Skip to main content

1983 | OriginalPaper | Buchkapitel

On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys

verfasst von : Gilles Brassard

Erschienen in: Advances in Cryptology

Verlag: Springer US

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

As an application of strongly universal-2 classes of hash functions, Wegman and Carter have proposed a provably secure authentication tag system.1 Their technique allows the receiver to be certain that a message is genuine. An enemy, even one with infinite computing power, cannot forge or modify a message without detection. Moreover, there are no messages that just happen to be easy to forge. Unfortunately, their scheme requires that the sender and the receiver share a rather long secret key if they wish to use the system more than once. Indeed, the length of the key is essentially n log(1/p), where n is the number of messages they wish to be able to authenticate before having to agree on a new secret key, and p is the probability of undetected forgery they are willing to tolerate. Since they also proved that n log(1/p) is a lower bound on the number of bits required by any tag system that assures security against infinite computing power, it is clearly necessary to resort to computational complexity if we wish to have a scheme usable in practice allowing a potentially very large number of messages to be authenticated.

Metadaten
Titel
On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys
verfasst von
Gilles Brassard
Copyright-Jahr
1983
Verlag
Springer US
DOI
https://doi.org/10.1007/978-1-4757-0602-4_7

Premium Partner