Digitale Kommunikationssysteme


Information Theoretic Security


Description

In the digital communication era, both wired and wireless communications can be subject to wiretappers or eavesdroppers. Existing cryptographic approaches, like WEP commonly used for wireless local area networks, can be broken using freely downloadable programs and sufficient computing power. In contrast, information theory provides a tool to design codes that are provably unbreakable.

This main advantage of the theory on information theoretic security is the determination of the trade-off between data transmission rate and the level of security. In fact, for each communications channel there is a maximum rate, above which secure communications is impossible. Determination of this secrecy capacity or its approximation SDOF (secure degree of freedom), is of utmost interest.

 

Other related work

  • E. A. Jorswieck, A. Wolf, S. Gerbracht, Secrecy on the Physical Layer in Wireless Networks, Trends in Telecommunications Technologies, pp. 413–435, Mar. 2010.
  • Y. Liang, H. V. Poor, S. Shamai (Shitz), Information Theoretic Security, Foundations and Trends in Communications and Information Theory, vol. 5, no. 4-5, pp. 355–580, 2009.
  • Ueli Maurer and Stefan Wolf, Information-theoretic key agreement: From weak to strong secrecy for free, Eurocrypt 2000, Lecture Notes in Computer Science, vol. 1807, pp. 351-368, 2000.
  • Ueli M. Maurer, Secret key agreement by public discussion from commoninformation, IEEE Trans. on Inform. Theory, vol. 39, no. 3, pp.733–742, 1993.
  • R. Ahlswede and I. Csiszar, Common randomness in information theory and cryptography – part I: Secret sharing, IEEE Trans. on Inform. Theory, vol. 39, no. 4, pp. 1121–1132, Jul. 1993.
  • I. Csiszar and J. Korner, Broadcast channels with confidential messages, IEEE Trans. on Inform. Theory, vol. 24, no. 3, pp. 339–348, 1978.
  • A. D. Wyner, The wire-tap channel, Bell Syst. Tech. Journ., vol. 54, pp. 1355–1387, 1975.
  • C.E. Shannon, Communication theory of secrecy systems, Bell Syst. Tech. Journ., vol. 29, pp. 656–715, 1949.

 

Related Projects:

BMBF-Prophylaxe: http://www.ict-prophylaxe.de/

 

Our contributions


Author / Editor / Organization Title Year Download / Bibtex
2017
1 H. Vogt , Z. Awan , A. Sezgin On the Capacity Region of Deterministic Strong IC with Multicast and Secure Unicast Messages Link
BibTeX
2016
1 H. Vogt , Z. Awan , A. Sezgin On deterministic IC with common and private message under security constraints Link
BibTeX
2 Christian Zenger , H. Vogt , Jan Zimmer , A. Sezgin , Christof Paar The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions Link
BibTeX
3 Z. Awan , Abdellatif Zaidi , A. Sezgin On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT Download
BibTeX
4 Z. Awan , Abdellatif Zaidi , A. Sezgin On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT Link
BibTeX
5 Y. Chen , O. Ozan Koyluoglu , A. Sezgin Individual Secrecy for Broadcast Channels with Receiver Side Information Link
BibTeX
6 Z. Awan , A. Sezgin MISO Wiretap Channel With Strictly Causal CSI: A Topological Viewpoint
7 H. Vogt , K. Ramm , A. Sezgin Practical Secret-Key Generation by Full-Duplex Nodes with Residual Self-Interference BibTeX
8 H. Vogt , Z. Awan , A. Sezgin Full-Duplex vs. Half-Duplex Secret-Key Generation BibTeX
2015
1 Y. Chen , O Ozan Koyluoglu , A. Sezgin Individual Secrecy for the Broadcast Channel Link
BibTeX
2 H. Vogt , A. Sezgin Full-duplex vs. half-duplex secret-key generation BibTeX
3 E.A. Jorswieck , S. Tomasin , A. Sezgin Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing BibTeX
4 Z. Awan , A. Sezgin Interplay Between Delayed CSIT and Network Topology for Secure MISO BC BibTeX
5 Y. Chen , O. Ozan Koyluoglu , A. Sezgin On the individual secrecy rate region for the degraded broadcast channel BibTeX
6 Y. Chen , O. Ozan Koyluoglu , A. Sezgin On the Individual Secrecy for Gaussian Broadcast Channels with Receiver Side Information Download
BibTeX
7 Z. Awan , A. Sezgin Fundamental Limits of Caching in D2D Networks With Secure Delivery Download
BibTeX
8 Z. Awan , A. Sezgin On MISO Wiretap Channel with Delayed CSIT and Alternating Topology Download
BibTeX
2014
1 Chao Qi , Y. Chen , A. J. Han Vinck , Xiaohu Tang Binary Transmissions over Gaussian Wiretap Channel under Soft/Hard Decision Decoding Download
BibTeX
2 Z. Awan , Abdellatif Zaidi , A. Sezgin Achievable Secure Degrees of Freedom of MISO Broadcast Channel With Alternating CSIT Download
BibTeX
3 Y. Chen , O. Ozan Koyluoglu , A. Sezgin On the Achievable Individual-Secrecy Rate Region for Broadcast Channels with Receiver Side Information Download
BibTeX
4 Y. Chen , H. Vogt , A. Sezgin Gaussian Wiretap Channels with Correlated Sources: Approaching Capacity Region Within a Constant Gap Download
BibTeX
5 H. Vogt , A. Sezgin Secret-key generation from wireless channels: Mind the reflections BibTeX
6 Y. Chen , Ning Cai , A. Sezgin Wiretap Channel with Correlated Sources Download
BibTeX
7 O. Ozan Koyluoglu , Y. Chen , A. Sezgin Broadcast Channel with Receiver Side Information: Achieving Individual Secrecy Link
BibTeX
2011
1 R. Wyrembelski , A. Sezgin , H. Boche Secrecy in Broadcast Channels with Receiver Side Information BibTeX
2010
1 S. Al-Sayed , A. Sezgin Secrecy in Gaussian MIMO Bidirectional Broadcast Wiretap Channels: Transmit Strategies BibTeX