1. Introduction
Resilient maps were introduced in 1985 by Chor et al. [
1] and independently by Bennett et al. [
2], in the context of key distribution and quantum cryptography protocols. Resilient maps have also been used in the generation of random sequences aimed to stream ciphering [
3].
The current paper deals with the notion of systematic authentication codes without secrecy as defined in [
4] and considered in [
5,
6]. Within the systematic authentication codes, two main problems arise: the first problem consists of getting optimal minimal attack probabilities, the second problem consists of keeping the size of the key spaces as low as possible in comparison with the size of the message space—namely, the product of the sizes of the source state space and the tag space. These two goals are conflicting, and thus a trade-off strategy is required. Theorems 2.3 and 3.1 in [
7] state that when optimal values for the
impersonation and the
substitution probabilities
,
are reached, then some relations among the sizes of the spaces arise (see also Theorem 14 in [
8]).
In this paper, two new systematic authentication codes based on the Gray map on a Galois ring are introduced with the purpose of optimally reducing the impersonation and substitution probabilities. In the context of authentication codes, the substitution and impersonation probabilities are important characteristics. We build a first code with optimal values for these probabilities but at the cost of huge key and source spaces. A second code is introduced with convenient spaces sizes, but the corresponding substitution probability is not optimal.
The first code presented here is another example of a previously constructed code using the Gray map on Galois rings and modules over these rings [
9]. The construction in [
9] is based on rational non-degenerated maps. Here, through the generalized Gray map and resilient maps on Galois rings we obtain minimal upper bounds for the attack probabilities, thus improving former codes. Indeed, the obtained impersonation and substitution probabilities are optimal. However, the introduced code has a smaller source state space in comparison with the key space. We introduce precise definitions over Galois rings of the notions of resilient maps and the generalized Gray map. The introduced construction over Galois rings is translated into finite fields via the Gray map, thus providing similar codes on Galois fields.
In [
10] a family of bent maps is introduced over Galois rings of characteristic
, with
p a prime number. The class of these maps is closed under multiplication by units in the Galois ring, under the assumption that there exists a similar class of bent functions in Galois rings of characteristic
, with
. For this hypothetical code we obtain spaces of acceptable size, similar to sizes in former constructions but with improved impersonation and substitution probabilities. In fact, the probabilities are lower than those in other authentication codes with no optimal probabilities.
The paper is organized as follows: In
Section 2 the basic construction of the Gray map is recalled. In
Section 3 a new systematic authentication code based on the Gray map is introduced and its main properties are determined. In
Section 3.1 the general construction of a systematic authentication code is recalled, and the new code is treated in
Section 3.2 and
Section 3.3. In
Section 3.4 we introduce the second code on the assumption of the existence of an appropriate class of bent functions. In
Section 4 we make a succinct comparison with formerly introduced systematic authentication codes, and in
Section 5 we state some conclusions. The existence of the required bijection between the key space and the set of encoding maps is proved exhaustively and the current proof is rather long (hence, tedious). However, the reader can find it in [
11].
2. The Gray Map over Galois Rings
Let
be the ring of integers modulo
, where
p is a prime and
r a positive integer. A monic polynomial
is called
monic basic irreducible (primitive) if its reduction modulo
p is an irreducible (primitive) polynomial over
. The Galois ring of characteristic
is defined as
where
is a monic basic irreducible polynomial of degree
l and
is the ideal of
generated by
. The polynomial
can be taken such that it is a divisor of
.
The Galois ring
is local with maximal ideal
and residue field isomorphic to
where
. This ring has characteristic
, is a chain ring, and
. The group of units of
R is
, where
G is a group of order
,
has order
, and
. The Teichmüller set of representatives of
R is
. Any
has a unique
p-adic (multiplicative) representation:
where
for
. The ring
R has the structure of a
-module:
For details and further properties we refer the reader to ([
12], [Chapter XVI]) and [
13].
Let p be a prime number, , and . Let and be the corresponding Galois rings of degrees ℓ and . The ring A is an extension of , and B is an extension of A. Let , and be the corresponding trace maps, and let and denote the maximal ideals of zero divisors of A and B, respectively.
Firstly, let us recall some well-known facts [
9], as follows.
Lemma 1. Let . Then the following assertions hold:
- 1.
- 2.
- 3.
From this point forward we assume that
. The
homogeneous weight on the ring
A is the map [
14]
,
where
and, according to Lemma 1,
Indeed, the map , is a metric on A. The ring A can also be considered as the metric space .
Let
be the
q-dimensional vector space over the Galois field
, and “⊗” denote the Kroenecker product
,
We iterate this product “on the right” as:
Let
be the
j-th vector in the canonical basis of
, where
is the Kroenecker delta,
is the vector with constant entries equal to 1, and
the reduction modulus
p map. Let
be the set of Teichmüller representatives of
in
A and let
For each index
let
(here, for any
,
and
). For
let
. The vector
is the concatenation of
blocks, each one consisting of the concatenation of blocks of the form
, where
is the
j-th coordinate of
, for
(see Relation (
3)).
Then, the vector
can be efficiently constructed: given an index
k, with
, let
and
. Then,
is the
-th coordinate of
. In summary, for each
, the vector
defined by (
3) can be expressed as:
where we are using the notation introduced immediately after the relation (
3). As a final vector, let us define
The
Gray map is defined as follows:
where the elements of
A are represented in their
p-adic form (i.e.,
).
In particular, if
, we have
Then the Gray map, as defined by (
5), equals, for any element of the form
:
which coincides with the definition given in [
9].
The vector space can be endowed with a structure of metric space with the Hamming distance : the distance between two vectors is the number of entries at which they differ.
Two important properties of the Gray map are stated by the following proposition:
Proposition 1. The following assertions hold:
- 1.
Isometry[14]. The Gray map is an isometry between the Galois ring A and the vector space : - 2.
The Gray map preserves addition:
4. Parameter Comparison with Other Codes
We summarize quite succinctly in
Table 2 a parameter comparison of our codes with other codes based on the Gray map. There, as in Relation (15),
D is an integer in the interval
, and, as stated in [
9] Prop. 3.5,
N is a positive integer such that
Our first code provides optimal values for
and
for all parameters
q,
m,
n,
r in which the code exists. For the codes in [
9] the optimal values are obtained only if
. However, in our code, the cardinality of the key space is greater than the product of the cardinalities of the source and tag spaces.
In [
10], it is stated that a map
valued on a Galois ring
is a
bent function if
and it was shown that, for the special case of
, whenever
k and
are relatively prime, then for any
and any unit
in
A, the map
,
, is a bent function (
).
Namely, for the special case of , a class of bent maps, closed by the multiplication of units in the Galois ring, can be used to build a systematic authentication code (SAC).
Later, the Gray map and the above-mentioned class of bent maps were used to build a new SAC, improving the impersonation and substitution probabilities. In fact, these constructions can be extended to any characteristic
, with
, under the assumption that there exists a similar class of bent maps, closed by the multiplication of units in the Galois ring. In this case, the obtained SAC
would have the parameters displayed in
Table 3.
In comparison with the values displayed at
Table 2, we have that this last hypothetical construction would have more convenient parameters for the spaces: the source space is greater than the key space, and the tag space is rather small. Even more, it has a greater difference on the cardinality of the cardinality of the key space and the product of the cardinalities of the source and tag spaces. This is an advantage even when comparing with other SACs with no optimal impersonation and substitution probabilities. For instance, this last hypothetical construction would improve the probabilities and the space sizes of the codes in [
4,
8], although the code in [
8] does not attain the optimal values for these probabilities.
Similar constructions were performed through resilient maps and functions generalizing bent maps, for any characteristic , with .
5. Conclusions
An authentication code using the trace, the Gray maps, and the resilient functions on Galois rings were constructed. In this regard, the current construction is similar to the constructions in [
9]. In order to diminish the substitution and impersonation probabilities, here we used resilient maps on Galois rings of general characteristic
, with
p a prime number and
r an integer greater or equal to 2, in contrast to the former approach based either on non-degenerate and rational maps on Galois rings of general characteristic [
9], or on bent maps on Galois rings of characteristic
. The current construction provides optimal substitution and impersonation probabilities, at the expense of growth of cardinalities and an elaborated space structure. In contrast with [
9], the key space in our code is of greater cardinality than the source space. Our code attains optimal probability values, but it has a key space greater than the corresponding source space.
A second authentication code was built, and this code has convenient space sizes with a significant difference between the key space and the source space, and a small cardinality in the tag space. The probabilities are rather small, but the substitution probability is not optimal. However, this second construction is conditioned to the existence of a class of bent functions closed under the multiplication by units in the corresponding Galois ring. We look towards the proof of the existence of this necessary class of bent functions.