Source-Channel Secrecy for Shannon Cipher System
نویسندگان
چکیده
منابع مشابه
Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System
We study side-channel attacks for the Shannon cipher system. To pose side channel-attacks to the Shannon cipher system, we regard them as a signal estimation via encoded data from two distributed sensors. This can be formulated as the one helper source coding problem posed and investigated by Ahlswede, Körner(1975), and Wyner(1975). We further investigate the posed problem to derive new secrecy...
متن کاملRate-distortion theory for the Shannon cipher system
Rate-distortion theory is considered for the Shannon cipher system (SCS). The admissible region of cryptogram rateR, key rate Rk, legitimate receiver’s distortion D, and wiretapper’s uncertainty h is determined for the SCS with a noisy channel. Furthermore, inner and outer bounds of the admissible region of R, Rk, D, and wiretapper’s attainable minimum distortion ~ D are derived for the SCS wit...
متن کاملJoint Source, Channel Coding, and Secrecy
We introduce the concept of joint source coding, channel coding, and secrecy. In particular, we propose two practical joint schemes: the first one is based on error-correcting randomized arithmetic codes, while the second one employs turbo codes with compression, error protection, and securization capabilities. We provide simulation results on ideal binary data showing that the proposed schemes...
متن کاملThe Shannon Cipher System with a Guessing Wiretapper
The Shannon theory of cipher systems is combined with recent work on guessing values of random variables. The security of encryption systems is measured in terms of moments of the number of guesses needed for the wiretapper to uncover the plaintext given the cryptogram. While the encrypter aims at maximizing the guessing effort, the wiretapper strives to minimize it, e.g., by ordering guesses a...
متن کاملCorrelated Source Coded Sequences with Compromised Channel and Source Symbols using Shannon's Cipher System
Correlated sources are present in communication systems where protocols ensure that there is some predetermined information for sources to transmit. Here, two correlated sources across a channel with eavesdroppers are investigated, and conditions for perfect secrecy when some channel information and some source data symbols (the predetermined information) have been wiretapped are determined. Th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2017
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2017.2669188