Skip to main content

Authentication, From an Information Theoretic Perspective

  • Reference work entry
Encyclopedia of Cryptography and Security

Synonyms

Information integrity

Definition

Information authentication aims to verify with high probability that particular information is authentic, i.e., has not been changed.

Background

There is a rather common saying that cryptology has two faces. The first (and better known) face is cryptography in its narrow sense which aims to protect data (information) from being revealed to an opponent. The second face, known as authentication (also as known a information integrity), should guarantee with some confidence that given information is authentic, that is, has not been altered or substituted by the opponent. This confidence may depend on the computing power of the opponent (e.g., in a digital signature schemes this is the case) or not. The latter is called unconditional authentication and makes use of symmetric cryptosystems .

Theory

The model of unconditional authentication schemes (or, codes) consists of a sender, a receiver, and an opponent. The last one can observe all the...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Gilbert EN, MacWilliams FJ, Sloane NJA (1974) Codes which detect deception. Bell Syst Tech J 33(3):405–424

    MathSciNet  Google Scholar 

  2. Simmons GJ (1992) A survey of information authentication. Contemporary cryptology, the science of information integrity. IEEE, New York, pp 379–419

    Google Scholar 

  3. Wegman MN, Carter JL (1981) New hash functions and their use in authentication and set equality. J Comput Syst Sci 22:265–279

    Article  MATH  MathSciNet  Google Scholar 

  4. Johansson T, Kabatianskii GA, Smeets B (1994) On the realtion between A-codes and codes correcting independent errors. In: Advances in cryptology, EUROCRYPT 1993. Lecture notes in computer science, vol 765. Springer, pp 1–11

    Google Scholar 

  5. van Tilborg HCA (1996) Authentication codes: an area where coding and cryptology meet. In: Boyd C (ed) Cryptography and coding V. Lecture notes in computer science, vol 1025. Springer, pp 169–183

    Google Scholar 

  6. Kabatianskii GA, Smeets B, Johansson T (1996) On the cardinality of systematic authentication codes via error-correcting codes. IEEE Trans Inf Theory 42(2):566–578

    Article  MATH  MathSciNet  Google Scholar 

  7. Bassalygo LA, Burnashev MV (1996) Authentication, identification and pairwise separated measures. Prob Inf Transm 32(1):41–47

    MathSciNet  Google Scholar 

  8. den Boer B (1993) A simple and key-economical unconditionally authentication scheme. J Comput Secur 2(1):65–67

    MathSciNet  Google Scholar 

  9. Vladuts SG (1998) A note on authentication codes from algebraic geometry. IEEE Trans Inf Theory 44:1342–1345

    Article  Google Scholar 

  10. Niederreiter H, Xing C (2001) Rational points on curves over finite fields. London mathematical society lecture note series, vol 285. Cambridge University Press, Cambridge

    Google Scholar 

  11. Stinson DR (1994) Universal hashing and authentication codes. Designs Codes Cryptogr 4:369–380

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Kabatiansky, G., Smeets, B. (2011). Authentication, From an Information Theoretic Perspective. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_377

Download citation

Publish with us

Policies and ethics