Chen | Progress on Cryptography | E-Book | sack.de
E-Book

E-Book, Englisch, Band 769, 261 Seiten, eBook

Reihe: The Springer International Series in Engineering and Computer Science

Chen Progress on Cryptography

25 Years of Cryptography in China
1. Auflage 2006
ISBN: 978-1-4020-7987-0
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark

25 Years of Cryptography in China

E-Book, Englisch, Band 769, 261 Seiten, eBook

Reihe: The Springer International Series in Engineering and Computer Science

ISBN: 978-1-4020-7987-0
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark



Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students. Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.
Chen Progress on Cryptography jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


Randomness and Discrepancy Transforms.- Legendre Sequences and Modified Jacobi Sequences.- Resilient Functions with Good Cryptographic Properties.- Differential Factoring for Integers.- Simple and Efficient Systematic a-Codes from Error Correcting Codes.- On Coefficients of Binary Expression of Integer Sums.- A New Publicly Verifiable Proxy Signcryption Scheme.- Some New Proxy Signature Schemes from Pairings.- Construction of Digital Signature Schemes Based on Discrete Logarithm Problem.- How to Construct DLP-Based Blind Signatures and Their Application in E-Cash Systems.- A Group of Threshold Group-Signature Schemes with Privilege Subsets.- A New Group Signature Scheme with Unlimited Group Size.- Identity Based Signature Scheme Based on Quadratic Residues.- A New Digital Signature Scheme Based on Factoring and Discrete Logarithms.- New Transitive Signature Scheme Based on Discreted Logarithm Problem.- Blind Signature Schemes Based on Gost Signature.- One-Off Blind Public Key.- Analysis on the Two Classes of Robust Threshold Key Escrow Schemes.- Privacy-Preserving Approximately Equation Solving Over Reals.- An Authenticated Key Agreement Protocol Resistant to DoS Attack.- A Comment on a Multi-Signature Scheme.- Cryptanalysis of LKK Proxy Signature.- Attack on Identity-Based Broadcasting Encryption Schemes.- Differential-Linear Cryptanalysis of Camellia.- Security Analysis of EV-DO System.- A Remedy of Zhu-Lee-Deng’s Public Key Cryptosystem.- Quantum Cryptographic Algorithm for Classical Binary Information.- Practical Quantum Key Distribution Network Based on Stratosphere Platform.- A Survey of P2P Network Security Issues Based on Protocol Stack.- DDoS Scouter: A Simple IP Traceback Scheme.- A Method of Digital Data Transformation-Base91.- An Approach to the FormalAnalysis of TMN Protocol.


Simple and Efficient Systematic A-codes from Error Correcting Codes (p. 33-34)

Cunsheng Ding, Xiaojian Tian, Xuesong Wang

Abstract: In this paper, we present a simple and generic construction of systematic authentication codes which are optimal with respect to several bounds. The construction is based on error correcting codes. The authentication codes provide the best level of security with respect to spoofing attacks of various orders, including the impersonation and substitution attacks. The encoding of source states and the authentication verification are very simple and are perhaps the most efficient among all authentication systems.

Keywords: authentication codes, cryptography, linear codes.


1. Introduction

Nowadays authentication and secrecy of messages are two basic security requirements in many computer and communication systems, and therefore two important areas in cryptography. Authentication codes are designed to provide sender and message authentication, and dates back to 1994 when Gilbert, MacWilliams and Sloane published the first paper in this area [see Gilbert, MacWilliams, Sloane, 1974]. Later Simmons [Simmos, 1984] developed a theory of unconditional authentication, which is analogous to Shannon’s theory of unconditional secrecy [Shannon, 1949].

During the last tweenty years codes that provide authentication and/or secrecy have been considered, and bounds and characterizations of these codes have been established, see, for example, [Gilbert, MacWilliams, Sloane, 1974], [Stinson 1990], [Casse, Martin, and Wild, 1998]. Most existing optimal authentication codes are constructed from combinatorial designs, and seem hard to implement. Even if some of them can be implemented in software or hardware, the implementation may not be efficient. In addition, these authentication codes provide protection against the imperson ation and substitution attacks, but may not provide protection against spoofing attacks of order more than 1.

The purpose of this paper is to present a simple and generic construction of systematic authentication codes with the following properties:

* The authentication codes are optimal with respect to certain bounds.

* They offer the best security with respect to not only impersonation and substitution atacks, but also spoofing attacks of higher orders.

* The encoding of source states and authentication are extremely efficient and can be easily implemented in both software and hardware.

The construction of authentication codes presented here is based on error correcting codes, and is different from other constructions of authentication codes, see [Bierauer 1997], [Bierbrauer, Johansson, Kabatianskii and Smeets 1993], [Gilbert, Mac Williams, Sloane, 1974], [Kabatianskii, Smeets, and Johansson, 1996], [Simmons 1984], [Safavi-Naini and Seberry 1991], [Safavi-Naini, Wang and Xing 2001], using error correcting codes, in the sense that error correcting codes are employed to construct only the source states here in this paper.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.