Abstract
The transmission of information in a communication process faces various threats. These threats arise if during the transmission, the messages are at the mercy of unauthorized actions of an adversary, that is, if the channel used for the communication is insecure. Basically there are three attacks the communicants have to be aware of when using an information transmission system. An adversary might observe the communication and gain information about it, he might insert false messages or he might replace legally sent messages by false messages. The protection against the first attack is a question of secrecy and the protection against the latter two attacks is a question of authenticity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
First enunciated by A. Kerckhoffs (1835–1903) ([15], pp. 235).
- 2.$$\frac{{\left( {\begin{array}{c}K-a\\ a-i\end{array}}\right) }}{{\left( {\begin{array}{c}K\\ a\end{array}}\right) }}=\underbrace{\frac{K-a}{K}\cdots \frac{K-2a+i+1}{K-a+i+1}}_{a-i\;\text {factors}}\underbrace{\frac{a}{K-a+i}\cdots \frac{a-i+1}{K-a+1}}_{i\; \text {factors}}\le \left( \frac{K-a}{K}\right) ^{a-i}\left( \frac{a}{K-a}\right) ^{i}. $$
- 3.
\({\left( {\begin{array}{c}n\\ k\end{array}}\right) }\le \left( \frac{n}{k}\right) ^{k}(1+\frac{k}{n-k})^{n-k}e^{\frac{1}{12n}-\frac{1}{12k+1}-\frac{1}{12(n-k)+1}+\frac{1}{2}\ln (\frac{n}{2\pi k(n-k)})}\)
\(\le \left( \frac{ne}{k}\right) ^{k}e^{\frac{1}{2n}-\frac{1}{6n+1}+\frac{1}{2}\ln (\frac{n}{2\pi (n-1)})}\le \left( \frac{ne}{k}\right) ^{k}\).
- 4.
Remark by the editors: This statement is not up to date, because in the paper “M. Agrawal, N. Kayal, and N. Saxena, “PRIMES is in P”, Annals of Mathematics, Vol. 160, No. 2, 781–793, 2004, the authors proved the asymptotic time complexity of the algorithm to be \(\tilde{O}(\log ^{12}(n))\). In other words, the algorithm takes less time than the twelfth power of the number of digits in n times a polylogarithmic (in the number of digits) factor. However, the upper bound proved in the paper was rather loose; indeed, a widely held conjecture about the distribution of the Sophie Germain primes would, if true, immediately cut the worst case down to \(\tilde{O}(\log ^6(n))\).
- 5.
See the Remark in the previous footnote.
References
R. Ahlswede, Remarks on Shannon’s secrecy systems. Prob. Control Inf. Theory 11(4), 301–318 (1982)
L.A. Bassalygo, Lower bounds for the probability of successful substitution of messages. Prob. Inf. Trans. 29(2), 194–198 (1993)
L.A. Bassalygo, M.V. Burnashev, Estimate for the maximal number of messages for a given probability of successful deception. Probl. Inf. Trans. 30(2), 129–134 (1994)
L.A. Bassalygo, M.V. Burnashev, Authentication, identification and pairwise separated measures. Problemy Peredachi Informacii (in Russian) 32(1), 41–47 (1996)
R.E. Blahut, Principles and Practice of Information Theory (Addison-Wesley, Boston, 1987)
M.V. Burnashev, S. Verdu, Measures separated in \(L_{1}\)-metrics and ID-codes. Probl. Inf. Trans. 30(3), 3–14 (1994)
D. Coppersmith, The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)
I. Csiszar, J. Körner, Information Theory: Coding Theorems for Discrete Memoryless Systems (Academic Press, Cambridge, 1981)
W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
W. Feller, An Introduction to Probability Theory and Its Applications, 3rd edn. (Wiley, New York, 1968)
B. Fitingof, Z. Waksman, Fused trees and some new approaches to source coding. IEEE Trans. Inform. Theory 34(3), 417–424 (1988)
E.N. Gilbert, F.J. Mac Williams, N.J.A. Sloane, Codes which detect deception. Bell Syst. Tech. J. 53(3), 405–424 (1974)
M.E. Hellman, An extension of the shannon theory approach to cryptography. IEEE Trans. Inform. Theory 23(3), 289–294 (1977)
R. Johannesson, A. Sgarro, Strengthening Simmons’ bound on impersonation. IEEE Trans. Inform. Theory 37(4), (1991)
D. Kahn, The Codebreakers (Mac Millan, New York, 1967)
D. Kahn, Modern cryptology. Sci. Am. 38–46 (1966)
F.J. MacWilliams, N.J.A. Sloane, The Theory of Error Correcting Codes (North-Holland, Amsterdam, 1977)
J.L. Massey, An introduction to contemporary cryptology, in Contemporary Cryptology—the Science of Information Integrity, ed. by G.J. Simmons (IEEE Press, New Jersey, 1992), pp. 1–39
U. Maurer, A unified and generalized treatment of authentication theory, in Proceedings of the 13th Symposium on Theoretical Aspects of Computer Science (STACS ’96), Lecture Notes in Computer Science (Springer, Heidelberg, 1996), pp. 387–398
R.C. Merkle, M.E. Hellman, Hiding information and signatures in trapdoor knapsacks, Secure communications and asymmetric cryptosystems, 197-215, in AAAS Selected Symposium Series (Westview, Boulder, 1982)
S. Pohlig, M. Hellman, An improved algorithm for computing logarithms in GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory 24 (1978)
R. Rivest, A. Shamir, L.M. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)
A. Sgarro, Informational divergence bounds for authentication codes, advances in Cryptology—Eurocrypt ’89, Lecture Notes in Computer Science (Springer, Heidelberg, 1990)
C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)
Yu.M. Shtarkov, Some information-theoretic problems of discrete data protection. Prob. Inf. Trans. 30(2), 135–144 (1994)
G.J. Simmons, Message authentication: a game on hypergraphs. Congressus Numerantium 45, 161–192 (1984)
G.J. Simmons, Authentication theory/coding theory, advances in cryptology, in Proceedings of the CRYPTO 84, Lecture Notes in Computer Science, ed. by G.R. Blakley, D. Chaum (Springer, Heidelberg, 1985), pp. 411–431
G.J. Simmons, A survey of information authentication, in Contemporary Cryptology—the Science of Information Integrity, ed. by G.J. Simmons (IEEE Press, New Jersey, 1992), pp. 379–419
D.R. Stinson, Cryptography—Theory and Practice, Discrete Mathematics and its Applications, 3rd edn. (Chapman and Hall, London, 2006) (CRC, Florida)
B.P. Tunstall, Synthesis of Noiseless Compression Codes, Ph.D. Thesis, Georgia Institute of Technology, Atlanta, 1967
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ahlswede, R. (2016). Authentication and Secret-Key Cryptology. In: Ahlswede, A., Althöfer, I., Deppe, C., Tamm, U. (eds) Hiding Data - Selected Topics. Foundations in Signal Processing, Communications and Networking, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-319-31515-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-31515-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31513-3
Online ISBN: 978-3-319-31515-7
eBook Packages: EngineeringEngineering (R0)