Abstract
Authentication is one of the basic cryptographic techniques. Its aim is to provide a receiver with some kind of proof that the information comes from the intended sender. In this chapter we are going to discuss authentication whose security is unconditional, i.e., its security is independent of the computational power of a potential attacker. Simmons wrote a good review on the subject in [475]. Stinson treated authentication in Chap. 10 of his book [496].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Pieprzyk, J., Hardjono, T., Seberry, J. (2003). Authentication. In: Fundamentals of Computer Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-07324-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-662-07324-7_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-07713-5
Online ISBN: 978-3-662-07324-7
eBook Packages: Springer Book Archive