期刊文献+

利用有限域上Hermite矩阵的标准型构造卡氏认证码 被引量:1

Using normal form of Hermite matrices over finite fields to construct cartesian authentication codes
下载PDF
导出
摘要 认证码被用在通讯渠道中,除了发方和收方外,还存在一个敌方,敌方掌握某种手段,可以模仿攻击或替换攻击.本文利用有限域上Herm ite矩阵的标准型构作了一个卡式认证码并计算出该码的所有参数,进而,假定编码规则按照统一的概率分布所选取,该码的成功伪造与成功替换的最大概率P1与PS亦被计算出来. Authentication codes are used in communication channels where besides the transmitter and the receiver there is an opponent who may play either the impersonation attack or the substitution attack in this paper. One construction of Cartesian authentication codes from the normal form of Hermite matrices over finite fields are presented and its size parameters are computed. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution. The largest probabilities of a successful impersonation attack and of a successful substitution attack are also computed.
作者 周琦 王登银
出处 《安徽大学学报(自然科学版)》 CAS 北大核心 2006年第5期17-19,共3页 Journal of Anhui University(Natural Science Edition)
关键词 卡式认证码 Hermite矩阵的标准型 有限域 cartesian authentication codes normal form of Hermite matrices finite fields
  • 相关文献

参考文献6

  • 1G Simmons. Authentication theory/secrecy theory, Advances in Cryptography [ J ]. Proc Of Crypto 84, Lecture Notes in Computer Science, Springer, 1985:411 - 431. 被引量:1
  • 2Z Wan. Construction of Cartesian authentication codes from unitary geometry [ J ]. Designs Codes and Cryptography,1992 (2) :335 - 356. 被引量:1
  • 3Z Wan. Further constructions of Cartesian authentication codes from symplectic geometry [ J ]. Northeastern Mathematical Journal, 1992 (8) : 4 - 20. 被引量:1
  • 4Z. Wan, B. Smeets and P. Vanroose, On the construction of authentication codes over symplectic space [ J ]. IEEE Transactions on Information Theory, 1994,40( 3 ) :920 - 929. 被引量:1
  • 5A Wan. Geometry of classical groups over finite fields [ C ]. Student literature, Chart Well Brall, Lund, Sweden, 1993. 被引量:1
  • 6游宏,南基洙.Using Normal Form of Matrices over Finite Fields to Construct Cartesian Authentication Codes [J].Journal of Mathematical Research and Exposition,1998,18(3):341-346. 被引量:8

二级参考文献4

  • 1Wan Z,Chart Well Bratt,1993年 被引量:1
  • 2Wan Z,Codes Cryptography,1992年,2卷,335页 被引量:1
  • 3Wan Z,Northeast Math J,1992年,8卷,4页 被引量:1
  • 4Wan Z,On the construction of authentication codes over symplectic space 被引量:1

共引文献7

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部