
Security of personal information has become a major concern due to the increasing use of the Internet by individuals in the digital world. The main purpose here is to prevent an unauthorized person from gaining access to confidential information. The solution to such a problem is by authentication of users. Authentication has a very important role in achieving security. Mutually orthogonal graph squares (MOGS) are considered the generalization of mutually orthogonal Latin squares (MOLS). Also, MOGS are generated from edge decompositions of complete bipartite graphs by isomorphic graphs. Graph-orthogonal arrays can be constructed by MOGS. In this paper, graph-orthogonal arrays are used for constructing authentication codes. These arrays are the encoding matrices of authentication tags. We introduce the concepts and basic theorems of MOGS, graph-orthogonal arrays, and authentication codes. After constructing graph-orthogonal arrays by MOGS, then there is an established mapping between graph-orthogonal arrays and message set. This manages us to construct perfect non-splitting and splitting Cartesian authentication codes. In both cases, we calculate the probabilities of successful impersonation attacks and substitution attacks. Besides that, the performance of constructed non-splitting and splitting authentication codes is analyzed. In the end, optimal authentication codes and secure authentication codes are constructed.
Citation: A. El-Mesady, Y. S. Hamed, Khadijah M. Abualnaja. A novel application on mutually orthogonal graph squares and graph-orthogonal arrays[J]. AIMS Mathematics, 2022, 7(5): 7349-7373. doi: 10.3934/math.2022410
[1] | A. El-Mesady, Y. S. Hamed, M. S. Mohamed, H. Shabana . Partially balanced network designs and graph codes generation. AIMS Mathematics, 2022, 7(2): 2393-2412. doi: 10.3934/math.2022135 |
[2] | Adel Alahmadi, Tamador Alihia, Patrick Solé . The build up construction for codes over a non-commutative non-unitary ring of order $ 9 $. AIMS Mathematics, 2024, 9(7): 18278-18307. doi: 10.3934/math.2024892 |
[3] | Adel Alahmadi, Altaf Alshuhail, Patrick Solé . The mass formula for self-orthogonal and self-dual codes over a non-unitary commutative ring. AIMS Mathematics, 2023, 8(10): 24367-24378. doi: 10.3934/math.20231242 |
[4] | Hao Song, Yuezhen Ren, Ruihu Li, Yang Liu . Optimal quaternary Hermitian self-orthogonal $ [n, 5] $ codes of $ n \geq 492 $. AIMS Mathematics, 2025, 10(4): 9324-9331. doi: 10.3934/math.2025430 |
[5] | Chaofeng Guan, Ruihu Li, Hao Song, Liangdong Lu, Husheng Li . Ternary quantum codes constructed from extremal self-dual codes and self-orthogonal codes. AIMS Mathematics, 2022, 7(4): 6516-6534. doi: 10.3934/math.2022363 |
[6] | Ganesh Gandal, R Mary Jeya Jothi, Narayan Phadatare . On very strongly perfect Cartesian product graphs. AIMS Mathematics, 2022, 7(2): 2634-2645. doi: 10.3934/math.2022148 |
[7] | Qiuyan Wang, Weixin Liu, Jianming Wang, Yang Yan . A class of nearly optimal codebooks and their applications in strongly regular Cayley graphs. AIMS Mathematics, 2024, 9(7): 18236-18246. doi: 10.3934/math.2024890 |
[8] | Mohamed R. Zeen El Deen, Ghada Elmahdy . New classes of graphs with edge $ \; \delta- $ graceful labeling. AIMS Mathematics, 2022, 7(3): 3554-3589. doi: 10.3934/math.2022197 |
[9] | Jalal-ud-Din, Ehtasham-ul-Haq, Ibrahim M. Almanjahie, Ishfaq Ahmad . Enhancing probabilistic based real-coded crossover genetic algorithms with authentication of VIKOR multi-criteria optimization method. AIMS Mathematics, 2024, 9(10): 29250-29268. doi: 10.3934/math.20241418 |
[10] | Xiying Zheng, Bo Kong, Yao Yu . Quantum codes from $ \sigma $-dual-containing constacyclic codes over $ \mathfrak{R}_{l, k} $. AIMS Mathematics, 2023, 8(10): 24075-24086. doi: 10.3934/math.20231227 |
Security of personal information has become a major concern due to the increasing use of the Internet by individuals in the digital world. The main purpose here is to prevent an unauthorized person from gaining access to confidential information. The solution to such a problem is by authentication of users. Authentication has a very important role in achieving security. Mutually orthogonal graph squares (MOGS) are considered the generalization of mutually orthogonal Latin squares (MOLS). Also, MOGS are generated from edge decompositions of complete bipartite graphs by isomorphic graphs. Graph-orthogonal arrays can be constructed by MOGS. In this paper, graph-orthogonal arrays are used for constructing authentication codes. These arrays are the encoding matrices of authentication tags. We introduce the concepts and basic theorems of MOGS, graph-orthogonal arrays, and authentication codes. After constructing graph-orthogonal arrays by MOGS, then there is an established mapping between graph-orthogonal arrays and message set. This manages us to construct perfect non-splitting and splitting Cartesian authentication codes. In both cases, we calculate the probabilities of successful impersonation attacks and substitution attacks. Besides that, the performance of constructed non-splitting and splitting authentication codes is analyzed. In the end, optimal authentication codes and secure authentication codes are constructed.
Abbreviations: MOLS: Mutually orthogonal Latin squares; MOGS: Mutually orthogonal graph squares; BIBD: Balanced incomplete block designs; kF: k isolated copies of graph F; Km: Complete graph with m vertices; Km,n: Complete bipartite graph with size m+n where vertices are classified into two sets with sizes m and n; Pm: Path graph on m vertices; E(G): Edge set of graph G; V(G): Vertex set of graph G; G∪H: Disjoint union of graphs G and H; PI or P0: Probability of successful impersonation attacks; Ps or P1: Probability of successful substitution attacks; Xn: The set {1, 2, …, n}; L(x,y): Entry in row x and column y of square matrix L
Nowadays, information technology is widely used in almost all disciplines around the world. Convenience to people's lives has been brought due to the unprecedented revolution of network technology. At the same time, a huge and tough problem also arises in front of human beings-information security issues, such as information leakage, viruses, tampering, and so on. Since ancient times, people have realized the importance of protecting the confidentiality of sensitive messages. Cryptology (secret writing) has been an established problem. This science was mainly concerned with diplomatic and military applications for a long period. In the modern era, storing and transmitting information has become cheap and simple based on strong techniques of information. There is a way by which a huge amount of information can be transferred, but almost anyone can access it. Security communications have several problems such as data integrity, confidentiality authentication, secret sharing, hidden information, and non-repudiation. Such problems can be solved by steganography and cryptography. Some means and methods are used to prevent information from being stolen or damaged to ensure information security. In this section, we just introduce a brief overview of previous works and a summary of our contributions. In 1948, a mathematical theory of communication was presented by Shannon [1]. This topic gave birth to information theory. In 1974, the authors of [2] proposed authentication codes. Simmons introduced the authentication code model described in [3,4,5,6]. Cryptology is associated with many new problems. For instance, an adversary can read transmitted messages and change them. Also, an adversary could intervene illegally to construct and send a fraudulent message to a receiver, and he or she hopes that the receiver takes a wrong decision.
A receiver may be worried about changing the content of a message by an adversary in transmission. Also, a receiver is worried about knowing a real sender. Authentication of messages takes care of these two major points. In modern times, the two important aspects of information security are authentication and secrecy problems. Authentication protection can be obtained by an authentication scheme, while secrecy protection can be obtained by a secrecy scheme. Authentication and secrecy are two independent aspects of information security. In some situations, secrecy may be essential, and in other situations, it is not essential. Moreover, secrecy may or may not be taken into account in the authentication scheme. Authentication is responsible for the protection of messages from tampering and impersonating by a deceptive adversary, and secrecy protects sensitive messages from eavesdropping.
An adversary can cheat a receiver. Before a transmitter sends any message to a receiver, an adversary can send a bogus message to a receiver, and a receiver will accept it as a genuine message. This may lead to a wrong decision taken by a receiver. What an adversary did, in this case, is called an impersonation attack. Also, an adversary can launch another kind of attack called a substitution attack. Also, an adversary can launch another kind of attack called a substitution attack. In a substitution attack, an adversary can change the content of an observed message. And a receiver also accepts it; this will lead to a different action from what a transmitter intended. Authentication code prevents these attacks. The probability of a successful impersonation attack is denoted by PI or P0, and the probability of a successful substitution attack is denoted by Ps or P1.
There is a wide and considerable literature on authentication codes. The authors in [7] constructed authentication codes using groups. Some linear authentication codes were constructed in [8]. Bipartite graphs were used to construct authentication codes with secrecy [9]. From geometries over finite fields, several authors constructed Cartesian authentication codes, see, for example, [10,11,12,13,14,15,16,17]. Authentication codes without splitting were studied in several papers [18,19,20,21,22,23,24,25,26], while De Soete handled authentication codes with splitting in [27]. Optimal authentication codes also were intensively studied [5,24,28,29,30]. In authentication codes, "optimal" means that the number of keys (encoding rules) and deception probabilities are as small as possible. Combinatorial structures such as difference sets, BIBDs, external BIBDs (EBIBDs), splitting BIBDs, and external difference families (EDFs) were used for constructing optimal authentication codes. And also, in a reverse way, optimal authentication codes were used to construct some of the aforementioned combinatorial structures. In this paper, we propose a new combinatorial structure based on MOGS which correspond to mutually orthogonal edge decompositions of complete bipartite graphs by several graphs such as paths, stars, disjoint union of graphs, and so on. Additional background material for this field may be found in [31,32,33,34,35,36].
The main contributions made in this manuscript are the following: The decomposition of complete bipartite graph Kn,n can be constructed by a large number of graphs such as stars, paths, cycles, and so forth. We tried to find mutually orthogonal decompositions ofKn,n.These decompositions can be converted to MOGS. Then these graph squares are used to construct graph-orthogonal arrays. By these graph-orthogonal arrays, we can construct a large number of authentication codes where there is a large number of graphs that can be used for decompositions of complete bipartite graph Kn,n. Hence, if an opponent knows the used code generated by a certain graph, then we can use another graph for the construction of an authentication code. Also, for each graph, we will get a code with new characteristics. Our work is considered a directed application for graph decompositions of Kn,n in coding theory. This is a new proposal, and it will open a new horizon for research in this direction, and it will be the beginning of a lot of future work. This proposal leads to the construction of Cartesian authentication codes with splitting and non-splitting. In both cases, we prove that the constructed authentication codes are perfect. There is a special case of MOGS called mutually orthogonal Latin squares (MOLS) which are used for constructing optimal authentication codes. Also, we use Latin squares to construct secure authentication codes.
The remaining part of the paper is organized into the following six sections. Detailed definitions and basic results on graph-orthogonal arrays and MOGS are found in Subsection 2.1, while Subsection 2.2 describes basic theorems and definitions of authentication schemes and the probability of successful deceptions. Section 3 studies the construction of general perfect non-splitting Cartesian authentication codes based on MOGS. Section 4 studies the construction of general perfect splitting Cartesian authentication codes based on MOGS. The focus of Section 5 is on the construction of optimal authentication codes based on MOLS that are considered a special case of MOGS. Authentication codes with confidentiality based on graph squares are presented in Section 6. Finally, some concluding remarks are given in Section 7.
In this subsection, we present definitions of graph-orthogonal arrays and MOGS, along with a few basic results.
Definition 1 ([37]). Assume that Gis a subgraph of Kn,n with size n. A square matrix Lof order nis called a G-square if each element in Xn={1,2,..,n}appears precisely ntimes in L, and all the graphs Giwhere E(Gi)={(x0,y1):L(x0,y1)=i,i∈Xn} are isomorphic to G.The index set for the rows of L is the set Xn×{0} and the index set for the columns of L is the set Xn×{1}. Each G-square of order n represents an edge decomposition of Kn,n by the graph G.
Example 1. An edge decomposition of K3,3 by K1,3 is shown in Figure 1. There is a G-square L of order 3 corresponding to this decomposition, where G is isomorphic to K1,3. Here n = 3, X3={1,2,3}. The K1,3-square can be represented as sollows:
L=112131101112022230333 |
From L, it is clear that the rows are indexed by X3×{0}={10,20,30},the columns are indexed by X3×{1}={11,21,31}, and each element in X3={1,2,3} appears precisely 3 times in L. From Figure 1, the edge set and the vertex set for G1,G2, and G2 are as follows:
E(G1)={(x0,y1):L(x0,y1)=1}={(10,11),(10,21),(10,31)},V(G1)={10,11,21,31}, |
E(G2)={(x0,y1):L(x0,y1)=2}={(20,11),(20,21),(20,31)},V(G2)={20,11,21,31}, |
E(G3)={(x0,y1):L(x0,y1)=3}={(30,11),(30,21),(30,31),V(G3)={30,11,21,31}. |
Definition 2 ([37]). Let L1 be a G-square of order n with entries from a set A and M2 be a G-square of order n with entries from a set B. Then L1 and L2 are orthogonal if, for every a∈A and for every b∈B, there is exactly one cell (x0,y1) such that L1(x0,y1)=a and L2(x0,y1)=b. A set of k G-squares of order n, say L1,…,Lk, are called mutually orthogonal (pairwise orthogonal) G-squares (MOGS) if Li and Lj are orthogonal for all 1≤i<j≤k.
Notice that in this paper, we consider A=B=Xn.
Example 2. Three MOGS for the graph P4 are represented by the squares L1, L2, and L3. Also, three MOGS for the graph P3∪K1,1 are represented by the squares M1, M2, and M3. See Figure 2 for more illustration.
L1=[112133232]L2=[121331322]L3=[122323113] |
M1=[112223331]M2=[121232313]M3=[133211322] |
The superimposition of L1 and L2 is as follows:
(L1,L2)=[(1,1)(1,2)(2,1)(1,3)(3,3)(3,1)(2,3)(3,2)(2,2)] |
All the ordered pairs are different and equivalent to X3×X3={1,2,3}×{1,2,3}. Hence, L1 and L2 are orthogonal. Similarly, the orthogonality between L1and L3, L2and L3, M1 and M2, M1 and M3, M2 and M3 can be shown.
Theorem 1 ([38]). For every bipartite graph G with n≥2 edges, we have N(n,G)≤n, where N(n,G) refers to the maximal number of G-squares in the largest possible set of mutually orthogonal G-squares of order n.
There are several results on MOGS in the literature. For a survey on MOGS, see [37,38,39,40,41,42,43,44,45].
Definition 3 ([46]). Suppose B is a symbol set with cardinality |B|=m≥1, μ, and λ≥2 are integers. An orthogonal array A is an μm2×λarray with entries from B such that within any two columns from A, every ordered pair of symbols from B occurs in exactly μ rows of A, denoted as OA(m,λ,μ).
Definition 4. If we have λ mutually orthogonal m×m G-squares, then by converting each G-square to an m2×1 array by juxtaposing the m columns of the G-square, then we have λ arrays with m2×1 dimension, then by combining these arrays we get an m2×λ array which is called a graph-orthogonal array G-OA(m,λ,1).
Proposition 1 ([40]). If we have λ mutually orthogonal m×m G-squares based on m symbols, then, we can obtain a G-orthogonal array G-OA(m,λ,1).
Proof. The construction technique is as follows. Convert each of the λ mutually orthogonal m×m G-squares to an m2×1 array by juxtaposing the m columns of the G-square. Then, these arrays are combined to construct an m2×λ array. Since there are λ mutually orthogonal G-squares based on m symbols, the number of the levels equals m.Furthermore, since the λ G-squares are mutually orthogonal, then the superimposition of any two columns of the m2×λ array gives Xm×Xm, i.e., the m2×λ array has strength two. Every ordered pair of symbols from Xm occurs in exactly one row of G-OA(m,λ,1).
Example 3. We have 3 MOGS A1,A2, and A3 (4K2-squares). Then, there is an 4K2-OA(4,3,1) that can be represented by A,
A1=[4312124321343421]A2=[4231132424133142]A3=[4123143223413214]A=[444111222333321234143412132423314241213342431124] |
In what follows, we assume that the probability distribution of sources and encoding rules is uniform.
A transmitter, receiver, and adversary are three participants in the authentication model considered in this paper. A sequence of source states can be conveyed to a receiver by a transmitter. An adversary can deceive a receiver by impersonating a transmitter and sending fraudulent messages or tampering with messages sent to a receiver. Transmitter and receiver must cooperate to deal with a spoofing attack by an adversary. Both sender and receiver must trust each other in this model.
In what follows, the set of all sources states that a transmitter will send to a receiver will be denoted by G. Source states are encoded based on one encoding rule for protecting source states from an adversary attack. The set of all encoding rules will be denoted by H. The set of all possible encoded messages will be denoted by R. The one-to-one mapping h∈H is a mapping from G to R. There is always an agreement between the transmitter and the receiver on an encoding rule h before the transmission process. The encoding rule h is considered a secret to an adversary. The source states are encoded using h by a transmitter. Then, through an insecure public channel, encoded messages are transferred. A receiver receives a message sent by a transmitter and checks whether it belongs to the rangeh(G). Only messages belonging to the rangeh(G) will be accepted as authentic. It is assumed that the adversary is fully familiar with the system, including all encoding rules. But, the particular encoding rule known by a transmitter and a receiver is unknown to an adversary. If the fraudulent message of the adversary is compatible with the used encoding rule, then the adversary is successful in his attack. The possibility of successful deception by an adversary can be decreased by repeatedly alternating the used encoding rule. Formally, the authentication code can be defined as follows.
Definition 5 ([47]). Suppose G, H, and R are three non-empty finite sets, where G is the set of source states, Hthe set of encoding rules, and Rthe set of encoded messages. Suppose ϕ:G×H→R is a map, then the four tuple(G,H,R;ϕ) is called an authentication code, if
(i) the map ϕ is surjective and
(ii) for any r∈R and h∈H, if there is an element g∈G satisfying ϕ(g,h)=r, then such an element g is uniquely determined by the given r and h.
Now, we show the parameters of an authentication code as follows: |G|=α, |H|=β, and |R|=γ. Hence, the authentication code can be denoted by AC(α,β,γ). For the authentication code, we can construct a β×α encoding matrix (A). Rows of A correspond to the encoding rule of an authentication code, and columns of A correspond to the source of an authentication code.
Definition 6 ([47]). Let g∈G, put R(g)={r∈R|r=h(g) for some h∈H}. The set R represents messages that can be used to transmit the source state g. If R(g1) and R(g2) are disjointed, for any two source states g1 and g2, the authentication codes, in this case, are called Cartesian codes. Cartesian codes have no secrecy since one may know the source state once the transmitted message is observed.
In a simplified way, Cartesian authentication codes can be redefined as follows: regardless of the used encoding rule, if you know the messager, you can know the corresponding source g, so the Cartesian authentication codes are without secrecy.
Definition 7 ([47]). Let (G,H,R;ϕ) be an authentication code. This authentication code is called non-Cartesian if for any r∈R and h∈H, there is a unique g∈G such that ϕ(g,h)=r. Non-Cartesian authentication codes are with secrecy.
Definition 8 ([46]). Let (G,H,R;ϕ) be an authentication code. This authentication code is said to have splitting if, under the same encoding rule h∈H, more than one message corresponds to a source state g∈G.
Definition 9 ([47]). Let (G,H,R;ϕ) be an authentication code. This authentication code is said to have no splitting if g can only correspond to one message r under the action of h.
Definition 10 ([47]). The Cartesian authentication code (G,H,R;ϕ) is called an optimal Cartesian authentication code if |G|=α+1, |H|=α2, |R|=α(α+1) and P0=P1=1α.
Definition 11 ([47]). For the authentication code (G,H,R;ϕ), if log2P0=log2P1=−I(R; H), then the authentication code, in this case, is perfect, where
I(R;H)=H(R)−H(R|H)=∑rP(r)log21P(r)−∑r,hxP(r,hx)log21P(r|hx), | (1) |
where H(R) is the entropy of R, H(R|H) is the entropy of R|H, and P refers to the probability.
In perfect authentication codes, it can be seen that P0 and P1 are the minimum. For the probability of a successful impersonation attack P0, there is an agreement between a sender and a receiver about the encoding rule h in advance.
In impersonation attacks, an adversary does not know which authentication tag each source corresponds to under this encoding rule h. Hence, an adversary arbitrarily selects a source g and an authenticator a∈T(T refers to the set of authentication tags). Impersonation attacks succeed if the message (g,a) satisfies h(g)=a, and P0 can be expressed as follows:
P0=maxg∈G,a∈T|{h∈H|h(g)=a}||H|. | (2) |
For the probability of a successful substitution attack P1, there is an agreement between a sender and a receiver about the encoding rule h that acts on the message r. A message r=(g,a) is transmitted by a transmitter to a receiver, where h(g)=a∈T. Then, a message ˊr=(ˊg,ˊa) is sent by an adversary to replace the message r=(g,a), where h(ˊg)=ˊa∈T, ˊg≠g. That is, h is in the set {h∈H|h(g)=a,h(ˊg)=ˊa}, and the substitution attack is successful. The probability of substitution attack P1 can be expressed as follows:
P1=maxˊg≠g∈G;a´,a∈T|{h∈H|h(g)=a,h(ˊg)=ˊa}||{h∈H|h(g)=a}|. | (3) |
An authentication code enables a sender to encode a message using a secret key. Then, by the same key, a designated receiver can decode the message. Flow diagrams for the encoding and decoding for authentication codes are shown in Figures 3 and 4, respectively [48].
In this section, we will use MOGS and graph-orthogonal arrays to construct general non-splitting Cartesian authentication codes. We first construct a graph-orthogonal array by k MOGS of order n. Then there is a mapping between the graph-orthogonal array and the message set by using the property of the graph-orthogonal array. And an encoding matrix for the Cartesian authentication code is obtained. Secondly, we get a perfect Cartesian authentication code when we obtain an encoding matrix by a graph-orthogonal array. Besides that, in this paper, some new Cartesian authentication codes can also be obtained by transforming a graph-orthogonal array in column order, or partition of a message set or changing the mapping between a message set and an authentication tag. Thus, it can be said that the used construction method has global significance from a theoretical point of view. For more illustration, see Figure 5 that shows a flow chart for the proposed algorithm in this paper. Also, a pseudo code for the proposed algorithm can be described as follows:
Input: Complete bipartite graph Kn,n.
Output: Authentication code.
1. Constructing kmutually orthogonal edge decompositions of Kn,n by G.
2. Generating k mutually orthogonal G squares of order n.
3. Constructing a G-orthogonal array OA(n,k,1).
4. Generating an authentication code using the OA(n,k,1).
5. End.
Suppose we have k MOGS of order n: M1,M2,…,Mk. From Theorem 1, k≤n. Suppose Mωαrefer to the ωthcolumn of Mα. Based on Proposition 1, the following graph-orthogonal array can be constructed.
Z=[M11M12…M1kM21M22…M2k⋮⋮⋮⋮Mn1Mn2…Mnk]n2×k |
The graph-orthogonal array Z is an orthogonal array OA(n,k,1). The matrix Z will be used as an encoding matrix for the authentication tag.
Let Z=(A1,A2,…,Ak), where Aα(1≤α≤k) is the αth column of Z. Now, n different symbols inside Aα can be represented by Aα(1),Aα(2),…,Aα(n). In the matrix Z, 1,2,…,n are n different authentication tags, and the messages set R consists of nk ordered pairs (g,a), where g∈G. Hence, the number of messages is |R|=nk. Then, R can be divided into R1,R2,…,Rk, and
⋃kα=1Rα=R,⋂kα=1Rα=∅,|Rα|=n. | (4) |
The n different messages in Rα(1≤α≤k) can be represented by Rα(1),Rα(2),…,Rα(n) respectively. Define the mapping
ψi:Aα↦Rα |
Aα(σ)→Rα(σ),1≤α≤k,1≤σ≤n. | (5) |
Therefore, (Z,R,(ψ1,ψ2,…,ψk)) is a non-splitting Cartesian authentication code if the probability distribution of encoding rules and sources is uniform.
Example 4. We have three mutually orthogonal (P4∪2P2)-squares M1,M2, and M3 which are defined as follows:
M1=[5524121135132245243341354]M2=[5215451321212434323515434]M3=[5142511253422312533453144] |
Hence,
Z=[M11M12M13M21M22M23M31M32M33M41M42M43M51M52M53]25×3=[555251124542415521111312235153214132222423341452325243333534145513431354444] |
It is clear that Z is a (P4∪2P2)-orthogonal array (P4∪2P2)-OA(5,3,1). Let Z=(A1,A2,A3), where Aα(1≤α≤3) is the αth column of Z. Now, 5 different symbols inside Aα can be represented by Aα(1),Aα(2),…,Aα(5). In the matrix Z,symbols 1,2,…,5 are 5 different authentication tags, and the messages set R consists of 15 ordered pairs (g,a), where g∈G. Hence, the number of messages is |R|=15. Then, R can be divided into R1,R2,R3, and
⋃3α=1Rα=R,⋂3α=1Rα=∅,|Rα|=5. | (6) |
The 5 different messages in Rα(1≤α≤3) can be represented by Rα(1),Rα(2),…,Rα(5) respectively. Define the mapping
ψα:Aα→Rα |
Aα(σ)↦Rα(σ),1≤α≤3,1≤σ≤5. | (7) |
Therefore, (Z,R,(ψ1,ψ2,ψ3)) is a non-splitting Cartesian authentication code if the probability distribution of encoding rules and sources is uniform.
For more illustration, let the set of source states be G={i,j,k}, then the set of encoded messages
R={(g,a)|g∈G,a∈{1,2,3,4,5}}, |
R={(i,1),(i,2),(i,3),(i,4),(i,5),(j,1),(j,2),(j,3),(j,4), |
(j,5),(k,1),(k,2),(k,3),(k,4),(k,5)}, |
for example, if a receiver receives (i,1), then he or she can deduce that the original message is i because 1 belongs to the set of authentication tags {1,2,3,4,5}.
Theorem 2. The above constructed Cartesian authentication code is a non-splitting authentication code and has the following parameters |G|=k,|H|=n2,|R|=nk. Also, P0=P1=1n.
Proof. As shown above, the graph-orthogonal array Z is used as an encoding matrix of an authentication tag. Encoding rules are represented by rows of Z, and sources are represented by columns of Z. The graph-orthogonal array Z is an n2×k matrix. Hence, the number of sources is k, the number of encoding rules is n2, and the number of messages is |R|=nk.
(i) For the impersonation attack, from the graph-orthogonal array Z, we can see that each encoding rule corresponds to k different messages. Suppose a sender uses the encoding rule h0 to send a message to a receiver. It is known that by the encoding rule h0,k messages can be obtained. Now, if one of these k messages is used by an adversary, then the adversary succeeds in his impersonation attack. In this code, the number of all messages is nk. Therefore, the probability of a successful impersonation attack is:
P0=k|R|=knk=1n. | (8) |
(ii) For the substitution attack, suppose a message r=(g,a) is sent by a sender to a receiver, because the graph-orthogonal array OA(n,k,1) is used as an encoding matrix of an authentication tag, so by the superimposition of any two columns of this matrix, we conclude that every ordered pair of n2 ordered pairs appears exactly once. Therefore, in the column of the source g, the authentication tag a appears exactly n times and corresponds to n different encoding rules, so we obtain
|{h∈H|h(g)=a}|=n. | (9) |
Suppose that an adversary sends a message ˊr=(ˊg,ˊa) (ˊg≠g) to a receiver. We know from the used encoding matrix that the authentication tags a and ˊa can only appear in one row simultaneously in the two columns of the sources g and ˊg, so we get
|{h∈H|h(g)=a,h(ˊg)=ˊa}|=1. | (10) |
Hence
P1=maxˊg≠g∈G;a,ˊa∈T|{h∈H|h(g)=a,h(ˊg)=ˊa}||{h∈H|h(g)=a}|=1n. | (11) |
Now, we want to prove that the constructed Cartesian authentication code, in this case, is a non-splitting authentication code. It is clear from the above construction that if we have the encoding rule h and the source g, then g and h can be mapped to only one message r, so we obtain a non-splitting authentication code.
Theorem 3. The Cartesian authentication code (Z,R,(ψ1,ψ2,…,ψk)), which is constructed by k mutually orthogonal n×n G-squares, is a perfect Cartesian authentication code.
Proof. For the authentication code (Z,R,(ψ1,ψ2,…,ψk)), let Zn2×k be an encoding matrix. The row of Z represents the encoding rule and the column of Z represents the source. An element zx,y is in the position (x,y) of Z. The element zx,yshows that the source gy is encoded into the messages r=zx,ywith the encoding rules hx, where 1≤x≤n2; 1≤y≤k.
(i) We have
P(hx)=1n2,P(gy)=1k. | (12) |
(ii) The elements gy and hx are used to determine the element zx,y in the encoding matrix Zn2×k. It is clear that an encoding rule can encode k sources (gy,1≤y≤k) and a source can be affected by n2 encoding rules (hx,1≤x≤n2), so after determining gy, the distribution probability of hx is
P(hx|gy)=1n2. | (13) |
If hx is determined, then the distribution probability of gy is
P(gy|hx)=1k. | (14) |
Now, the distribution probability of every element zx,y in the encoding matrix Zn2×k can be obtained as follows:
P(zx,y)=P(hx,gy)=P(gy)P(hx|gy)=P(hx)P(gy|hx)=1kn2. | (15) |
(iii) For the encoding matrix Zn2×k, the same authentication tag occurs n times in any column. Also, in each column, the same authentication tag is mapped into a message. Therefore, every message r occurs n times. We now can obtain
P(r)=n.P(zx,y)=n.1kn2=1kn. | (16) |
(iv) We know from Zn2×k that each encoding rule corresponds to k messages. Hence, the distribution probability of the message r given an encoding rule hx is
P(r|hx)=1k. | (17) |
And
P(hx,r)=P(hx).P(r|hx)=1n2.1k=1kn2. | (18) |
Also,
I(R;H)=H(R)−H(R|H)=H(R)+H(H)−H(R,H)=∑rP(r)log21P(r)+∑hxP(hx)log21P(hx)−∑r,hxP(r,hx)log21P(r,hx) |
I(R;H)=nk.1nklog2nk+n2.1n2log2n2−n2k.1n2klog2n2k=log2n. | (19) |
Since P0=P1=1n, then log2P0=log2P1=−log2n.
Finally, we can deduce that log2P0=log2P1=−I(R;H)=−log2n. From Definition 11, the Cartesian authentication code (Z,R,(ψ1,ψ2,…,ψk)), which is constructed by k mutually orthogonal n×n G-squares, is a perfect Cartesian authentication code.
In this section, we will construct a general splitting Cartesian authentication code based on graph-orthogonal arrays which are constructed by MOGS. There is a difference in this section from the previous section because, in this section, we divide the message set twice. If some or all sources and encoding rules are determined, then this message set can correspond to multiple messages. Thus this construction has the characteristic of splitting.
Let Z=(A1,A2,…,Ak), where Aα(1≤α≤k) is the αth column of Z. Now, the n different symbols inside Aα can be represented by Aα(1),Aα(2),…,Aα(n). Here, we divide the message set R into R1,R2,…,Rk, where the following conditions are satisfied:
⋃kα=1Rα=R,⋂kα=1Rα=Φ,|Rα|=tαn,1≤α≤k,tα≥1. | (20) |
It is clear that
|R|=∑kα=1tαn=tn,t≥k. | (21) |
Now, we apply another division on each Rα such that Rα={R1α,R2α,…,Rnα} and
⋃ny=1Ryα=Rα,⋂ny=1Ryα=∅,|Ryα|=tα,1≤y≤k. | (22) |
Define the mapping
ψα:Aα→Rα |
Aα(y)↦Ryα,1≤α≤k,1≤y≤n. | (23) |
Therefore, (Z,R,(ψ1,ψ2,…,ψk)) is a splitting Cartesian authentication code if the probability distribution of encoding rules and sources is uniform.
Example 5. We have three mutually orthogonal (P4∪2P2)-squares M1,M2, and M3 which are defined in Example 4. Hence,
Z=[M11M12M13M21M22M23M31M32M33M41M42M43M51M52M53]25×3 |
Let Z=(A1,A2,A3), where Aα(1≤α≤3) is the αth column of Z. Now, the 5 different symbols inside Aα can be represented by Aα(1),Aα(2),…,Aα(5). Here, we divide the message set R into R1,R2,R3, where the following conditions are satisfied:
⋃3α=1Rα=R,⋂3α=1Rα=∅,|Rα|=5tα,1≤α≤3,tα≥1. | (24) |
It is clear that
|R|=∑3α=15tα=5t,t≥3. | (25) |
Now, we apply another division on each Rα such that Rα={R1α,R2α,…,R5α} and
⋃5y=1Ryα=Rα,⋂5y=1Ryα=∅,|Ryα|=tα,1≤y≤5. | (26) |
Define the mapping
ψα:Aα→Rα |
Aα(y)↦Ryα,1≤α≤3,1≤y≤5. | (27) |
Therefore, (Z,R,(ψ1,ψ2,ψ3)) is a splitting Cartesian authentication code if the probability distribution of encoding rules and sources is uniform.
Theorem 4. The above constructed Cartesian authentication code is a splitting authentication code and has the following parameters |G|=k,|H|=n2,|R|=tn,t≥k. Also, P0=P1=1n.
Proof. As shown above, the graph-orthogonal array Z is used as an encoding matrix of an authentication tag. Encoding rules are represented by the rows of Z, sources are represented by the columns of Z. The graph-orthogonal array Z is a n2×k matrix. Hence, the number of sources is k, the number of encoding rules is n2, and the number of messages is |R|=tn,t≥k.
(i) For the impersonation attack, from the graph-orthogonal array Z, we can see that each encoding rule corresponds to t messages. This is because of the division of the messages into k parts in the beginning, where each source corresponds to tαn messages, in the second division the messages are divided into the subsets R1α,R2α,…,Rnα. Therefore, for a given one source and one encoding rule, we can obtain tα messages, where ∑kα=1tα=t. And the previous is the result of the construction of one-to-one mapping of Ryα and each source corresponding to an authentication tag. Suppose a sender uses the encoding rule h0 to send a message to a receiver. It is known that by the encoding rule h0,t messages can be obtained. Now, if one of these t messages is used by an adversary, then the adversary succeeds in his impersonation attack. In this code, the number of all messages is tn. Therefore, the probability of a successful impersonation attack is:
P0=t|R|=ttn=1n. | (28) |
(ii) For the substitution attack, suppose a message r=(g,a) is sent by a sender to a receiver, because the graph-orthogonal array OA(n,k,1) is used as an encoding matrix of an authentication tag, so by the superimposition of any two columns of this matrix, we conclude that every ordered pair of n2 ordered pairs appears exactly once. Therefore, in the column of the source g, the authentication tag a appears exactly n times and corresponds to n different encoding rules, so we obtain
|{h∈H|h(g)=a}|=n. | (29) |
Suppose that an adversary sends a message ˊr=(ˊg,ˊa) (ˊg≠g) to a receiver. We know from the used encoding matrix that the authentication tags a and ˊa can only appear in one row simultaneously in the two columns of the sources g and ˊg, so we get
|{h∈H|h(g)=a,h(ˊg)=ˊa}|=1. | (30) |
Hence,
P1=maxˊg≠g∈G;a,ˊa∈T|{h∈H|h(g)=a,h(ˊg)=ˊa}||{h∈H|h(g)=a}|=1n. | (31) |
Now, we want to prove that the constructed Cartesian authentication code, in this case, is a splitting authentication code. It is clear from the above construction that if we have the encoding rule h and the source g, then the authentication tag corresponded to g and h is Aα(y). From the mapping, we have Aα(y)↦Ryα, g is mapped under h into a subset Ryα, |Ryα|=tα and tα≥1. Thus, there is a possibility to encode one or more messages, so the code is a splitting Cartesian authentication code.
Theorem 5. The splitting Cartesian authentication code (Z,R,(ψ1,ψ2,…,ψk)), which is constructed by k mutually orthogonal n×n G-squares, is a perfect Cartesian authentication code.
Proof. For the authentication code (Z,R,(ψ1,ψ2,…,ψk)), let Zn2×k be the encoding matrix. The row of Z represents encoding rules and the column of Z represents sources. Let the source gy be encoded by the message rx,y with the encoding rule hx, and |r(x,y)|=ty; r(x,y,m) represents the mth message of message set, and 1≤x≤n2; 1≤y≤k; m = 1, 2, …, ty.
(i) We have
P(hx)=1n2,P(gy)=1k. | (32) |
(ii) It is clear that an encoding rule can encode k sources (gy,1≤y≤k) and a source can be affected by n2 encoding rules (hx,1≤x≤n2), so after determining gy, the distribution probability of hx is
P(hx|gy)=1n2. | (33) |
If hx is determined, then the distribution probability of gy is
P(gy|hx)=1k. | (34) |
(iii) After determining hx and gy, the probability distribution of the message r(x,y,m) is
P(r(x,y,m)|hx,gy)=1ty. | (35) |
And
P(r(x,y,m),hx|gy)=P(r(x,y,m)|hx,gy).P(gy|hx)=1kty. | (36) |
Also,
P(r(x,y,m)|hx)=∑gyP(r(x,y,m),gy|hx)=1kty. | (37) |
Now, we can obtain
P(r(x,y,m),hx)=P(r(x,y,m)|hx)P(hx)=1ktyn2. | (38) |
H(R|H)=n2∑x=1H(R|hx)=n2∑x=1∑r(x,y,m)P(r(x,y,m),hx)log21P(r(x,y,m)|hx)=n2×k∑y=1ty.1ktyn2.log2(kty) |
H(R|H)=1k∑ky=1log2(kty). | (39) |
(iv) Let the message set corresponding to the source gy be Ry, Ry,vis the vth message of Ry, then and the probability of Ry,v is
P(Ry,v)=1nkty. | (40) |
H(R)=∑ky=1(tyn).P(Ry,v)log21P(Ry,v) | (41) |
=k∑y=1(tyn).1nktylog2(nkty) |
=1kk∑y=1log2(nkty). |
Now, we can deduce that
I(R;H)=H(R)−H(R|H)=1k∑ky=1log2(nkty)−1k∑ky=1log2(kty)=1k∑ky=1log2(nktykty) |
=log2n(1k∑ky=11)=log2n. | (42) |
Since P0=P1=1n, then log2P0=log2P1=−log2n.
Finally, we can deduce that log2P0=log2P1=−I(R;H)=−log2n. From Definition 11, the splitting Cartesian authentication code (Z,R,(ψ1,ψ2,…,ψk)), which is constructed by k mutually orthogonal n×n G-squares, is a perfect Cartesian authentication code.
In this section, we will handle a special case of MOGS which is called MOLS. If we have a set of mutually orthogonal G-squares of order n, where G≅nK2, then this set is called a set of MOLS. It is known that for any prime power n, there exist (n−1) MOLS of order n[46]. Suppose we have (n−1) MOLS of order n: M1,M2,…,Mn−1. The entries in Mα(α=1,2,…,n−1) belong to the set {1,2,…,n}. Suppose Mωαrefer to the column of Mα, Z0=(1,2,…,n)T,Zx=(x,x,…,x)Tand x=1,2,….,n.
Theorem 6 ([47].(A set of (n−1) MOLS of order n is equivalent to an OA(n,n+1,1).
Hence, the following graph-orthogonal array can be constructed based on Theorem 6.
Z=[Z0Z1M11M12…M1n−1Z0Z2M21M22…M2n−1⋮⋮⋮⋮⋮⋮Z0ZnMn1Mn2…Mnn−1]n2×(n+1) |
The graph-orthogonal array Z is an orthogonal array OA(n,n+1,1). The matrix Z will be used as an encoding matrix for an authentication tag.
Theorem 7. If the non-splitting Cartesian authentication code (Z,R,(ψ1,ψ2,…,ψk)), constructed in Section 3, is constructed by (n−1) MOLS of order n, that is k=n+1, then the code is an optimal Cartesian authentication code.
Proof. From Theorem 2, the parameters of this authentication code are |G|=k=n+1, |H|=n2,|R|=n(n+1). Also, P0=P1=1n. Hence, the authentication code is an optimal Cartesian authentication code from Definition 10.
Theorem 8. If the splitting Cartesian authentication code (Z,R,(ψ1,ψ2,…,ψk)), constructed in Section 4, is constructed by (n−1) MOLS of order n, that is k=n+1, then the code is an optimal Cartesian authentication code.
Proof. From Theorem 4, the parameters of this authentication code are |G|=k=n+1, |H|=n2,|R|=nt=n(n+1). Also, P0=P1=1n. Hence, the authentication code is an optimal Cartesian authentication code from Definition 10.
An authentication code can be kept secret if an adversary finds a message transmitted through a channel, but this adversary cannot get any information about the source. Here, we will construct a security authentication code by using Latin squares that are considered as a special case of graph squares (G-squares) as mentioned above. The constructed authentication codes in Section 3 and Section 4 are without confidentiality. Suppose C is the orthogonal array OA(n,kn,k), where C can be represented as C=(ci,j)kn2×kn, where i=1,2,…,kn2,j=1,2,…,kn. From Section 3, the parameters of the constructed authentication code by the orthogonal array C are |G|=kn, |H|=kn2, |R|=n|G|=kn2. Then, suppose that it is possible to construct the Cartesian authentication code (C,R,(ψ1,ψ2,…,ψkn)), where C is the encoding matrix.
Now, we will use a Latin square to convert the constructed Cartesian authentication code to an authentication code with confidentiality. Suppose that the encoding matrix for the authentication code is D=(di,j)kn2×kn, i=1,2,…,kn2,j=1,2,…,kn.
We make a partitioning to D into the following blocks,
D=[D1,1D1,2…D1,knD2,1D2,2⋯D2,kn⋮⋮⋮⋮Dkn,1Dkn,2…Dkn,kn];Dx,y=[dn(x−1)+1,ydn(x−1)+2,y⋮dn(x−1)+n,y];x=y=1,2,…,kn. |
Suppose that we have any Latin square Sof order kn;
S=[s1,1s1,2…s1,kns2,1s2,2⋯s2,kn⋮⋮⋮⋮skn,1skn,2…skn,kn];sx,y∈{1,2,…,kn},x=y=1,2,…,kn. |
For the element in row x and column y of the matrix D, the second subscript is replaced with the element in row x and column sx,y of the Latin square S. Hence, for the matrix D, the element in row x and column y is put in the position in row x and column sx,y, so the subblocks in rows of D are rearranged and we get a matrix ˊD. Finally, we obtain an authentication code with confidentiality (ˊD,C,R,D,S,(ψ1,ψ2,…,ψkn)), where ˊD is its encoding matrix. It seems that the strength of the proposal is the huge growth in the number of Latin squares of a given order.
Theorem 9. The authentication code (ˊD,C,R,D,S,(ψ1,ψ2,…,ψkn)) is a secure authentication code or with confidentiality.
Proof. It is clear that
P(g)=1|G|=1kn. | (43) |
Each column in ˊD contains all messages, and each message occurs precisely once in this column. Hence, the conditional distribution probability of source under the message is
P(g|r)=1kn. | (44) |
Hence,
P(g)=P(g|r)=1kn. | (45) |
Consequently, the authentication code (ˊD,C,R,D,S,(ψ1,ψ2,…,ψkn)) is secure.
Example 6. Let the matrices C,D,and S be represented by
C=[16111625121538914471013171214281113351016469151810152791635121346111415913261014371115481216],D=C=[D1,1D1,2D1,3D1,4D2,1D2,2D2,3D2,4D3,1D3,2D3,3D3,4D4,1D4,2D4,3D4,4],S=[1234234134124123] |
Then, the matrix ˊD can be represented as follows:
ˊD=[16111625121538914471013141712132810163511154691015189162712133511144659131610142711153812164]. |
For more illustration, if we choose the following Latin square
S=[1234214334124323] |
Then
ˊD=[16111625121538914471013711412821311531610641591015189162712133511144613951141062151173161284]. |
It is clear that |G|=4, |H|=16, |R|=16, and P(g)=P(g|r)=14.
This paper mainly studies how to use graph-orthogonal arrays and MOGS to construct non-splitting Cartesian authentication codes and splitting Cartesian authentication codes where the probability distribution of encoding rules and sources is uniform. We have calculated the probability of successful impersonation attack and substitution attack of the constructed non-splitting and splitting Cartesian authentication codes and have analyzed their performance. These codes are proved to be perfect and optimal Cartesian authentication codes with good performance. Our goal in this paper has been to develop message authentication schemes to provide a guarantee of integrity: that is, the assurance that a message was sent by its purported sender. By the way, this paper is the first one that deals with the construction of authentication codes by MOGS. In future work, we will try to study the properties of the authentication codes constructed by MOGS as the G-squares are different according to graph G. The graph G may be a path graph, cycle graph, tree graph, and so forth.
This Research was supported by Taif University Researchers Supporting Project Number (TURSP-2020/217), Taif University, Taif, Saudi Arabia.
The authors declare no conflict of interest.
[1] |
C. Shannon, A mathematical theory of communication, Bell System Technical Journal, 27 (1948), 379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x doi: 10.1002/j.1538-7305.1948.tb01338.x
![]() |
[2] |
E. Gilbert, F. MacWilliams, N. Sloane, Codes which detect deception, Bell System Technical Journal, 53 (1974), 405–424. https://doi.org/10.1002/j.1538-7305.1974.tb02751.x doi: 10.1002/j.1538-7305.1974.tb02751.x
![]() |
[3] | G. Simmons, A game theory model of digital message authentication, Congressus Neumerantium, 34 (1982), 413–424. |
[4] | G. Simmons, Message authentication: a game on hypergraphs, Congressus Neumerantium, 45 (1984), 161–192. |
[5] | G. Simmons, Authentication theory / coding theory, In: Lecture Notes in Computer Science, Berlin: Springer, 1985,411–431. https://doi.org/10.1007/3-540-39568-7_32 |
[6] | G. Simmons, A survey of information authentication. Proceedings of the IEEE, 1992,379–419. https://doi.org/10.1109/5.4445 |
[7] |
T. Sze, S. Chanson, C. Ding, T. Helleseth, M. Parker, Logarithm Cartesian authentication codes, Inform. Comput., 184 (2003), 93–108. https://doi.org/10.1016/S0890-5401(03)00053-1 doi: 10.1016/S0890-5401(03)00053-1
![]() |
[8] |
H. Wang, C. Xing, R. Safavi-Naini, Linear authentication codes: bounds and constructions, IEEE T. Inform. Theory, 49 (2003), 866–872. https://doi.org/10.1109/TIT.2003.809567 doi: 10.1109/TIT.2003.809567
![]() |
[9] |
R. Feng, L. Hu, J. Kwak, Authentication codes and bipartite graph, Eur. J. Combin., 29 (2008), 1473–1482. https://doi.org/10.1016/j.ejc.2007.06.013 doi: 10.1016/j.ejc.2007.06.013
![]() |
[10] |
S. Chen, D. Zhao, Two constructions of optimal Cartesian authentication codes from unitary geometry over finite fields, Acta Math. Appl. Sin. Engl. Ser., 29 (2013), 829–836. https://doi.org/10.1007/s10255-013-0259-6 doi: 10.1007/s10255-013-0259-6
![]() |
[11] | R. Feng, Another construction of Cartesian authentication codes from geometry of classical groups, Northeast Math. J., 15 (1999), 103–114. |
[12] | R. Feng, Z. Wan, A construction of Cartesian authentication codes from geometry of classical groups, J. Comb. Inf. Syst. Sci., 20 (1995), 197–210. |
[13] | S. Gao, Two constructions of Cartesian authentication codes from unitary geometry, Appl. Math. J. Chinese Univ. Ser. A., 11 (1996), 343–354. |
[14] |
Y. Gao, Z. Zou, Two new constructions of Cartesian authentication codes from symplectic geometry, Appl. Math., 10 (1995), 345–356. https://doi.org/10.1007/BF02662876 doi: 10.1007/BF02662876
![]() |
[15] | H. You, Y. Gao, Some new constructions of Cartesian authentication codes from symplectic geometry, J. Syst. Sci. Complex., 7 (1994), 317–327. |
[16] |
Z. Li, S. Gao, Z. Wang, B. Thuraisingham, W. Wu, A construction of Cartesian authentication code from orthogonal spaces over a finite field of odd characteristic, Discret. Math. Algorit., 1 (2009), 105–114. https://doi.org/10.1142/S1793830909000075 doi: 10.1142/S1793830909000075
![]() |
[17] |
J. Ma, J. Guo, F. Li, K. Wang, A generalization of the formulas for intersection numbers of dual polar association schemes and their applications, Linear Algebra Appl., 434 (2011), 1272–1284. https://doi.org/10.1016/j.laa.2010.11.007 doi: 10.1016/j.laa.2010.11.007
![]() |
[18] |
L. Casse, K. Martin, P. Wild, Bounds and characterizations of authentication / secrecy schemes, Des. Codes Cryptogr., 13 (1998), 107–129. https://doi.org/10.1023/A:1008270111149 doi: 10.1023/A:1008270111149
![]() |
[19] |
C. Ding, A. Salomaa, P. Solé, X. Tian, Three constructions of authentication/secrecy codes, J. Pure Appl. Algebra, 196 (2005), 149–168. https://doi.org/10.1016/j.jpaa.2004.08.008 doi: 10.1016/j.jpaa.2004.08.008
![]() |
[20] |
G. Ge, L. Zhu, Authentication perpendicular arrays APA1 (2, 5, v), J. Comb. Des., 4 (1996), 365–375. https://doi.org/10.1002/(SICI)1520-6610(1996)4:5%3C365::AID-JCD5%3E3.0.CO;2-D doi: 10.1002/(SICI)1520-6610(1996)4:5%3C365::AID-JCD5%3E3.0.CO;2-D
![]() |
[21] |
G. Ge, L. Zhu, Authentication perpendicular arrays APA1 (2, 7, v), J. Comb. Des., 5 (1997), 111–124. https://doi.org/10.1002/(SICI)1520-6610(1997)5:2%3C111::AID-JCD3%3E3.0.CO;2-I doi: 10.1002/(SICI)1520-6610(1997)5:2%3C111::AID-JCD3%3E3.0.CO;2-I
![]() |
[22] |
D. Stinson, Some constructions and bounds for authentication codes, J. Cryptology, 1 (1988), 37–51. https://doi.org/10.1007/BF00206324 doi: 10.1007/BF00206324
![]() |
[23] | D. Stinson, A construction for authentication/secrecy codes from certain combinatorial designs, In: Lecture Notes in Computer Science, Berlin: Springer, 1988,119–127. https://doi.org/10.1007/3-540-48184-2_31 |
[24] |
D. Stinson, The combinatorics of authentication and secrecy codes, J. Cryptology, 2 (1990), 23–49. https://doi.org/10.1007/BF02252868 doi: 10.1007/BF02252868
![]() |
[25] |
D. Stinson, L. Teirlink, A construction for authentication/secrecy codes from 3-homogeneous permutation groups, Eur. J. Combin., 11 (1990), 73–79. https://doi.org/10.1016/S0195-6698(13)80058-3 doi: 10.1016/S0195-6698(13)80058-3
![]() |
[26] |
T. Van Tran, On the construction of authentication and secrecy codes, Des. Codes Crypt., 5 (1995), 269–280. https://doi.org/10.1007/BF01388389 doi: 10.1007/BF01388389
![]() |
[27] |
M. De Soete, New bounds and constructions for authentication/secrecy codes with splitting, J. Cryptology, 3 (1991), 173–186. https://doi.org/10.1007/BF00196910 doi: 10.1007/BF00196910
![]() |
[28] |
W. Ogata, K. Kurowawa, D. Stinson, H. Saido, New combinatorial designs and their applications to authentication codes and secret sharing schemes, Discrete Math., 279 (2004), 383–405. https://doi.org/10.1016/S0012-365X(03)00283-8 doi: 10.1016/S0012-365X(03)00283-8
![]() |
[29] | J. Massey, Cryptography–a selective survey, In: Digital Communications, North-Holland: Elsevier Science Publisher, 1985, 4–11. |
[30] |
R. Rees, D. Stinson, Combinatorial characterizations of authentication codes II, Des. Codes Crypt., 7 (1996), 239–259. https://doi.org/10.1023/A:1018094824862 doi: 10.1023/A:1018094824862
![]() |
[31] |
T. Bolton, T. Dargahi, S. Belguith, M. Al-Rakhami, A. Sodhro, On the security and privacy challenges of virtual assistants, Sensors, 21 (2021), 2312. https://doi.org/10.3390/s21072312 doi: 10.3390/s21072312
![]() |
[32] |
C. Nykvist, M. Larsson, A. Sodhro, A. Gurtov, A lightweight portable intrusion detection communication system for auditing applications, Int. J. Commun. Syst., 33 (2020), 4327. https://doi.org/10.1002/dac.4327 doi: 10.1002/dac.4327
![]() |
[33] | S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk, A message authentication code based on latin squares, In: Lecture Notes in Computer Science, Berlin: Springer, 1997. https://doi.org/10.1007/BFb0027926 |
[34] |
D. Stinson, Combinatorial characterizations of authentication codes, Des. Codes Crypt., 2 (1992), 175–187. https://doi.org/10.1007/BF00124896 doi: 10.1007/BF00124896
![]() |
[35] |
S. Pal, D. Bhardwaj, R. Kumar, V. Bhatia, A new cryptographic Hash function based on Latin squares and non-linear transformations, Proceeding of 2009 IEEE International Advance Computing Conference, 2009,862–867. https://doi.org/10.1109/IADCC.2009.4809128 doi: 10.1109/IADCC.2009.4809128
![]() |
[36] |
S. Golomb, E. Posner, Rook domains, Latin squares, affine planes, and error-distributing codes, IEEE T. Inform. Theory, 10 (1964), 196–208. https://doi.org/10.1109/TIT.1964.1053680 doi: 10.1109/TIT.1964.1053680
![]() |
[37] | R. El-Shanawany, A. El-Mesady, Mutually orthogonal graph squares for disjoint union of stars, Ars Combinatoria, 149 (2020), 83–91. |
[38] |
R. Sampathkumar, S. Srinivasan, Mutually orthogonal graph squares, J. Comb. Des., 17 (2009), 369–373. https://doi.org/10.1002/jcd.20216 doi: 10.1002/jcd.20216
![]() |
[39] | R. El-Shanawany, A. El-Mesady, On mutually orthogonal certain graph squares, Online J. Anal. Comb, 14 (2020), 1–20. |
[40] |
M. Higazy, A. El-Mesady, M. Mohamed, On graph-orthogonal arrays by mutually orthogonal graph squares, Symmetry, 12 (2020), 1895. https://doi.org/10.3390/sym12111895 doi: 10.3390/sym12111895
![]() |
[41] |
A. El-Mesady, S. Shaaban, Generalization of MacNeish's Kronecker product theorem of mutually orthogonal, AKCE Int. J. Graphs Co., 18 (2021), 117–122. https://doi.org/10.1080/09728600.2021.1966349 doi: 10.1080/09728600.2021.1966349
![]() |
[42] |
R. El-Shanawany, On mutually orthogonal graph-path squares, Open Journal of Discrete Mathematics, 6 (2016), 7–12. https://doi.org/10.4236/ojdm.2016.61002 doi: 10.4236/ojdm.2016.61002
![]() |
[43] |
R. El-Shanawany, A. El-Mesady, S. Shaaban, Mutually orthogonal graph squares for disjoint union of paths, Applied Mathematical Sciences, 12 (2018), 303–310. https://doi.org/10.12988/ams.2018.8112 doi: 10.12988/ams.2018.8112
![]() |
[44] | R. El-Shanawany, On mutually orthogonal disjoint copies of graph squares, Note Mat., 36 (2016), 89–98. |
[45] |
M. Higazy, λ-Mutually orthogonal covers of complete bipartite graphs, Adv. Appl. Discret. Mat., 17 (2016), 151–167. https://doi.org/10.17654/DM017020151 doi: 10.17654/DM017020151
![]() |
[46] | Z. Wan, Design theory. Beijing: Higher Education Press, 2009. |
[47] |
J. Liu, Z. Xu, On the Theory and Construction of CARTESIAN Authentication Codes, J. Electron. Inf. Techn., 30 (2008), 93–95. https://doi.org/10.3724/SP.J.1146.2006.00838 doi: 10.3724/SP.J.1146.2006.00838
![]() |
[48] |
W. Jirakitpuwapat, P. Chaipunya, P. Kumam, S. Dhompongsa, P. Thounthong, New methods of construction of Cartesian authentication codes from geometries over finite commutative rings, J. Math. Cryptol., 12 (2018), 119–136. https://doi.org/10.1515/jmc-2017-0057 doi: 10.1515/jmc-2017-0057
![]() |
1. | A. El-Mesady, Omar Bazighifan, Mehar Ali Malik, Construction of Mutually Orthogonal Graph Squares Using Novel Product Techniques, 2022, 2022, 2314-4785, 1, 10.1155/2022/9722983 | |
2. | A. El-Mesady, Omar Bazighifan, S. S. Askar, Serena Matucci, A Novel Approach for Cyclic Decompositions of Balanced Complete Bipartite Graphs into Infinite Graph Classes, 2022, 2022, 2314-8888, 1, 10.1155/2022/9308708 | |
3. | A. El-Mesady, Omar Bazighifan, Qasem Al-Mdallal, On infinite circulant-balanced complete multipartite graphs decompositions based on generalized algorithmic approaches, 2022, 61, 11100168, 11267, 10.1016/j.aej.2022.04.022 | |
4. | R. Praveen, P. Pabitha, A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications, 2023, 10641246, 1, 10.3233/JIFS-223617 | |
5. | A. El-Mesady, Omar Bazighifan, H. M. Shabana, Gohar Ali, On Graph-Transversal Designs and Graph-Authentication Codes Based on Mutually Orthogonal Graph Squares, 2022, 2022, 2314-4785, 1, 10.1155/2022/8992934 | |
6. | A. El-Mesady, Omar Bazighifan, Miaochao Chen, Decompositions of Circulant-Balanced Complete Multipartite Graphs Based on a Novel Labelling Approach, 2022, 2022, 2314-8888, 1, 10.1155/2022/2017936 | |
7. | C. Beaula, P. Venugopal, B. Praba, Xuanlong Ma, Block Encryption and Decryption of a Sentence Using Decomposition of the Turan Graph, 2023, 2023, 2314-4785, 1, 10.1155/2023/7588535 | |
8. | Ahmed El-Mesady, Tasneem Farahat, Ramadan El-Shanawany, Aleksandr Y. Romanov, On Orthogonal Double Covers and Decompositions of Complete Bipartite Graphs by Caterpillar Graphs, 2023, 16, 1999-4893, 320, 10.3390/a16070320 | |
9. | Muhammad Awais, Zulfiqar Ahmed, Waseem Khalid, Ebenezer Bonyah, Tareq Al-shami, Analysis of Zigzag and Rhombic Benzenoid Systems via Irregularity Indices, 2023, 2023, 2314-4785, 1, 10.1155/2023/4833683 | |
10. | Yash M Dalal, Spandana N Raj, Supreeth S, Shruthi G, Yerriswamy T, Arun Biradar, 2023, Comparative Approach to Secure Data Over Cloud Computing Environment, 979-8-3503-4314-4, 1, 10.1109/CSITSS60515.2023.10334187 | |
11. | Ce Shi, Tatsuhiro Tsuchiya, Chengmin Wang, Separable detecting arrays, 2024, 9, 2473-6988, 34806, 10.3934/math.20241657 | |
12. | Anam Zahid, Faisal Kamiran, Samar Abbas, Bilal Qureshi, Asim Karim, Data-Driven Uplift Modeling, 2025, 13, 2169-3536, 62462, 10.1109/ACCESS.2025.3557468 |