We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Authentication and Secret-Key Cryptology | SpringerLink

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Skip to main content

Authentication and Secret-Key Cryptology

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

  • First Online:
Hiding Data - Selected Topics

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

  • 748 Accesses

Abstract

The transmission of information in a communication process faces various threats. These threats arise if during the transmission, the messages are at the mercy of unauthorized actions of an adversary, that is, if the channel used for the communication is insecure. Basically there are three attacks the communicants have to be aware of when using an information transmission system. An adversary might observe the communication and gain information about it, he might insert false messages or he might replace legally sent messages by false messages. The protection against the first attack is a question of secrecy and the protection against the latter two attacks is a question of authenticity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    First enunciated by A. Kerckhoffs (1835–1903) ([15], pp. 235).

  2. 2.
    $$\frac{{\left( {\begin{array}{c}K-a\\ a-i\end{array}}\right) }}{{\left( {\begin{array}{c}K\\ a\end{array}}\right) }}=\underbrace{\frac{K-a}{K}\cdots \frac{K-2a+i+1}{K-a+i+1}}_{a-i\;\text {factors}}\underbrace{\frac{a}{K-a+i}\cdots \frac{a-i+1}{K-a+1}}_{i\; \text {factors}}\le \left( \frac{K-a}{K}\right) ^{a-i}\left( \frac{a}{K-a}\right) ^{i}. $$
  3. 3.

    \({\left( {\begin{array}{c}n\\ k\end{array}}\right) }\le \left( \frac{n}{k}\right) ^{k}(1+\frac{k}{n-k})^{n-k}e^{\frac{1}{12n}-\frac{1}{12k+1}-\frac{1}{12(n-k)+1}+\frac{1}{2}\ln (\frac{n}{2\pi k(n-k)})}\)

    \(\le \left( \frac{ne}{k}\right) ^{k}e^{\frac{1}{2n}-\frac{1}{6n+1}+\frac{1}{2}\ln (\frac{n}{2\pi (n-1)})}\le \left( \frac{ne}{k}\right) ^{k}\).

  4. 4.

    Remark by the editors: This statement is not up to date, because in the paper “M. Agrawal, N. Kayal, and N. Saxena, “PRIMES is in P”, Annals of Mathematics, Vol. 160, No. 2, 781–793, 2004, the authors proved the asymptotic time complexity of the algorithm to be \(\tilde{O}(\log ^{12}(n))\). In other words, the algorithm takes less time than the twelfth power of the number of digits in n times a polylogarithmic (in the number of digits) factor. However, the upper bound proved in the paper was rather loose; indeed, a widely held conjecture about the distribution of the Sophie Germain primes would, if true, immediately cut the worst case down to \(\tilde{O}(\log ^6(n))\).

  5. 5.

    See the Remark in the previous footnote.

References

  1. R. Ahlswede, Remarks on Shannon’s secrecy systems. Prob. Control Inf. Theory 11(4), 301–318 (1982)

    MathSciNet  MATH  Google Scholar 

  2. L.A. Bassalygo, Lower bounds for the probability of successful substitution of messages. Prob. Inf. Trans. 29(2), 194–198 (1993)

    MATH  Google Scholar 

  3. L.A. Bassalygo, M.V. Burnashev, Estimate for the maximal number of messages for a given probability of successful deception. Probl. Inf. Trans. 30(2), 129–134 (1994)

    MathSciNet  MATH  Google Scholar 

  4. L.A. Bassalygo, M.V. Burnashev, Authentication, identification and pairwise separated measures. Problemy Peredachi Informacii (in Russian) 32(1), 41–47 (1996)

    MathSciNet  MATH  Google Scholar 

  5. R.E. Blahut, Principles and Practice of Information Theory (Addison-Wesley, Boston, 1987)

    MATH  Google Scholar 

  6. M.V. Burnashev, S. Verdu, Measures separated in \(L_{1}\)-metrics and ID-codes. Probl. Inf. Trans. 30(3), 3–14 (1994)

    MathSciNet  MATH  Google Scholar 

  7. D. Coppersmith, The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)

    Google Scholar 

  8. I. Csiszar, J. Körner, Information Theory: Coding Theorems for Discrete Memoryless Systems (Academic Press, Cambridge, 1981)

    Google Scholar 

  9. W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Google Scholar 

  10. W. Feller, An Introduction to Probability Theory and Its Applications, 3rd edn. (Wiley, New York, 1968)

    Google Scholar 

  11. B. Fitingof, Z. Waksman, Fused trees and some new approaches to source coding. IEEE Trans. Inform. Theory 34(3), 417–424 (1988)

    Google Scholar 

  12. E.N. Gilbert, F.J. Mac Williams, N.J.A. Sloane, Codes which detect deception. Bell Syst. Tech. J. 53(3), 405–424 (1974)

    Article  MathSciNet  MATH  Google Scholar 

  13. M.E. Hellman, An extension of the shannon theory approach to cryptography. IEEE Trans. Inform. Theory 23(3), 289–294 (1977)

    Article  MathSciNet  MATH  Google Scholar 

  14. R. Johannesson, A. Sgarro, Strengthening Simmons’ bound on impersonation. IEEE Trans. Inform. Theory 37(4), (1991)

    Google Scholar 

  15. D. Kahn, The Codebreakers (Mac Millan, New York, 1967)

    Google Scholar 

  16. D. Kahn, Modern cryptology. Sci. Am. 38–46 (1966)

    Google Scholar 

  17. F.J. MacWilliams, N.J.A. Sloane, The Theory of Error Correcting Codes (North-Holland, Amsterdam, 1977)

    MATH  Google Scholar 

  18. J.L. Massey, An introduction to contemporary cryptology, in Contemporary Cryptology—the Science of Information Integrity, ed. by G.J. Simmons (IEEE Press, New Jersey, 1992), pp. 1–39

    Google Scholar 

  19. U. Maurer, A unified and generalized treatment of authentication theory, in Proceedings of the 13th Symposium on Theoretical Aspects of Computer Science (STACS ’96), Lecture Notes in Computer Science (Springer, Heidelberg, 1996), pp. 387–398

    Google Scholar 

  20. R.C. Merkle, M.E. Hellman, Hiding information and signatures in trapdoor knapsacks, Secure communications and asymmetric cryptosystems, 197-215, in AAAS Selected Symposium Series (Westview, Boulder, 1982)

    Google Scholar 

  21. S. Pohlig, M. Hellman, An improved algorithm for computing logarithms in GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory 24 (1978)

    Google Scholar 

  22. R. Rivest, A. Shamir, L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  23. A. Sgarro, Informational divergence bounds for authentication codes, advances in Cryptology—Eurocrypt ’89, Lecture Notes in Computer Science (Springer, Heidelberg, 1990)

    Google Scholar 

  24. C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  25. Yu.M. Shtarkov, Some information-theoretic problems of discrete data protection. Prob. Inf. Trans. 30(2), 135–144 (1994)

    Google Scholar 

  26. G.J. Simmons, Message authentication: a game on hypergraphs. Congressus Numerantium 45, 161–192 (1984)

    MathSciNet  MATH  Google Scholar 

  27. G.J. Simmons, Authentication theory/coding theory, advances in cryptology, in Proceedings of the CRYPTO 84, Lecture Notes in Computer Science, ed. by G.R. Blakley, D. Chaum (Springer, Heidelberg, 1985), pp. 411–431

    Google Scholar 

  28. G.J. Simmons, A survey of information authentication, in Contemporary Cryptology—the Science of Information Integrity, ed. by G.J. Simmons (IEEE Press, New Jersey, 1992), pp. 379–419

    Google Scholar 

  29. D.R. Stinson, Cryptography—Theory and Practice, Discrete Mathematics and its Applications, 3rd edn. (Chapman and Hall, London, 2006) (CRC, Florida)

    Google Scholar 

  30. B.P. Tunstall, Synthesis of Noiseless Compression Codes, Ph.D. Thesis, Georgia Institute of Technology, Atlanta, 1967

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rudolf Ahlswede .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ahlswede, R. (2016). Authentication and Secret-Key Cryptology. In: Ahlswede, A., Althöfer, I., Deppe, C., Tamm, U. (eds) Hiding Data - Selected Topics. Foundations in Signal Processing, Communications and Networking, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-319-31515-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31515-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31513-3

  • Online ISBN: 978-3-319-31515-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics