?
 yes
 id
 ac8efc60725d4d44b110da2e085d9eaf (old id 18184)
 date added to LUP
 20070524 10:45:39
 date last changed
 20160919 08:45:11
@phdthesis{ac8efc60725d4d44b110da2e085d9eaf, abstract = {Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e., providing authentication protection agains an enemy equipped with unlimited computing power. Several topics in authentication theory are treated: random authentication coding, multiround authentication, group authentication, anonymous secret sharing, and fast MACs.<br/><br> <br/><br> Random authentication encoding constructions are investigated. Expressions for the probability of a successful attack are given. We give an expression for the asymptotic behaviour of the key size of the random construction as a function of the message size. We provide some experimental data. Unconditionally secure multiround authentication schemes are treated. We define a multiround authentication model and show how to calculate the probability of a successful attack for this model. A multiround scheme constructed by Gemmell and Naor is cryptanalysed. We propose new multiround constructions for a 3round protocol and for a protocol with an arbitrary number of rounds. A new upper bound on the key size is given.<br/><br> <br/><br> We define an authentication model for shared generation of an authenticator among a set of participants, called group authentication. Expressions for the probability of a successful attack for this model are given. We derive information theoretic lower bounds for the probability of a successful attack. Linear schemes are investigated and constructions based on codes for the rank metric are given. We give definitions of anonymous secret sharing schemes. Two different anonymity levels are used, called anonymous and strongly anonymous. Using the new definitions, threshold schemes and general access structures are investigated. A necessary and sufficient condition for the existence of a strongly anonymous secret sharing scheme is given.<br/><br> <br/><br> We investigate how a MAC can be calculated fast in software. Two different approaches are used: one that uses polynomial evaluation over a finite field and one tha uses random polynomial residue class codes. The binary complexity of the two suggested procedures is calculated. Examples of constructions are given.}, author = {Gehrmann, Christian}, isbn = {9171670076}, keyword = {polynomial evaluation,anonymous secret sharing,multiround authentication,group authentication,threshold cryptography,MAC,secret sharing,cryptology,Authentication,authentication codes,Systems engineering,computer technology,Data och systemvetenskap}, language = {eng}, pages = {162}, publisher = {Laila Lembke, Dept. of Information Technology, Lund University, P.O. Box 118, SE221 00 Lund,}, school = {Lund University}, title = {Topics in Authentication Theory}, year = {1997}, }