{"title":"The use of secret-key techniques in forward information verification","authors":"G. Kuhn","doi":"10.1109/COMSIG.1992.274292","DOIUrl":null,"url":null,"abstract":"The theory of secret-key authentication techniques for verification of information is discussed, using authentication in pre-paid energy systems as an example. Since in a pre-paid system there is no reverse channel to the transmitter, the data must be checked by an appended authenticity code. Several types of cryptographic attacks are possible in general authentication systems. In the pre-paid energy system the user has additionally the means to carry out a chosen-plaintext attack. The theoretical basis for the design of the authentication code is investigated.<<ETX>>","PeriodicalId":342857,"journal":{"name":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSIG.1992.274292","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The theory of secret-key authentication techniques for verification of information is discussed, using authentication in pre-paid energy systems as an example. Since in a pre-paid system there is no reverse channel to the transmitter, the data must be checked by an appended authenticity code. Several types of cryptographic attacks are possible in general authentication systems. In the pre-paid energy system the user has additionally the means to carry out a chosen-plaintext attack. The theoretical basis for the design of the authentication code is investigated.<>