Synonyms
Definition
Information authentication aims to verify with high probability that particular information is authentic, i.e., has not been changed.
Background
There is a rather common saying that cryptology has two faces. The first (and better known) face is cryptography in its narrow sense which aims to protect data (information) from being revealed to an opponent. The second face, known as authentication (also as known a information integrity), should guarantee with some confidence that given information is authentic, that is, has not been altered or substituted by the opponent. This confidence may depend on the computing power of the opponent (e.g., in a digital signature schemes this is the case) or not. The latter is called unconditional authentication and makes use of symmetric cryptosystems .
Theory
The model of unconditional authentication schemes (or, codes) consists of a sender, a receiver, and an opponent. The last one can observe all the...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Gilbert EN, MacWilliams FJ, Sloane NJA (1974) Codes which detect deception. Bell Syst Tech J 33(3):405–424
Simmons GJ (1992) A survey of information authentication. Contemporary cryptology, the science of information integrity. IEEE, New York, pp 379–419
Wegman MN, Carter JL (1981) New hash functions and their use in authentication and set equality. J Comput Syst Sci 22:265–279
Johansson T, Kabatianskii GA, Smeets B (1994) On the realtion between A-codes and codes correcting independent errors. In: Advances in cryptology, EUROCRYPT 1993. Lecture notes in computer science, vol 765. Springer, pp 1–11
van Tilborg HCA (1996) Authentication codes: an area where coding and cryptology meet. In: Boyd C (ed) Cryptography and coding V. Lecture notes in computer science, vol 1025. Springer, pp 169–183
Kabatianskii GA, Smeets B, Johansson T (1996) On the cardinality of systematic authentication codes via error-correcting codes. IEEE Trans Inf Theory 42(2):566–578
Bassalygo LA, Burnashev MV (1996) Authentication, identification and pairwise separated measures. Prob Inf Transm 32(1):41–47
den Boer B (1993) A simple and key-economical unconditionally authentication scheme. J Comput Secur 2(1):65–67
Vladuts SG (1998) A note on authentication codes from algebraic geometry. IEEE Trans Inf Theory 44:1342–1345
Niederreiter H, Xing C (2001) Rational points on curves over finite fields. London mathematical society lecture note series, vol 285. Cambridge University Press, Cambridge
Stinson DR (1994) Universal hashing and authentication codes. Designs Codes Cryptogr 4:369–380
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Kabatiansky, G., Smeets, B. (2011). Authentication, From an Information Theoretic Perspective. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_377
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_377
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering