期刊文献+

利用有限域上Hermite矩阵的标准型构造卡氏认证码 被引量:1

Using normal form of Hermite matrices over finite fields to construct cartesian authentication codes
下载PDF
导出
摘要 认证码被用在通讯渠道中,除了发方和收方外,还存在一个敌方,敌方掌握某种手段,可以模仿攻击或替换攻击.本文利用有限域上Herm ite矩阵的标准型构作了一个卡式认证码并计算出该码的所有参数,进而,假定编码规则按照统一的概率分布所选取,该码的成功伪造与成功替换的最大概率P1与PS亦被计算出来. Authentication codes are used in communication channels where besides the transmitter and the receiver there is an opponent who may play either the impersonation attack or the substitution attack in this paper. One construction of Cartesian authentication codes from the normal form of Hermite matrices over finite fields are presented and its size parameters are computed. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution. The largest probabilities of a successful impersonation attack and of a successful substitution attack are also computed.
作者 周琦 王登银
出处 《安徽大学学报(自然科学版)》 CAS 北大核心 2006年第5期17-19,共3页 Journal of Anhui University(Natural Science Edition)
关键词 卡式认证码 Hermite矩阵的标准型 有限域 cartesian authentication codes normal form of Hermite matrices finite fields
  • 相关文献

参考文献6

  • 1G Simmons. Authentication theory/secrecy theory, Advances in Cryptography [ J ]. Proc Of Crypto 84, Lecture Notes in Computer Science, Springer, 1985:411 - 431.
  • 2Z Wan. Construction of Cartesian authentication codes from unitary geometry [ J ]. Designs Codes and Cryptography,1992 (2) :335 - 356.
  • 3Z Wan. Further constructions of Cartesian authentication codes from symplectic geometry [ J ]. Northeastern Mathematical Journal, 1992 (8) : 4 - 20.
  • 4Z. Wan, B. Smeets and P. Vanroose, On the construction of authentication codes over symplectic space [ J ]. IEEE Transactions on Information Theory, 1994,40( 3 ) :920 - 929.
  • 5A Wan. Geometry of classical groups over finite fields [ C ]. Student literature, Chart Well Brall, Lund, Sweden, 1993.
  • 6游宏,南基洙.Using Normal Form of Matrices over Finite Fields to Construct Cartesian Authentication Codes[J].Journal of Mathematical Research and Exposition,1998,18(3):341-346. 被引量:8

二级参考文献4

  • 1Wan Z,Chart Well Bratt,1993年
  • 2Wan Z,Codes Cryptography,1992年,2卷,335页
  • 3Wan Z,Northeast Math J,1992年,8卷,4页
  • 4Wan Z,On the construction of authentication codes over symplectic space

共引文献7

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部