Abstract
We provide three new authentication schemes without secrecy. The first two on finite fields and Galois rings, using Gray map for this link. The third construction is based on Galois rings. The main achievement in this work is to obtain optimal impersonation and substitution probabilities in the schemes. Additionally, in the first and second scheme, we simplify the source space and obtain a better relationship between the size of the message space and the key space than the one given in a recent paper. Finally, we provide a third scheme on Galois rings.
MSC:
Primary: 11T71; Secondary: 14G50; 94A60; 94A62
1. Introduction
In an authentication model introduced by Simmons [1], three participants: a transmitter, a receiver, and an intruder. The transmitter wants to send a message to the receiver through a public channel. Since the communication channel is public, there is the possibility that an intruder could deliberately observe or disrupt the ordinary communication. There are two types of authentication schemes: without secrecy and with secrecy [2]. In an authentication code without secrecy, the pieces of information are sent to the receiver in plaintext, and the secret key is used for authentication purposes only. In an authentication code with secrecy, the information pieces are sent to the receiver in an encrypted form.
Different messages can be sent by the receiver through the communication channel using the same secret key in an authentication scheme. The intruder observes the distinct messages and sends a message to the receiver, hoping that it will be accepted as authentic. This action is known as the spoofing attack [3]. If , it is called impersonation game, and if , it is called the substitution game. We study the cases when and (cases considered, for example, in [4,5,6]).
The authentication schemes without secrecy are considered, for instance, in [4,5]. There are two main problems: the first problem consists of determining optimal minimal attack probabilities. The second is keeping the size of the key spaces as low as possible compared to the size of the message space, namely the product of the dimensions of the source state space and the tag space. These goals are conflicting, and thus a trade-off strategy is required. When optimal probabilities are reached, there are then inequalities regarding the size of the key space and the message space (see Theorems 2.3 and 3.1 in [6], and Theorem 14 in [7]). In this case, an optimal relationship between the sizes of the spaces can be found.
In this work, we achieve the main objective in the three schemes: to determine the minimum values for the success probabilities of impersonation and substitution attacks (related to impersonation game and substitution game). Furthermore, the spaces’ size inequalities are better in construction 1, 2 than the scheme given in [8] because here, we use a source space with more elements (giving less difference between the key space and the message space). Besides, in [8], the source space is impractical, and the proof of injection between the key space and the encoding rules is very long (approximately eight pages) and laborious. In the second scheme, we reduce the first schemes’ parameters, thus obtaining an alternative scheme. Construction 3 is a generalization, now on Galois rings, of the scheme given in [9] on finite fields. If the characteristic of the Galois ring is , p prime, s positive integer, then there is one more variable in the scheme, s. If p is kept constant and s increases, then the values for the success probabilities of impersonation and substitution attacks decrease. If , we have the case of [9].
We work over two structures, Galois rings and finite fields, using the Gray map to relate these. Additionally, trace function and resilient functions are introduced in these schemes. Using the composition of all these functions, we obtain balanced functions and distinct properties, for instance, Corollary 1, Theorems 9, 10 and 13.
The current construction scheme is in line with previously constructed codes using rational, non-degenerated and bent functions on Galois rings and compositions of maps and the generalized Gray map on Galois rings [10,11,12].
The paper is organized as follows: In Section 2, Galois rings are reviewed, and t-resilient functions and Gray maps definitions over these rings and finite fields are recalled. It also reviews the important properties of these functions. In Section 3, three authentication schemes without secrecy are constructed and compared with other schemes. Minimum values for the success probabilities of impersonation and substitution attacks are obtained. In Section 3.1, the general authentication scheme without secrecy scheme is recalled. In Section 3.2 a first authentication scheme using the map Gray is proposed. In Section 3.3 a second scheme using the Gray map also is presented, a modification of the first scheme. In Section 3.4 a third construction only over Galois rigs is introduced. In Section 4 the final conclusions are presented.
2. Background
A monic polynomial is called monic basic irreducible (basic primitive) if its reduction modulo p is an irreducible polynomial (primitive polynomial) over . The Galois ring of characteristic and degree extension m, respect to , can be written as:
where is a monic basic irreducible polynomial of degree m and is the ideal of generated by
If is a monic basic primitive polynomial, then it is possible to define the Teichmüller set
and each element in can be written uniquely in a p-adic form,
with For details we refer the reader to [13,14].
Definition 1
([15]). Let , . The affine J-variety determined by is
Let be a function, .
- (1)
- The function f is J-resilient if , the function is balanced.
- (2)
- The function f is t-resilient if it is J-resilient for any set J such that .
The above definition is also given for finite fields of any characteristic and Galois rings [16].
Let be positive integers, p prime number. Let and be Galois rings of characteristic such that S is an extension of R of degree , R an extension of of degree m, and a t-resilient function. We denote The following observations can be found in [8].
- (1)
- For , the function , is t-resilient.
- (2)
- For , the function , where is the trace function, is a balanced function.
- (3)
- The functionis balanced whenever , , .
- (4)
- The Fourier transform of the function iswhich satisfies that because the function is balanced under the same conditions as the above assertion.
Consider . Let us recall necessary facts [12]:
Lemma 1
([12]). Let Then,
Definition 2
([12]). Let ,
is called the homogeneous weight at the ring R.
The homogeneous weight at R is given by
An important tool since it provides a relationship between Galois rings and finite fields is the Gray map.
Definition 3
([10]). The Gray map on R is
and
There is an isometry between the Galois rings and the finite fields, considering the homogeneous distance and the Hamming distance.
Theorem 1
([10]). Let Then
where is the Hamming distance and
Lemma 2
([8]). Let Φ be the Gray map on R. Then,
for all and .
3. An Authentication Scheme without Secrecy on Galois Rings
3.1. A General Scheme without Secrecry
An authentication scheme [5] provides a method to ensure the integrity of the information when sent through a channel public. A transmitter and receiver share a secret key, which allows the receiver to verify that the message received is authentic. An authentication scheme without secrecy is a quadruple:
where is the source space, is the tag space, is the space key, and is the encoding rule. The sets , and are assumed to be finite and not empty. Additionally, the message space is defined,
A transmitter and the receiver share a secret key The transmitter wants to send a piece of information (called source) to the receiver, then the transmitter calculates and inserts into the public channel the message m consisting of the ordered pair The receiver, when receiving calculates and verifies if ; if so, the receiver accepts the message as authentic, otherwise the message is rejected. Since the communication channel is public, there is a risk that an intruder may deliberately observe, and cause a communication disturbance. It is assumed that the intruder can insert a message into the channel or replace the observed message m with another message The success probabilities in these attacks (impersonation and substitution) denoted by and are respectively [6].
Lower bounds are obtained for and [5]:
Relationships between the sizes of the spaces are given.
Theorem 2
([7]). Let be an authentication scheme without secrecy in which . Then
The authentication scheme is optimal if the equality if
In this way, the relationship between the cardinality of the source space and the tag space is compromised by obtaining the minimum bounds for and .
3.2. A First Construction Using Gray Map
We give an authentication scheme without secrecy. Encoding rules with domain in a Galois ring and image over a finite field, using Gray map, trace map, and resilient functions are given. We obtain minimum bounds in success probabilities in impersonation and substitution attacks.
In [8] there are a tedious source space and a long injection proof between key space and encoding maps, eight pages approximately. Here we simplify the source space increasing its number of elements, obtaining a better relation between message space and key space. The reader can see the link between the message space and key space in [6]. On the other hand, we reduce the injection proof of [8] mainly due to Gray map properties, the new source space, and Theorem 3.
Let and We can see that . If then .
Let be a t-resilient function, and be the Gray map. We build the following authentication scheme,
where , ,
and the projection function to , sending to the k-th coordinate.
We can see that
,
where
The size of is greater than the respective space in the first scheme given in [8], and the tag space is similar. Therefore, in this work and are closer, obtaining then (following the Theorem 2) a better relationship between the spaces.
Please note that the source space can be considered to be
In this case, ,
where
Before resolving the injection problem, we give the next results.
Theorem 3.
Let , and . Then exists an element such that
Proof.
We know that there are zero divisors in S. Given there are elements a in S such that As , then
Let Hence there is at least an element in such that if
Let . In particular There is in such that
□
We will consider the value in the w coordinate of
Remark 1
([8]). Let Then
Consider two coordinates j of
If is not a multiple of q, then take c such that only . In this case and values are different.
If is multiple of q such that and , then take such that only . In this case the two coordinates k and j of are different.
If is a multiple of q such that , then take such that only . In this case and values are different.
Remark 2.
If is an even number and a generator, then or In any case, if hence Therefore, if
is in p-adic form, then
is also in its p-adic form.
Theorem 4.
Let the function be given by Then H is a bijective function.
Proof.
Note we need to prove the following:
Let coordinates of If for an element then H is a bijective function.
We compare all the possibles coordinate pairs of considering its length by parts. Let us consider three cases.
Case 1: Two coordinates of
Case 2: A coordinate of and a coordinate of
Case 3: A coordinate of and a coordinate of two cases, and
Case 1:
Let and the first two coordinates of If
by Remark 2 we can take such that:
If then Thus,
If then Thus,
Therefore if as above, given two coordinates of these are distinct. It follows from Remark 1 and Lemma 2.
Case 2:
Let us pick a coordinate of and a coordinate of
In a first place we consider the same coordinate w in and in that means and
Let and . We know that exists a k entry such that (of ). By Theorem 3 we can choose an element and such that Hence, if
and
then
So that Therefore with .
We now consider distinct coordinates in and in Similarly as above,
and
If and (p-adic form by Remark 2), then
Case 3:
Let If then
In otherwise we would have
Let two distinct elements , . Let an entry k of x, . By Theorem 3, there is a b such that ( k-th coordinate of ) and ; from here On the other hand, Therefore and and by Lemma 2,
Let , and . Using Theorem 3, we know exists such that , where and Then,
follows from Lemma 2.
Finally, the case and distinct coordinates. Let and similar to above we find such that Hence,
and
Then, we consider, . Therefore,
follows from Lemma 2.
The distinct above cases conclude the proof. □
The procedure to obtain bound for and is similar to Proposition 4 of [8]. We give this result for granted.
Theorem 5.
The scheme satisfy,
3.3. A Second Construction Using Map Gray
In this authentication scheme, we remove a parameter from the first scheme, thus reducing the key spaces’ size; however, it is necessary to reduce the size of the source space. We obtain minimum bounds in success probabilities in impersonation and substitution attacks. To show that the minimum values for and are obtained, we find balanced functions in the composition of the Gray map, the trace and the resilient functions on Galois rings.
Let us recall that and L as the scheme Let be a t-resilient function, , and be the Gray map. We build the following authentication scheme,
where ,
and the projection function to , sending to the k-th coordinate.
We can see that , where
.
Theorem 6.
Let the function be given by Then H is a bijective function.
Proof.
Note we need to prove the following:
Let coordinates of If for an element then H is a bijective function.
We compare all the possibles coordinate pairs of considering its length by parts. Let us consider 2 cases.
Case 1: Two coordinates of
Case 2: A coordinate of and a coordinate of
We can see that the proof of these two cases is similar to the first two cases of the demonstration of Theorem 4, since in this proof only is considered. Additionally, we know that the image of an element under the Gray map is a vector with all equal entries.
To find and , we give the following results. □
Let be the vectors in the image of the Gray map given in Definition 3,
Theorem 7.
The sum of two or more elements of the vector set as above has the form
where
are arbitrary permutations of the vectors in , and and are the last and second last terms of the sum, respectively, in increasing order of the indexes.
Proof.
The claim is proved by mathematical induction.
Basis step:
Let two summands, and , , . We know that
and
Please note that
which indicates that each vector of has exactly times the length of the vector . Then,
.
Inductive step:
Suppose that we have the sum of vectors (the sum in increasing order with respect to indexes) of the set found in the image of the Gray map, where the second last vector is r and the last is l:
Now, a k-th vector, , is added to the resulting sum above:
where
Observe that has length This completes the inductive step.
So by mathematical induction we prove the statement of the theorem. □
Let be the vectors in the image of the Gray map given in Definition 3,
Corollary 1.
Let , be vectors as above. Then, in the sum of at most of those terms, every element is in entries.
Proof.
Consider a finite sum, such that the vectors and are the last and second last terms of the sum, respectively, in increasing order of the indexes. The resulting vector is conformed by a permutation of the vectors in where
It follows from Theorem 7.
Then, the number of entries equal to a value is equal to , being that each element of is repeated times in □
Corollary 2.
Let , . Then .
Proof.
By proof of Theorem 7, c and can be obtained from vectors and giving the respective permutations of vectors and in these. Where
and
We can see that any element in is repeated in the same coordinates of and , times.
Please note that different from Corollary 3, here the sum of the elements have coefficients, but this does not represent a problem, since we would only have additionally permutations of elements of c and □
The following theorem is a generalization of Proposition 3 of [9], now on Galois rings.
Theorem 8.
Let be a t-resilient function and let such that and
Then,
Proof.
There are the following equalities
The last equality is justified as follows:
Please note that and cannot both be zero, unless because of the shape of source space.
If and exists such that
Then, similar to Lemma 2.1 proof of [12],
If and then, since is balanced and by Lemma 1,
Finally, if and suppose without loss of generality that the nonzero entries of are in the entries . Since f is t-resilient, these t entries of are kept constant. Then,
is balanced; even more, is constant, and also by Lemma 1 we have the last equality.
From here,
Therefore,
□
Theorem 9.
Let , be as in scheme , and . Then, the vector of length where , , has coordinates equal to t, namely the value of the distinct coordinates are balanced.
Proof.
By Corollary 1, in the sum of at most vectors of of the Gray map, every element is in entries. On the other hand, if an element
then
To have the number of images equal to a value for any element a in it is necessary to consider the possible values that can have the coefficients
If we consider the possible combinations for the sum of terms without the case and without considering the last term, then entries are equal to t.
If the term is considered:
- If the sum of the first terms is nonzero, then the number of combinations increases to since there are q distinct elements
- If the sum of the first terms is zero, then we only have the term . Since there is only one element such that , then we have a vector with entries equal to t. Hence, the possible combinations are .
The above is valid for all elements in R repeated only once because in each element of R is repeated times. Therefore, there are elements in that corresponding to coordinates of equal to t. □
Theorem 10.
Let , be as in the scheme , , . Then
where and ,
Proof.
Let and such that . Then by Theorem 8 and proceeding as in the proof of Theorem 9, □
Theorem 11.
In the scheme ,
Proof.
Let us find :
By Theorem 9, . Thus, the probability of impersonation is
Let us find :
Let and By Theorem 10 if , then
If , then . Thus, (follows from Corollary 2). Hence,
Therefore, □
3.4. Third Construction: Without Map Gray, over Galois Rings
In this scheme, the composition of resilient functions and trace function on Galois rings are provided. We get a generalization on Galois rings of the authentication scheme given on finite fields in [9]. If , then we obtain the scheme presented in [9], with the difference that the source space of the scheme constructed here has a greater cardinality; this result brings a better relationship between the message space and the key space for our scheme (see Theorems 2.3 and 3.1 in [6] and Theorem 14 in [7]).
Let be a t-resilient function, We build the following authentication scheme,
and
We can see that , where
This authentication scheme is a generalization of the first authentication scheme given in [9], where the scheme is considered on finite fields. In our scheme if we consider , then we obtain the same scheme, except the size of the source space; here, this is greater than the size of the source space given in [9]. Therefore, in this work and are closer, following the Theorem 2. Then, we have a better relationship between the spaces.
The following result ensures that the encoding rules are equally likely to be chosen.
Theorem 12.
The function defined by is a bijection.
Proof.
Suppose , Then,
Let be nonzero in its i-th entry. Let and . Then Thus, namely □
Solving similarly to the proof of Theorem 8, the following result is granted.
Theorem 13.
Let be a t-resilient function, elements of and
Then,
In the following result, minimum values for and are obtained.
Theorem 14.
Let the authentication scheme . Then,
Proof.
Let . We know that the function
is balanced. Then,
Now by Theorem 13,
Also,
Thus,
□
4. Conclusions
We obtain minimum values for the success probabilities of impersonation and substitution attacks in the distinct schemes. In the first and second scheme, compared to the first scheme in [8], a better relationship between the parameters’ size is obtained, simplifying the source space. On the other hand, the injectivity proof between the key space and the encoding rules is substantially reduced. In the second scheme, a parameter is removed from the first scheme, leading to a more in-depth analysis of the Gray map and also of the composition with the resilient functions and the trace function. In the third scheme, a generalization is obtained on Galois rings, of the first scheme on finite fields given in [9], improving the relationship between their spaces’ size, based on Theorem 2.
Author Contributions
The two authors contributed equally to conceptualization and formal analysis of this paper. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Simmons, G.J. Authentication theory/coding theory. In Advances in Cryptology, Proceedings of Crypto 84 Lecture Notes in Computer Science; Springer: Berlin, Germany, 1985; Volume 196, pp. 411–432. [Google Scholar]
- Ding, C.; Tian, X. Three Constructions of Authentication Codes with Perfect Secrecy. Des. Codes Cryptogr. 2004, 33, 227–239. [Google Scholar] [CrossRef]
- Stinson, D.R.; Teirlinck, L. A Construction for Authentication/secrecy Codes from 3-homogeneous Permutation Groups. Europ. J. Comb. 1990, 11, 73–79. [Google Scholar] [CrossRef]
- Carlet, C.; Ding, C.; Niederreiter, H. Authentication schemes from highly nonlinear functions. Des. Codes Cryptogr. 2006, 40, 71–79. [Google Scholar] [CrossRef]
- Ding, C.; Niederreiter, H. Systematic authentication codes from highly nonlinear functions. IEEE Trans. Inf. Theory 2004, 50, 2421–2428. [Google Scholar] [CrossRef]
- Stinson, D.R. Combinatorial characterization of authentication codes. Des. Codes Cryptogr. 1992, 2, 175–187. [Google Scholar] [CrossRef]
- Chanson, S.; Ding, C.; Salomaa, A. Cartesian Authentication codes from functions with optimal nonlinearity. Theor. Comput. Sci. 2003, 290, 1737–1752. [Google Scholar] [CrossRef]
- Ku-Cauich, J.C.; Morales-Luna, G.; Tapia-Recillas, H. An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities. Math. Comput. Appl. 2018, 23, 46. [Google Scholar] [CrossRef]
- Ku-Cauich, J.C.; Morales-Luna, G. Authentication Codes based on resilient Boolean maps. Des. Codes Cryptogr. 2016, 80, 619–623. [Google Scholar] [CrossRef]
- Greferath, M.; Schmidt, S.E. Gray isometries for finite chain rings and a nonlinear ternary (36, 312, 15) code. IEEE Trans. Inf. Theory 1999, 45, 2522–2524. [Google Scholar] [CrossRef]
- Ku-Cauich, J.C.; Tapia-Recillas, H. Systematic authentication codes based on a class of bent functions and the Gray map on a Galois ring. SIAM J. Discrete Math. 2013, 27, 1159–1170. [Google Scholar] [CrossRef]
- Özbudak, F.; Saygi, Z. Some constructions of systematic authentication codes using Galois rings. Des. Codes Cryptogr. 2006, 41, 343–357. [Google Scholar] [CrossRef]
- McDonald, B. Finite Rings with Identity; Pure and Applied Mathematics Series; Marcel Dekker Incorporated: New York, NY, USA, 1974. [Google Scholar]
- Wan, Z. Lectures on Finite Fields and Galois Rings; World Scientific: Singapore, 2003. [Google Scholar]
- Zhang, X.M.; Zheng, Y. Cryptographically resilient functions. IEEE Trans. Inf. Theory 1997, 43, 1740–1747. [Google Scholar] [CrossRef]
- Carlet, C. More Correlation-Immune and Resilient Functions Over Galois Fields and Galois Rings; Fumy, W., Ed.; EUROCRYPT 1997; Springer: Berlin/Heidelberg, Germany, 1997; pp. 422–433. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).