Graph design for data authentication over insecure communication channel

Data authentication is a critical issue in communication systems. Based on data authentication techniques, the receiver can affirm that the data is really sent from an authentic sender and it is not a fabricated message from an opponent. One of the important techniques of data authentication is auth...

Full description

Bibliographic Details
Main Authors: H. Shabana, R. El-Shanawany, S.R. Halawa
Format: Article
Language:English
Published: Elsevier 2023-07-01
Series:Alexandria Engineering Journal
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1110016823003885
_version_ 1797790852565696512
author H. Shabana
R. El-Shanawany
S.R. Halawa
author_facet H. Shabana
R. El-Shanawany
S.R. Halawa
author_sort H. Shabana
collection DOAJ
description Data authentication is a critical issue in communication systems. Based on data authentication techniques, the receiver can affirm that the data is really sent from an authentic sender and it is not a fabricated message from an opponent. One of the important techniques of data authentication is authentication codes. Authentication codes are utilized in communication channels in which there may be an opponent besides the sender and the receiver. This opponent may play both substitution attack or impersonation attack. Via an impersonation attack the opponent can transmit a message on the channel to the receiver and hopes that the receiver will take delivery of it as an authentic. Through the substitution attack we imply that once the opponent observes a message is sent by the sender, he substitutes that message with another one and expect that the receiver will accepted it as authentic. For each of those styles of attacks, there is an associated probability that the opponent will success to cheat the receiver. That are the probability of a successful impersonation attack P1 and the probability of a successful substitution attack P2. For more security of the communication system, it is far proposed to construct an authentication code with small values of P1 and P2. In this paper, we present an approach for design a graph message authentication code. This approach constructs a set of mutually orthogonal graph designs on a regular graph H by a graph G. Imposing certain conditions on H and G, we build a combinatorial design on H that yields to an authentication code with low probability of impersonation attack and of substitution attack. Moreover, we prove that such probabilities are related to the order of the graph H.
first_indexed 2024-03-13T02:10:25Z
format Article
id doaj.art-ba451a115757413a9136159c28c6eb53
institution Directory Open Access Journal
issn 1110-0168
language English
last_indexed 2024-03-13T02:10:25Z
publishDate 2023-07-01
publisher Elsevier
record_format Article
series Alexandria Engineering Journal
spelling doaj.art-ba451a115757413a9136159c28c6eb532023-07-01T04:34:25ZengElsevierAlexandria Engineering Journal1110-01682023-07-0175649662Graph design for data authentication over insecure communication channelH. Shabana0R. El-Shanawany1S.R. Halawa2Department of Physics and Engineering Mathematics, Faculty of Electronic Engineering, Menoufia University, Egypt; Corresponding author.Department of Physics and Engineering Mathematics, Faculty of Electronic Engineering, Menoufia University, EgyptDepartment of Mathematics, Faculty of Education, Ain Shams University, EgyptData authentication is a critical issue in communication systems. Based on data authentication techniques, the receiver can affirm that the data is really sent from an authentic sender and it is not a fabricated message from an opponent. One of the important techniques of data authentication is authentication codes. Authentication codes are utilized in communication channels in which there may be an opponent besides the sender and the receiver. This opponent may play both substitution attack or impersonation attack. Via an impersonation attack the opponent can transmit a message on the channel to the receiver and hopes that the receiver will take delivery of it as an authentic. Through the substitution attack we imply that once the opponent observes a message is sent by the sender, he substitutes that message with another one and expect that the receiver will accepted it as authentic. For each of those styles of attacks, there is an associated probability that the opponent will success to cheat the receiver. That are the probability of a successful impersonation attack P1 and the probability of a successful substitution attack P2. For more security of the communication system, it is far proposed to construct an authentication code with small values of P1 and P2. In this paper, we present an approach for design a graph message authentication code. This approach constructs a set of mutually orthogonal graph designs on a regular graph H by a graph G. Imposing certain conditions on H and G, we build a combinatorial design on H that yields to an authentication code with low probability of impersonation attack and of substitution attack. Moreover, we prove that such probabilities are related to the order of the graph H.http://www.sciencedirect.com/science/article/pii/S1110016823003885Latin squaresEdge decompositionMutually orthogonal decompositionsGraph designOrthogonal graph designsAuthentication codes
spellingShingle H. Shabana
R. El-Shanawany
S.R. Halawa
Graph design for data authentication over insecure communication channel
Alexandria Engineering Journal
Latin squares
Edge decomposition
Mutually orthogonal decompositions
Graph design
Orthogonal graph designs
Authentication codes
title Graph design for data authentication over insecure communication channel
title_full Graph design for data authentication over insecure communication channel
title_fullStr Graph design for data authentication over insecure communication channel
title_full_unstemmed Graph design for data authentication over insecure communication channel
title_short Graph design for data authentication over insecure communication channel
title_sort graph design for data authentication over insecure communication channel
topic Latin squares
Edge decomposition
Mutually orthogonal decompositions
Graph design
Orthogonal graph designs
Authentication codes
url http://www.sciencedirect.com/science/article/pii/S1110016823003885
work_keys_str_mv AT hshabana graphdesignfordataauthenticationoverinsecurecommunicationchannel
AT relshanawany graphdesignfordataauthenticationoverinsecurecommunicationchannel
AT srhalawa graphdesignfordataauthenticationoverinsecurecommunicationchannel