Systematic Authentication Codes Based on a Class of Bent Functions and the Gray Map on a Galois Ring

2013 ◽  
Vol 27 (2) ◽  
pp. 1159-1170 ◽  
Author(s):  
J. C. Ku-Cauich ◽  
H. Tapia-Recillas
Author(s):  
Juan Carlos Ku-Cauich ◽  
Guillermo Morales-Luna ◽  
Horacio Tapia-Recillas

Two new systematic authentication codes based on the Gray map over a Galois ring are introduced. The first introduced code attains optimal impersonation and substitution probabilities. The second code improves space sizes but it does not attain optimal probabilities. Besides it is conditioned to the existence of a special class of bent maps on Galois rings.


2018 ◽  
Vol 23 (3) ◽  
pp. 46
Author(s):  
Juan Ku-Cauich ◽  
Guillermo Morales-Luna ◽  
Horacio Tapia-Recillas

Two new systematic authentication codes based on the Gray map over a Galois ring are introduced. The first introduced code attains optimal impersonation and substitution probabilities. The second code improves space sizes, but it does not attain optimal probabilities. Additionally, it is conditioned to the existence of a special class of bent maps on Galois rings.


2012 ◽  
Vol 6 (2) ◽  
pp. 249-258 ◽  
Author(s):  
Claude Carlet ◽  
◽  
Juan Carlos Ku-Cauich ◽  
Horacio Tapia-Recillas ◽  

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


2020 ◽  
Vol 14 (6) ◽  
pp. 654-660
Author(s):  
Shishi Liu ◽  
Fengrong Zhang ◽  
Enes Pasalic ◽  
Shixiong Xia ◽  
Zepeng Zhuo
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document