Font Size: a A A

Authentication Codes With Arbitration And Its Constructions

Posted on:2007-06-02Degree:DoctorType:Dissertation
Country:ChinaCandidate:Boubacar AbbaFull Text:PDF
GTID:1118360212470127Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
Authentication codes are nowadays used in a number of applications such as tele-communications security. Security during the processing and storage of information is very important. Generally, security involves keeping information in a secrete, integral and acceptable state within an information system.One of the ways in which information security can be achieved is through the use of codes. Mathematics provides a framework on which these codes can be constructed.Information integrity involves keeping transmitted information and received information identical. To keep information in an integral state, we must detect and rectify mistakes, which occur during the processing of information. The task of authentication is to identify and discern whether the information is valid or not, and to avoid information being substituted, detected and invalided by the opponent. Authentication involves protecting information from the opponent's attacks, which is a very important technology, while code identification solves the problem of information's authentication, which was first pointed out by G.J. Simmons in 1984. In this thesis we focus on authentication codes with arbitration. In 1990 G.J. Simmons raised the concept of authentication codes with arbitration. This model describes a situation in which there is a fourth person called an arbiter.The arbiter is the supervisor person who has access to all key information in the channel, but does not take part in any communication activities. He assumed to be honest. His only task is to solve possible disputes between the transmitter and the receiver such occur.The main objective of studying authentication codes with arbitration is to use them for the provision of better security in practical information communications. Thus, for a period of twenty years, scientists undertook research on the authentication codes...
Keywords/Search Tags:Authentication Codes, Arbitration, Orthogonal Geometry, Pseudo-symplectic Geometry
PDF Full Text Request
Related items