Graph design for data authentication over insecure communication channel
Data authentication is a critical issue in communication systems. Based on data authentication techniques, the receiver can affirm that the data is really sent from an authentic sender and it is not a fabricated message from an opponent. One of the important techniques of data authentication is auth...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-07-01
|
Series: | Alexandria Engineering Journal |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S1110016823003885 |
_version_ | 1797790852565696512 |
---|---|
author | H. Shabana R. El-Shanawany S.R. Halawa |
author_facet | H. Shabana R. El-Shanawany S.R. Halawa |
author_sort | H. Shabana |
collection | DOAJ |
description | Data authentication is a critical issue in communication systems. Based on data authentication techniques, the receiver can affirm that the data is really sent from an authentic sender and it is not a fabricated message from an opponent. One of the important techniques of data authentication is authentication codes. Authentication codes are utilized in communication channels in which there may be an opponent besides the sender and the receiver. This opponent may play both substitution attack or impersonation attack. Via an impersonation attack the opponent can transmit a message on the channel to the receiver and hopes that the receiver will take delivery of it as an authentic. Through the substitution attack we imply that once the opponent observes a message is sent by the sender, he substitutes that message with another one and expect that the receiver will accepted it as authentic. For each of those styles of attacks, there is an associated probability that the opponent will success to cheat the receiver. That are the probability of a successful impersonation attack P1 and the probability of a successful substitution attack P2. For more security of the communication system, it is far proposed to construct an authentication code with small values of P1 and P2. In this paper, we present an approach for design a graph message authentication code. This approach constructs a set of mutually orthogonal graph designs on a regular graph H by a graph G. Imposing certain conditions on H and G, we build a combinatorial design on H that yields to an authentication code with low probability of impersonation attack and of substitution attack. Moreover, we prove that such probabilities are related to the order of the graph H. |
first_indexed | 2024-03-13T02:10:25Z |
format | Article |
id | doaj.art-ba451a115757413a9136159c28c6eb53 |
institution | Directory Open Access Journal |
issn | 1110-0168 |
language | English |
last_indexed | 2024-03-13T02:10:25Z |
publishDate | 2023-07-01 |
publisher | Elsevier |
record_format | Article |
series | Alexandria Engineering Journal |
spelling | doaj.art-ba451a115757413a9136159c28c6eb532023-07-01T04:34:25ZengElsevierAlexandria Engineering Journal1110-01682023-07-0175649662Graph design for data authentication over insecure communication channelH. Shabana0R. El-Shanawany1S.R. Halawa2Department of Physics and Engineering Mathematics, Faculty of Electronic Engineering, Menoufia University, Egypt; Corresponding author.Department of Physics and Engineering Mathematics, Faculty of Electronic Engineering, Menoufia University, EgyptDepartment of Mathematics, Faculty of Education, Ain Shams University, EgyptData authentication is a critical issue in communication systems. Based on data authentication techniques, the receiver can affirm that the data is really sent from an authentic sender and it is not a fabricated message from an opponent. One of the important techniques of data authentication is authentication codes. Authentication codes are utilized in communication channels in which there may be an opponent besides the sender and the receiver. This opponent may play both substitution attack or impersonation attack. Via an impersonation attack the opponent can transmit a message on the channel to the receiver and hopes that the receiver will take delivery of it as an authentic. Through the substitution attack we imply that once the opponent observes a message is sent by the sender, he substitutes that message with another one and expect that the receiver will accepted it as authentic. For each of those styles of attacks, there is an associated probability that the opponent will success to cheat the receiver. That are the probability of a successful impersonation attack P1 and the probability of a successful substitution attack P2. For more security of the communication system, it is far proposed to construct an authentication code with small values of P1 and P2. In this paper, we present an approach for design a graph message authentication code. This approach constructs a set of mutually orthogonal graph designs on a regular graph H by a graph G. Imposing certain conditions on H and G, we build a combinatorial design on H that yields to an authentication code with low probability of impersonation attack and of substitution attack. Moreover, we prove that such probabilities are related to the order of the graph H.http://www.sciencedirect.com/science/article/pii/S1110016823003885Latin squaresEdge decompositionMutually orthogonal decompositionsGraph designOrthogonal graph designsAuthentication codes |
spellingShingle | H. Shabana R. El-Shanawany S.R. Halawa Graph design for data authentication over insecure communication channel Alexandria Engineering Journal Latin squares Edge decomposition Mutually orthogonal decompositions Graph design Orthogonal graph designs Authentication codes |
title | Graph design for data authentication over insecure communication channel |
title_full | Graph design for data authentication over insecure communication channel |
title_fullStr | Graph design for data authentication over insecure communication channel |
title_full_unstemmed | Graph design for data authentication over insecure communication channel |
title_short | Graph design for data authentication over insecure communication channel |
title_sort | graph design for data authentication over insecure communication channel |
topic | Latin squares Edge decomposition Mutually orthogonal decompositions Graph design Orthogonal graph designs Authentication codes |
url | http://www.sciencedirect.com/science/article/pii/S1110016823003885 |
work_keys_str_mv | AT hshabana graphdesignfordataauthenticationoverinsecurecommunicationchannel AT relshanawany graphdesignfordataauthenticationoverinsecurecommunicationchannel AT srhalawa graphdesignfordataauthenticationoverinsecurecommunicationchannel |