Authentication theory and hypothesis testing

By interpreting message authentication as a hypothesis testing problem, this paper provides a generalized treatment of information-theoretic lower bounds on an opponent's probability of cheating in one-way message authentication. We consider the authentication of an arbitrary sequence of messages, using the same secret key shared between sender and receiver. The adversary tries to deceive the receiver by forging one of the messages in the sequence. The classical two types of cheating are considered, impersonation and substitution attacks, and lower bounds on the cheating probability for any authentication system are derived for three types of goals the adversary might wish to achieve. These goals are: (1) that the fraudulent message should be accepted by the receiver, or, in addition, (2) that the adversary wishes to know or (3) wants to even choose the value of the plaintext message obtained by the legitimate receiver after decoding with the secret key.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  Rolf Johannesson,et al.  Strengthening Simmons' bound on impersonation , 1991, IEEE Trans. Inf. Theory.

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[5]  Richard E. Blahut,et al.  Principles and practice of information theory , 1987 .

[6]  Andrea Sgarro,et al.  Information-Theoretic Bounds for Authentication Frauds , 1992, J. Comput. Secur..

[7]  Douglas R. Stinson Some Constructions and Bounds for authentication Codes , 1986, CRYPTO.

[8]  Andrea Sgarro,et al.  Informational Divergence Bounds for Authentication Codes , 1990, EUROCRYPT.

[9]  Viiveke Fåk Repeated use of codes which detect deception (Corresp.) , 1979, IEEE Trans. Inf. Theory.

[10]  Andrea Sgarro Blind coding: authentication frauds from the point of view of rate-distortion theory , 2001 .

[11]  Ben J. M. Smeets Bounds on the probability of deception in multiple authentication , 1994, IEEE Trans. Inf. Theory.

[12]  Gustavus J. Simmons,et al.  Authentication Theory/Coding Theory , 1985, CRYPTO.

[13]  F. MacWilliams,et al.  Codes which detect deception , 1974 .

[14]  Rainer A. Rueppel Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings , 1993 .

[15]  Thomas Johansson Lower bounds on the probability of deception in authentication with arbitration , 1994, IEEE Trans. Inf. Theory.