Book ChapterDOI
Authentication codes: An area where coding and cryptology meet
Henk C. A. van Tilborg
- pp 169-183
TLDR
The purpose of authentication schemes is to add proof to a message that the message is authentic, i.e. it was not sent by an imposter and it has not been altered on its way to the receiver.Abstract:
Among many applications of cryptography, the use of authentication schemes is of great practical importance. The purpose of authentication schemes [3], [10] is to add proof to a message that the message is authentic, i.e. it was not sent by an imposter and it has not been altered on its way to the receiver. The imposter may replace an authenticated message by another message (substitution) or may just try to send his own message (impersonation). The aspect of secrecy could also be introduced here, but in many cases the receiver just wants to be sure that the message is genuine. Think for instance of offices that are communicating with each other.read more
Citations
More filters
Book
Combinatorial Designs for Authentication and Secrecy Codes
TL;DR: This monograph brings together in one source foundational and current contributions concerning design-theoretic constructions and characterizations of authentication and secrecy codes of combinatorial designs.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier,Phil Sutherland +1 more
TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Book
The theory of information and coding
TL;DR: In this paper, the authors present a survey of advanced topics for part I and a survey for part II of a survey on the Gaussian channel and the source coding theorem, including linear codes, BCH Goppa codes, and variable-length source coding.
Book
Contemporary Cryptology: The Science of Information Integrity
TL;DR: This book provides the engineer and scientist with algorithms, protocols, and applications of the science of information integrity, with an emphasis on the cryptographic elements of the subject.