Message Authentication Code over a Wiretap Channel

Dajiang Chen,Shaoquan Jiang,Zhiguang Qin
DOI: https://doi.org/10.1109/isit.2015.7282866
2015-01-01
Abstract:Message Authentication Code (MAC) is a keyed function f K such that when Alice, who shares the secret K with Bob, sends f K (M) to the latter, Bob will be assured of the integrity and authenticity of M. Traditionally, it is assumed that the channel is noiseless. Unfortunately, Maurer showed that in this case an attacker can succeed with probability equation after authenticating ∓ messages, where H(K) is the entropy of K. In this paper, we consider the setting where the channel is noisy. Specifically, Alice and Bob are connected by a discrete memoryless channel (DMC) W 1 and a noiseless but insecure channel. In addition, there is a DMC W 2 between Alice and attacker Oscar. We regard the noisy channel as an expensive resource and define the authentication rate ρ auth as the ratio of message length to the number n of channel W 1 uses. The security of this model depends on the channel coding for f K (M). A natural coding scheme is to use the secrecy capacity achieving code of Csiszár and Körner. Intuitively, this is also the optimal strategy. However, we propose a coding scheme that achieves a higher ρ auth . Our crucial point is that under a secrecy capacity code, Bob can fully recover f K (M) while in our model this is not necessary as we only need to detect the existence of the modification. How to detect the malicious modification without recovering f K (M) is the main contribution of this work. We achieve this through random coding techniques.
What problem does this paper attempt to address?