Download Authentication Codes and Combinatorial Designs by Dingyi Pei PDF

By Dingyi Pei

Researchers and practitioners of cryptography and data protection are continuously challenged to answer new assaults and threats to details platforms. Authentication Codes and Combinatorial Designs provides new findings and unique paintings on excellent authentication codes characterised by way of combinatorial designs, specifically powerful partly balanced designs (SPBD).Beginning with examples illustrating the recommendations of authentication schemes and combinatorial designs, the publication considers the likelihood of profitable deceptions through schemes related to 3 and 4 individuals, respectively. From this aspect, the writer constructs the fitting authentication schemes and explores encoding ideas for such schemes in a few specified cases.Using rational basic curves in projective areas over finite fields, the writer constructs a brand new relatives of SPBD. He then offers a few demonstrated combinatorial designs that may be used to build excellent schemes, corresponding to t-designs, orthogonal arrays of index team spirit, and designs developed via finite geometry. The publication concludes through learning definitions of excellent secrecy, homes of completely safe schemes, and buildings of excellent secrecy schemes with and with out authentication.Supplying an appendix of building schemes for authentication and secrecy schemes, Authentication Codes and Combinatorial Designs issues to new functions of combinatorial designs in cryptography.

Show description

Read Online or Download Authentication Codes and Combinatorial Designs PDF

Similar combinatorics books

Words, Languages & Combinatorics III

The examine effects released during this ebook diversity from natural mathematical concept (semigroup thought, discrete arithmetic, and so on. ) to theoretical laptop technological know-how, particularly formal languages and automata. The papers handle matters within the algebraic and combinatorial theories of semigroups, phrases and languages, the constitution conception of automata, the class thought of formal languages and codes, and functions of those theories to varied components, like quantum and molecular computing, coding conception, and cryptography.

Conceptual mathematics : a first introduction to categories

This can be an creation to puzzling over trouble-free arithmetic from a categorial perspective. The objective is to discover the results of a brand new and basic perception concerning the nature of arithmetic. Foreword; observe to the reader; Preview; half I. the class of units: 1. units, maps, composition; half II.

Extra resources for Authentication Codes and Combinatorial Designs

Sample text

4 Let k, t be two positive integers with k ≥ t. Suppose there exists a set of k vectors αi = (ci1 , ci2 , · · · , cit ) ∈ Ftq , 1 ≤ i ≤ k and any t vectors in the set are linearly independent. Set S = {1, 2, · · · , k}, M = Fq , and E = Ftq . For any source state i and encoding rule e = (a1 , a2 , · · · , at ) ∈ Ftq define t e(i) = j=1 cij aj . Prove that the code constructed is t-fold perfect with P0 = P1 = · · · = Pt−1 = 1/q if the encoding rules have a uniform probability distribution. 5 Let F2q be the vector space of dimension 2 over the finite field Fq .

For a given f ∈ ER , let ET (f ) denote the random variable of valid encoding rules of f ; it takes its values from ET (f ). Similarly, for a given e ∈ ET , let ER (e) denote the random variable of decoding rules of which e is valid; it takes its values from ER (e). 2 For any given f ∈ ER , suppose that ET (f ) has a uniform probability distribution and PRr = 2H(ET |ER ,M r+1 )−H(ET |ER ,M r ) , 0 ≤ r ≤ t − 1. Then for any mr ∗ m ∈ MRr+1 , f ∈ ER (mr ∗ m), PRr = Copyright 2006 by Taylor & Francis Group, LLC |ET (f, mr ∗ m)| .

2 A orthogonal array OA(nt , k, n, t) is an r − (kn, nt , k; nt−r , 0) design for 2 ≤ r ≤ t and is a 1 − (kn, nt , k, nt−1 ) design as well. 5 Authentication Codes and Combinatorial Designs Combinatorial Bound In this section we discuss the combinatorial bound on Pr . Recall that |S | = k, |M | = v, and |E | = b. 1}. Also, we know that only when m = mi for 1 ≤ i ≤ r it is possible for P (m|mr ) = p(e|mr ) e∈E (mr ∗m) to be nonzero. 21) holds if and only if P (m|mr ) = p(e|mr ) = e∈E (mr ∗m) k−r v−r for any mr = (m1 , m2 , · · · , mr ) ∈ M r and any m ∈ M with m = mi , 1 ≤ i ≤ r.

Download PDF sample

Rated 4.37 of 5 – based on 25 votes