Topics in Authentication Theory
(1997)- Abstract
- Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e., providing authentication protection agains an enemy equipped with unlimited computing power. Several topics in authentication theory are treated: random authentication coding, multiround authentication, group authentication, anonymous secret sharing, and fast MACs.
Random authentication encoding constructions are investigated. Expressions for the probability of a successful attack are given. We give an expression for the asymptotic behaviour of the key size of the random... (More) - Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e., providing authentication protection agains an enemy equipped with unlimited computing power. Several topics in authentication theory are treated: random authentication coding, multiround authentication, group authentication, anonymous secret sharing, and fast MACs.
Random authentication encoding constructions are investigated. Expressions for the probability of a successful attack are given. We give an expression for the asymptotic behaviour of the key size of the random construction as a function of the message size. We provide some experimental data. Unconditionally secure multiround authentication schemes are treated. We define a multiround authentication model and show how to calculate the probability of a successful attack for this model. A multiround scheme constructed by Gemmell and Naor is cryptanalysed. We propose new multiround constructions for a 3-round protocol and for a protocol with an arbitrary number of rounds. A new upper bound on the key size is given.
We define an authentication model for shared generation of an authenticator among a set of participants, called group authentication. Expressions for the probability of a successful attack for this model are given. We derive information theoretic lower bounds for the probability of a successful attack. Linear schemes are investigated and constructions based on codes for the rank metric are given. We give definitions of anonymous secret sharing schemes. Two different anonymity levels are used, called anonymous and strongly anonymous. Using the new definitions, threshold schemes and general access structures are investigated. A necessary and sufficient condition for the existence of a strongly anonymous secret sharing scheme is given.
We investigate how a MAC can be calculated fast in software. Two different approaches are used: one that uses polynomial evaluation over a finite field and one tha uses random polynomial residue class codes. The binary complexity of the two suggested procedures is calculated. Examples of constructions are given. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/18184
- author
- Gehrmann, Christian LU
- supervisor
- opponent
-
- Prof. Kurosawa, Kaoru, Tokyo Institute of Technology
- organization
- publishing date
- 1997
- type
- Thesis
- publication status
- published
- subject
- keywords
- polynomial evaluation, anonymous secret sharing, multiround authentication, group authentication, threshold cryptography, MAC, secret sharing, cryptology, Authentication, authentication codes, Systems engineering, computer technology, Data- och systemvetenskap
- pages
- 162 pages
- publisher
- Laila Lembke, Dept. of Information Technology, Lund University, P.O. Box 118, SE-221 00 Lund,
- defense location
- E:1406, LTH
- defense date
- 1997-05-16 13:15:00
- external identifiers
-
- other:ISRN: LUTEDX/TEIT-97/1007-SE
- ISBN
- 91-7167-007-6
- language
- English
- LU publication?
- yes
- id
- ac8efc60-725d-4d44-b110-da2e085d9eaf (old id 18184)
- date added to LUP
- 2016-04-04 11:37:23
- date last changed
- 2018-11-21 21:06:05
@phdthesis{ac8efc60-725d-4d44-b110-da2e085d9eaf, abstract = {{Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e., providing authentication protection agains an enemy equipped with unlimited computing power. Several topics in authentication theory are treated: random authentication coding, multiround authentication, group authentication, anonymous secret sharing, and fast MACs.<br/><br> <br/><br> Random authentication encoding constructions are investigated. Expressions for the probability of a successful attack are given. We give an expression for the asymptotic behaviour of the key size of the random construction as a function of the message size. We provide some experimental data. Unconditionally secure multiround authentication schemes are treated. We define a multiround authentication model and show how to calculate the probability of a successful attack for this model. A multiround scheme constructed by Gemmell and Naor is cryptanalysed. We propose new multiround constructions for a 3-round protocol and for a protocol with an arbitrary number of rounds. A new upper bound on the key size is given.<br/><br> <br/><br> We define an authentication model for shared generation of an authenticator among a set of participants, called group authentication. Expressions for the probability of a successful attack for this model are given. We derive information theoretic lower bounds for the probability of a successful attack. Linear schemes are investigated and constructions based on codes for the rank metric are given. We give definitions of anonymous secret sharing schemes. Two different anonymity levels are used, called anonymous and strongly anonymous. Using the new definitions, threshold schemes and general access structures are investigated. A necessary and sufficient condition for the existence of a strongly anonymous secret sharing scheme is given.<br/><br> <br/><br> We investigate how a MAC can be calculated fast in software. Two different approaches are used: one that uses polynomial evaluation over a finite field and one tha uses random polynomial residue class codes. The binary complexity of the two suggested procedures is calculated. Examples of constructions are given.}}, author = {{Gehrmann, Christian}}, isbn = {{91-7167-007-6}}, keywords = {{polynomial evaluation; anonymous secret sharing; multiround authentication; group authentication; threshold cryptography; MAC; secret sharing; cryptology; Authentication; authentication codes; Systems engineering; computer technology; Data- och systemvetenskap}}, language = {{eng}}, publisher = {{Laila Lembke, Dept. of Information Technology, Lund University, P.O. Box 118, SE-221 00 Lund,}}, school = {{Lund University}}, title = {{Topics in Authentication Theory}}, year = {{1997}}, }