Securing Harari's Authentication Scheme

Code-based authentication schemes are very fast and efficient for implementation in small devices. The security of these schemes and the size of underlying coding matrices are often the main barriers to their use in practice. In this paper, the authors remove the security flaw of a classical code-based authentication scheme and modify it to achieve a secure code-based authentication scheme. They provide a formal proof of security for the modified scheme. More-over, they apply the recent improvement to reduce the size of the coding matrix and to gain an efficient authentication scheme suitable for small devices.

Provided by: International Journal of Network Security Topic: Security Date Added: May 2012 Format: PDF

Find By Topic