首页 | 本学科首页   官方微博 | 高级检索  
     检索      

利用有限域上Hermite矩阵的标准型构造卡氏认证码
引用本文:周琦,王登银.利用有限域上Hermite矩阵的标准型构造卡氏认证码[J].安徽大学学报(自然科学版),2006,30(5):17-19.
作者姓名:周琦  王登银
作者单位:中国矿业大学,数学系,江苏,徐州,221008;中国矿业大学,数学系,江苏,徐州,221008
摘    要:认证码被用在通讯渠道中,除了发方和收方外,还存在一个敌方,敌方掌握某种手段,可以模仿攻击或替换攻击.本文利用有限域上Herm ite矩阵的标准型构作了一个卡式认证码并计算出该码的所有参数,进而,假定编码规则按照统一的概率分布所选取,该码的成功伪造与成功替换的最大概率P1与PS亦被计算出来.

关 键 词:卡式认证码  Hermite矩阵的标准型  有限域
文章编号:1000-2162(2006)05-0017-03
收稿时间:2006-01-11
修稿时间:2006-01-11

Using normal form of Hermite matrices over finite fields to construct cartesian authentication codes
ZHOU Qi,WANG Deng-yin.Using normal form of Hermite matrices over finite fields to construct cartesian authentication codes[J].Journal of Anhui University(Natural Sciences),2006,30(5):17-19.
Authors:ZHOU Qi  WANG Deng-yin
Institution:Department of Mathematics,China University of Mining and Technology, Xuzhou 221008, China
Abstract:Authentication codes are used in communication channels where besides the transmitter and the receiver there is an opponent who may play either the impersonation attack or the substitution attack in this paper.0ne construction of Cartesian authentication codes from the normal form of Hermite matrices over finite fields are presented and its size parameters are computed.Moreover,assume that the encoding rules are chosen according to a uniform probability distribution.The largest probabilities of a successful impersonation attack and of a successful substitution attack are also computed.
Keywords:cartesian authentication codes  normal form of Hermite matrices  finite fields
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号