Abstract
Gemmell and Naor proposed a new protocol for uncondition- ally secure authentication of long messages. However Gehrmann showed that the proof of the security of the protocol was incorrect. Here we generalize the multiround protocol model. We prove the security of a 3-round protocol and give for this case a new easy implementable con- struction which has a key size close to the fundamental lower bound for even extremely long messages. Furthermore, we give a proof of a secure multiround protocol for an arbitrary number of rounds.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
P. Gemmell, M. Naor, “Codes for interactive authentication”, Proceedings of CRYPTO’ 93, 1993, pp. 355–367.
T. Johansson, G. Kabatanskii, B. Smeets, “On the relation between A-codes and codes correcting independent errors”, Proceedings of Eurocrypt’ 93, 1993, pp. 1–11.
C. Gehrmann, “Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol”, Proceedings of CRYPTO’ 94, 1994, pp. 121–128.
G. J. Simmons, “A survey of Information Authentication”, in Contemporary Cryptology, The science of information integrity, ed. G.J. Simmons, IEEE Press, New York, 1992.
J.L. Carter, M.N. Wegman, “New hash functions and their use in authentication and set equality”, J. Computer and System Sci., Vol 22, 1981, pp. 265–279.
D.R. Stinson, “Universal hashing and authentication codes”, Design, Codes and Cryptography, vol. 4, no. 4, 1994. pp. 369–380.
J. Bierbrauer, T. Johansson, G. Kabatanskii, B. Smeets, “On Families of Hash Functions via Geometric Codes and Concatenation”, Proceedings of CRYPTO’ 93, 1993, pp. 331–342.
I.S. Reed, G. Solomon, “Polynomial Codes over certain Finite Fields”, J. Soc. Ind. Appl. Math., vol. 8, June 1960, pp. 300–304.
E. Gilbert, F. J. MacWilliams, N. Sloane, “Codes Which Detect Deception”. Bell System Technical Journal. Vol. 53. No. 3. March 1974, pp. 405–424.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gehrmann, C. (1995). Secure Multiround Authentication Protocols. In: Guillou, L.C., Quisquater, JJ. (eds) Advances in Cryptology — EUROCRYPT ’95. EUROCRYPT 1995. Lecture Notes in Computer Science, vol 921. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49264-X_13
Download citation
DOI: https://doi.org/10.1007/3-540-49264-X_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-59409-3
Online ISBN: 978-3-540-49264-1
eBook Packages: Springer Book Archive