Authentication over noisy channels

Lifeng Lai, Hesham El Gamal, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this work , message authentication over noisy channels Is studied. The model developed In this paper Is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks , namely Impersonation attacks and substitution attacks , are Investigated for both single message and multiple message authentication scenarios. For each scenario , Information theoretic lower and upper bounds on the opponent's success probability are derived. Remarkably , In both scenarios , lower and upper bounds are shown to match , and hence the fundamental limit of message authentication over noisy channels Is fully characterized. The opponent's success probability Is further shown to be smaller than that derived In the classic authentication model in which the channel is assumed to be noiseless. These results rely on a proposed novel authentication scheme in which key information is used to provide simultaneous protection again both types of attacks.

Original languageEnglish (US)
Title of host publication45th Annual Allerton Conference on Communication, Control, and Computing 2007
PublisherUniversity of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering
Pages1030-1034
Number of pages5
ISBN (Electronic)9781605600864
StatePublished - 2007
Externally publishedYes
Event45th Annual Allerton Conference on Communication, Control, and Computing 2007 - Monticello, United States
Duration: Sep 26 2007Sep 28 2007

Publication series

Name45th Annual Allerton Conference on Communication, Control, and Computing 2007
Volume2

Other

Other45th Annual Allerton Conference on Communication, Control, and Computing 2007
Country/TerritoryUnited States
CityMonticello
Period9/26/079/28/07

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Authentication over noisy channels'. Together they form a unique fingerprint.

Cite this