Bent functions on a Galois ring and systematic authentication codes

نویسندگان

  • Claude Carlet
  • Juan Carlos Ku-Cauich
  • Horacio Tapia-Recillas
چکیده

Introduction On a public communication channel there is a risk that an intruder can deliberately observe and even cause a disturbance in the communication. An authentication code provides a method for insuring the integrity of the information to be sent through this channel. These codes, first introduced by Gilbert, MacWilliams and Sloane, have since received attention by several authors and may be with secrecy and without secrecy; a subclass of the latter is the Systematic Authentication Codes (SACs). Several types of SACs have been constructed using various concepts such as highly nonlinear functions over finite fields or non-degenerated and rational functions on a Galois ring . By introducing a class of bent functions over a Galois ring of characteristic p2, (p a prime) and using the Gray map on such ring, a class of SACs is presented and an example is given to illustrate the main results.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proof of Correspondence between Keys and Encoding Maps in an Authentication Code

Systematic authentication codes without secrecy were defined in [1]. In [2] two new systematic authentication codes based on the Gray map on a Galois ring are introduced with the purpose of optimally reducing the impersonation and substitution probabilities. The first code is another example of a previously constructed code using the Gray map on Galois rings and modules over these rings [3,4]. ...

متن کامل

Authentication codes based on resilient Boolean maps

We introduce new constructions of systematic authentication codes over finite fields and Galois rings. One code is built over finite fields using resilient functions and it provides optimal impersonation and substitution probabilities. Other two proposed codes are defined over Galois rings, one is based on resilient maps and it attains optimal probabilities as well, while the other uses maps wh...

متن کامل

An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities

Two new systematic authentication code based on the Gray map over a Galois ring are introduced. The first introduced code attains optimal impersonation and substitution probabilities. The second code improves space sizes but it does not attain optimal probabilities. Besides it is conditioned to the existence of a special class of bent maps on Galois rings.

متن کامل

A Maiorana-McFarland Construction of a GBF on Galois ring

Bent functions shows some vital properties among all combinatorial objects. Its links in combinatorics, cryptography and coding theory attract the scientific community to construct new class of bent functions. Since the entire characterisation of bent functions is still unexplored but several construction on different algebraic structure is in progress. In this paper we proposed a generalized M...

متن کامل

Linear codes with two or three weights from quadratic Bent functions

Linear codes with few weights have applications in secrete sharing, authentication codes, association schemes, and strongly regular graphs. In this paper, several classes of p-ary linear codes with two or three weights are constructed from quadratic Bent functions over the finite field Fp, where p is an odd prime. They include some earlier linear codes as special cases. The weight distributions...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Adv. in Math. of Comm.

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2012