首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于三类非线性函数的认证码的构造
引用本文:陈尚弟,宋敏娟.基于三类非线性函数的认证码的构造[J].中国民航学院学报,2010,28(1):57-60,64.
作者姓名:陈尚弟  宋敏娟
作者单位:中国民航大学理学院,天津300300
基金项目:国家自然科学基金,天津市自然科学基金 
摘    要:为了将高度非线性函数应用于认证码构造理论.讨论了非线性函数的度量,给出了由三类非线性函数构造的Cartesian认证码,并且当编码规则按等概率分布选取时,分别计算了三类认证码的模仿攻击和欺骗攻击成功的概率。结果表明,第二类认证码模仿攻击成功的概率达到了下界。在n取值相同的条件下,第一类认证方案模仿攻击成功的概率比第三类的大。

关 键 词:非线性函数  认证码  非线性度

Construction of Authentication Codes Based on Three Types of Nonlinear Functions
CHEN Shang-di,SONG Min-juan.Construction of Authentication Codes Based on Three Types of Nonlinear Functions[J].Journal of Civil Aviation University of China,2010,28(1):57-60,64.
Authors:CHEN Shang-di  SONG Min-juan
Institution:(College of Sciences, CA UC, Tianjin 300300, China)
Abstract:In order to construct authentication codes by applying functions with high nonlinearity, we have discussed the measure of the non-linear functions, given the the construction of Cartesian authentication code from three types of non-linear function. Under the assumption that the encoding rules of the transmitter and the receiver are chosen according to a uniform probability distribution, the maximum probabilities of success with respect to the impersonation and substitution attacks are also computed, respectively. The results show that the probability of success of impersonation attack in the second type of authentication codes reached the lower bound. Under n value the same conditions, the probability of success of impersonation attack in the first type of authentication codes is larger than the third.
Keywords:nonlinear function  authentication code  nonlinearity
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号