Message Authentication over Noisy Channels
The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on t...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2015-01-01
|
Series: | Entropy |
Subjects: | |
Online Access: | http://www.mdpi.com/1099-4300/17/1/368 |
id |
doaj-695a006cf1724b718fbcba04be3eaf5f |
---|---|
record_format |
Article |
spelling |
doaj-695a006cf1724b718fbcba04be3eaf5f2020-11-25T00:00:23ZengMDPI AGEntropy1099-43002015-01-0117136838310.3390/e17010368e17010368Message Authentication over Noisy ChannelsFanfan Zheng0Zhiqing Xiao1Shidong Zhou2Jing Wang3Lianfen Huang4Department of Communication Engineering, Xiamen University, Xiamen 361005, ChinaDepartment of Electronic Engineering, Tsinghua University, Beijing 100084, ChinaDepartment of Electronic Engineering, Tsinghua University, Beijing 100084, ChinaDepartment of Electronic Engineering, Tsinghua University, Beijing 100084, ChinaDepartment of Communication Engineering, Xiamen University, Xiamen 361005, ChinaThe essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication.http://www.mdpi.com/1099-4300/17/1/368authenticationinformation-theoretic securitywireless communicationphysical layerwiretap channel |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Fanfan Zheng Zhiqing Xiao Shidong Zhou Jing Wang Lianfen Huang |
spellingShingle |
Fanfan Zheng Zhiqing Xiao Shidong Zhou Jing Wang Lianfen Huang Message Authentication over Noisy Channels Entropy authentication information-theoretic security wireless communication physical layer wiretap channel |
author_facet |
Fanfan Zheng Zhiqing Xiao Shidong Zhou Jing Wang Lianfen Huang |
author_sort |
Fanfan Zheng |
title |
Message Authentication over Noisy Channels |
title_short |
Message Authentication over Noisy Channels |
title_full |
Message Authentication over Noisy Channels |
title_fullStr |
Message Authentication over Noisy Channels |
title_full_unstemmed |
Message Authentication over Noisy Channels |
title_sort |
message authentication over noisy channels |
publisher |
MDPI AG |
series |
Entropy |
issn |
1099-4300 |
publishDate |
2015-01-01 |
description |
The essence of authentication is the transmission of unique and irreproducible information. In this paper, the authentication becomes a problem of the secure transmission of the secret key over noisy channels. A general analysis and design framework for message authentication is presented based on the results of Wyner’s wiretap channel. Impersonation and substitution attacks are primarily investigated. Information-theoretic lower and upper bounds on the opponent’s success probability are derived, and the lower bound and the upper bound are shown to match. In general, the fundamental limits on message authentication over noisy channels are fully characterized. Analysis results demonstrate that introducing noisy channels is a reliable way to enhance the security of authentication. |
topic |
authentication information-theoretic security wireless communication physical layer wiretap channel |
url |
http://www.mdpi.com/1099-4300/17/1/368 |
work_keys_str_mv |
AT fanfanzheng messageauthenticationovernoisychannels AT zhiqingxiao messageauthenticationovernoisychannels AT shidongzhou messageauthenticationovernoisychannels AT jingwang messageauthenticationovernoisychannels AT lianfenhuang messageauthenticationovernoisychannels |
_version_ |
1725445423292743680 |