Abstract
We consider the authentication problem, using the model described by Simmons. Several codes have been constructed using combinatorial designs and finite geometries. We introduce a new way of constructing authentication codes using LFSR-sequences. A central part of the construction is an encoding matrix derived from these LFSR-sequences. Necessary criteria for this matrix in order to give authentication codes that provides protection aginst impersonation and substitution attacks will be given. These codes also provide perfect secrecy if the source states have a uniform distribution. Moreover, the codes give a natural splitting of the key into two parts, one part used aginst impersonation attacks and a second part used against substitution attacks and for secrecy simultaneously. Since the construction is based on the theory of LFSR-sequences it is very suitable for implementation and a simple implementation of the construction is given.
Similar content being viewed by others
References
Gilbert, E. N., MacWilliams, F.J. and Sloane, N.J.A. 1974. Codes which detect deception.Bell Syst. Tech. J., 53:405–424.
Simmons, G.J. 1985. Authentication theory/coding theory. InAdvances in Cryptology, Proceedings of CRYPTO 84. G.R. Blakley and D. Chaum, eds. Lecture notes in Computer Science, No. 196. New York, NY: Springer, pp. 411–431.
Stinson, D.R. 1988. Some constructions and bounds for authentication codes.Journal of Crypotology. 1:37–51.
De Soete, M. 1988. Some constructions for authentication-secrecy codes. Eurocrypt'88, Davos, Switzerland, May 25–27.Advances in Cryptology-Eurocrypt '88, ed. C.G. Günther, Berlin: Springer-Verlag, pp. 58–75.
Smeets, B., Vanroose, P., and Wan, Zhe-Xian. 1990. On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of orderL≥2.Proceedings Eurocrypt 1990. Aarhus, Denmark, pp. 306–312.
Beth, T., Jungnickel, D., and Lenz, H. 1986.Design Theory. Cambridge: Cambridge University Press.
Author information
Authors and Affiliations
Additional information
Communicated by D. Jungnickel
Rights and permissions
About this article
Cite this article
Johansson, T. A shift register construction of unconditionally secure authentication codes. Des Codes Crypt 4, 69–81 (1994). https://doi.org/10.1007/BF01388561
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF01388561