Abstract
We consider a communications scenario in which a transmitter attempts to inform a remote receiver of the state of a source by sending messages through an imperfect communications channel. There are two fundamentally different ways in which the receiver can end up being misinformed. The channel may be noisy so that symbols in the transmitted message can be received in error, or the channel may be under the control of an opponent who can either deliberately modify legitimate messages or else introduce fraudulent ones to deceive the receiver, i.e., what Wyner has called an “active wiretapper” [1]. The device by which the receiver improves his chances Of detecting error (deception) is the same in either case: the deliberate introduction of redundant information into the transmitted message. The way in which this redundant information is introduced and used, though, is diametrically opposite in the two cases.
This work performed at Sandia National Laboratories supported by the U. S. Department of Energy under Contract No. DE-AC04-76DP00789.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
A. D. Wyner, “The Wire-tap Channel,” The Bell System Technical Journal, Vol. 54, No. 8 (Oct. 1975), pp. 1355–1387.
G. J. Simmons. “A Preliminary Report on a Theory of Authentication,” Proceedings of the IEEE National Electronics Conf., Chicago, IL (Oct. 28–29, 1981), pp. 315–318.
G. J. Simmons, “Verification of Treaty Compliance — Revisited,” Proceedings of the IEEE 1983 Symposium on Security and Privacy, Oakland, CA (Apr. 25–27, 1983), pp. 61–66.
G. J. Simmons. “A System for Verifying User Identity and Authorization at the Point-of-Sale or Access,” Cryptologia, Vol. 8, No. 1, January 1984, pp. 1–21.
G. J. Simmons, “Message Authentication: A Game on Hypergraphs,” Proceedings of the 15th Southeastern Conference on Combinatorics, Graph Theory and Computing. Baton Rouge, LA, March 5–8, 1984, (to appear).
E. F. Brickell, “A Few Results in Message Authentication,” Proceedings of the 15th Southeastern Conference on Combinatorics, Graph Theory and Computing, Boca Raton, LA, March 5–8, 1984, (to appear).
E. N. Gilbert, Mrs. F. J. MacWilliams, and N. J. A. Sloane, “Codes which Detect Deception.” The Bell System Technical Journal, Vol. 53, No. 3 (March 1974), pp. 405–414.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1985 Spnnger-Verlag Berlin Heidelberg
About this paper
Cite this paper
Simmons, G.J. (1985). Authentication Theory/Coding Theory. In: Blakley, G.R., Chaum, D. (eds) Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39568-7_32
Download citation
DOI: https://doi.org/10.1007/3-540-39568-7_32
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-15658-1
Online ISBN: 978-3-540-39568-3
eBook Packages: Springer Book Archive