Computer Science – Information Theory
Scientific paper
2008-02-19
Computer Science
Information Theory
Appeared in the Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, Se
Scientific paper
In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution attacks, are investigated for both single message and multiple message authentication scenarios. For each scenario, information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably, in both scenarios, lower and upper bounds are shown to match, and hence the fundamental limit of message authentication over noisy channels is fully characterized. The opponent's success probability is further shown to be smaller than that derived in the classic authentication model in which the channel is assumed to be noiseless. These results rely on a proposed novel authentication scheme in which key information is used to provide simultaneous protection again both types of attacks.
Gamal Hesham El
Lai Lifeng
Poor Harold Vincent
No associations
LandOfFree
Authentication over Noisy Channels does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Authentication over Noisy Channels, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication over Noisy Channels will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-646656