Abstract
In this paper, we prove two new combinatorial characterizations of authentication codes. Authentication codes without secrecy are characterized in terms of orthogonal arrays; and general authentication codes are characterized in terms of balanced incomplete block designs. In both of these characterizations, it turns out that encoding rules must be equiprobable; in the second characteriztion, the source states must also be equiprobable.
Similar content being viewed by others
References
Brickell, E.F. 1984. A few results in message authentication. Congressus Numerantium, 43:141–154.
De Soete, M. 1988. Some constructions for authentication - secrecy codes. Lecture Notes in Computer Science, 330:57–75.
De Soete, M. 1991. New bounds and constructions for authentication/secrecy codes with splitting. Journal of Cryptology, 3:173–186.
De Soete, M., Vedder, K., and Walker, M. 1990. Cartesian authentication schemes. Lectures Notes in Computer Science 434:476–490.
Massey, J.L. 1986. Cryptography—a selective survey. In Digital Communications, Amsterdam: North-Holland, pages 3–21.
Simmons, G.J. 1984. Message authentication: a game on hypergraphs. Congressus Numerantium, 45:161–192.
Simmons, G.J. 1985. Authentication theory/coding theory. Lecture Notes in Comp. Sci., 196:411–432.
Stinson, D.R. 1987. Some constructions and bounds for authentication codes. Journal of Cryptology, 1:37–51, 1988, preliminary version appeared in Lectures Notes in Computer Science, 263:418–425.
Stinson, D.R. 1990. The combinatorics of authentication and secrecy codes. Journal of Cryptology, 2:23–49.
Author information
Authors and Affiliations
Additional information
Communicated by R.C. Mullin
A preliminary version of this paper appeared in “Advances in Cryptology—CRYPTO '91 Proceedings” Lecture Notes in Computer Science 576 (1992) 62–73, Springer-Verlag.
Research supported by NSERC grant A9287.
Rights and permissions
About this article
Cite this article
Stinson, D.R. Combinatorial characterizations of authentication codes. Des Codes Crypt 2, 175–187 (1992). https://doi.org/10.1007/BF00124896
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF00124896