Source-Channel Secrecy for Shannon Cipher System

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System

We study side-channel attacks for the Shannon cipher system. To pose side channel-attacks to the Shannon cipher system, we regard them as a signal estimation via encoded data from two distributed sensors. This can be formulated as the one helper source coding problem posed and investigated by Ahlswede, Körner(1975), and Wyner(1975). We further investigate the posed problem to derive new secrecy...

متن کامل

Rate-distortion theory for the Shannon cipher system

Rate-distortion theory is considered for the Shannon cipher system (SCS). The admissible region of cryptogram rateR, key rate Rk, legitimate receiver’s distortion D, and wiretapper’s uncertainty h is determined for the SCS with a noisy channel. Furthermore, inner and outer bounds of the admissible region of R, Rk, D, and wiretapper’s attainable minimum distortion ~ D are derived for the SCS wit...

متن کامل

Joint Source, Channel Coding, and Secrecy

We introduce the concept of joint source coding, channel coding, and secrecy. In particular, we propose two practical joint schemes: the first one is based on error-correcting randomized arithmetic codes, while the second one employs turbo codes with compression, error protection, and securization capabilities. We provide simulation results on ideal binary data showing that the proposed schemes...

متن کامل

The Shannon Cipher System with a Guessing Wiretapper

The Shannon theory of cipher systems is combined with recent work on guessing values of random variables. The security of encryption systems is measured in terms of moments of the number of guesses needed for the wiretapper to uncover the plaintext given the cryptogram. While the encrypter aims at maximizing the guessing effort, the wiretapper strives to minimize it, e.g., by ordering guesses a...

متن کامل

Correlated Source Coded Sequences with Compromised Channel and Source Symbols using Shannon's Cipher System

Correlated sources are present in communication systems where protocols ensure that there is some predetermined information for sources to transmit. Here, two correlated sources across a channel with eavesdroppers are investigated, and conditions for perfect secrecy when some channel information and some source data symbols (the predetermined information) have been wiretapped are determined. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2017

ISSN: 0018-9448,1557-9654

DOI: 10.1109/tit.2017.2669188