Advanced

Topics in Authentication Theory

Gehrmann, Christian LU (1997)
Abstract
Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e., providing authentication protection agains an enemy equipped with unlimited computing power. Several topics in authentication theory are treated: random authentication coding, multiround authentication, group authentication, anonymous secret sharing, and fast MACs.



Random authentication encoding constructions are investigated. Expressions for the probability of a successful attack are given. We give an expression for the asymptotic behaviour of the key size of the random... (More)
Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e., providing authentication protection agains an enemy equipped with unlimited computing power. Several topics in authentication theory are treated: random authentication coding, multiround authentication, group authentication, anonymous secret sharing, and fast MACs.



Random authentication encoding constructions are investigated. Expressions for the probability of a successful attack are given. We give an expression for the asymptotic behaviour of the key size of the random construction as a function of the message size. We provide some experimental data. Unconditionally secure multiround authentication schemes are treated. We define a multiround authentication model and show how to calculate the probability of a successful attack for this model. A multiround scheme constructed by Gemmell and Naor is cryptanalysed. We propose new multiround constructions for a 3-round protocol and for a protocol with an arbitrary number of rounds. A new upper bound on the key size is given.



We define an authentication model for shared generation of an authenticator among a set of participants, called group authentication. Expressions for the probability of a successful attack for this model are given. We derive information theoretic lower bounds for the probability of a successful attack. Linear schemes are investigated and constructions based on codes for the rank metric are given. We give definitions of anonymous secret sharing schemes. Two different anonymity levels are used, called anonymous and strongly anonymous. Using the new definitions, threshold schemes and general access structures are investigated. A necessary and sufficient condition for the existence of a strongly anonymous secret sharing scheme is given.



We investigate how a MAC can be calculated fast in software. Two different approaches are used: one that uses polynomial evaluation over a finite field and one tha uses random polynomial residue class codes. The binary complexity of the two suggested procedures is calculated. Examples of constructions are given. (Less)
Please use this url to cite or link to this publication:
author
opponent
  • Prof. Kurosawa, Kaoru, Tokyo Institute of Technology
organization
publishing date
type
Thesis
publication status
published
subject
keywords
polynomial evaluation, anonymous secret sharing, multiround authentication, group authentication, threshold cryptography, MAC, secret sharing, cryptology, Authentication, authentication codes, Systems engineering, computer technology, Data- och systemvetenskap
pages
162 pages
publisher
Laila Lembke, Dept. of Information Technology, Lund University, P.O. Box 118, SE-221 00 Lund,
defense location
E:1406, LTH
defense date
1997-05-16 13:15
external identifiers
  • other:ISRN: LUTEDX/TEIT-97/1007-SE
ISBN
91-7167-007-6
language
English
LU publication?
yes
id
ac8efc60-725d-4d44-b110-da2e085d9eaf (old id 18184)
date added to LUP
2007-05-24 10:45:39
date last changed
2016-09-19 08:45:11
@phdthesis{ac8efc60-725d-4d44-b110-da2e085d9eaf,
  abstract     = {Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e., providing authentication protection agains an enemy equipped with unlimited computing power. Several topics in authentication theory are treated: random authentication coding, multiround authentication, group authentication, anonymous secret sharing, and fast MACs.<br/><br>
<br/><br>
Random authentication encoding constructions are investigated. Expressions for the probability of a successful attack are given. We give an expression for the asymptotic behaviour of the key size of the random construction as a function of the message size. We provide some experimental data. Unconditionally secure multiround authentication schemes are treated. We define a multiround authentication model and show how to calculate the probability of a successful attack for this model. A multiround scheme constructed by Gemmell and Naor is cryptanalysed. We propose new multiround constructions for a 3-round protocol and for a protocol with an arbitrary number of rounds. A new upper bound on the key size is given.<br/><br>
<br/><br>
We define an authentication model for shared generation of an authenticator among a set of participants, called group authentication. Expressions for the probability of a successful attack for this model are given. We derive information theoretic lower bounds for the probability of a successful attack. Linear schemes are investigated and constructions based on codes for the rank metric are given. We give definitions of anonymous secret sharing schemes. Two different anonymity levels are used, called anonymous and strongly anonymous. Using the new definitions, threshold schemes and general access structures are investigated. A necessary and sufficient condition for the existence of a strongly anonymous secret sharing scheme is given.<br/><br>
<br/><br>
We investigate how a MAC can be calculated fast in software. Two different approaches are used: one that uses polynomial evaluation over a finite field and one tha uses random polynomial residue class codes. The binary complexity of the two suggested procedures is calculated. Examples of constructions are given.},
  author       = {Gehrmann, Christian},
  isbn         = {91-7167-007-6},
  keyword      = {polynomial evaluation,anonymous secret sharing,multiround authentication,group authentication,threshold cryptography,MAC,secret sharing,cryptology,Authentication,authentication codes,Systems engineering,computer technology,Data- och systemvetenskap},
  language     = {eng},
  pages        = {162},
  publisher    = {Laila Lembke, Dept. of Information Technology, Lund University, P.O. Box 118, SE-221 00 Lund,},
  school       = {Lund University},
  title        = {Topics in Authentication Theory},
  year         = {1997},
}