Pei | Authentication Codes and Combinatorial Designs | Buch | 978-1-58488-473-6 | sack.de

Buch, Englisch, 256 Seiten, Format (B × H): 156 mm x 235 mm, Gewicht: 498 g

Reihe: Discrete Mathematics and Its Applications

Pei

Authentication Codes and Combinatorial Designs


1. Auflage 2006
ISBN: 978-1-58488-473-6
Verlag: Chapman and Hall/CRC

Buch, Englisch, 256 Seiten, Format (B × H): 156 mm x 235 mm, Gewicht: 498 g

Reihe: Discrete Mathematics and Its Applications

ISBN: 978-1-58488-473-6
Verlag: Chapman and Hall/CRC


Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems. Authentication Codes and Combinatorial Designs presents new findings and original work on perfect authentication codes characterized in terms of combinatorial designs, namely strong partially balanced designs (SPBD).

Beginning with examples illustrating the concepts of authentication schemes and combinatorial designs, the book considers the probability of successful deceptions followed by schemes involving three and four participants, respectively. From this point, the author constructs the perfect authentication schemes and explores encoding rules for such schemes in some special cases.

Using rational normal curves in projective spaces over finite fields, the author constructs a new family of SPBD. He then presents some established combinatorial designs that can be used to construct perfect schemes, such as t-designs, orthogonal arrays of index unity, and designs constructed by finite geometry. The book concludes by studying definitions of perfect secrecy, properties of perfectly secure schemes, and constructions of perfect secrecy schemes with and without authentication.

Supplying an appendix of construction schemes for authentication and secrecy schemes, Authentication Codes and Combinatorial Designs points to new applications of combinatorial designs in cryptography.

Pei Authentication Codes and Combinatorial Designs jetzt bestellen!

Zielgruppe


Mathematicians in discrete mathematics, combinatorics, cryptography; computer scientists in cryptography and information security; and electrical engineers in communications


Autoren/Hrsg.


Weitere Infos & Material


Introduction. Authentication Schemes. Authentication Schemes with Three Participants. Authentication Schemes with Arbitration. A-Codes Based on Rational Normal Curves. t-Deisgns. Orthogonal Arrays of Index Unity. A-Codes from Finite Geometries. Authentication/Secrecy Schemes. Appendix A: A Survey of Constructions for A-Codes. References. Notations. Index.




Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.