Security Analysis of Bbc Coding
نویسندگان
چکیده
In large-scale, wireless networks, it is possible to achieve confidentiality and integrity using asymmetric keys, but availability (i.e. resistance to jamming) has always required symmetric keys. Key management for these symmetric keys is becoming increasingly difficult, and in some cases physically impossible. Recently, the first algorithm was proposed to achieve availability without symmetric keys: BBC coding, which is an unkeyed coding system built up from a hash function. However, no security analysis of it has ever been published. In this paper, we prove BBC has unconditional security with high probability in the random oracle model. Furthermore, we prove BBC has unconditional security with high probability for particular families of polynomial-time and -space hash functions. Unlike the random oracle proof, the latter proof applies to systems that can actually be implemented in practice. In addition, we prove that certain families of hash functions that might naturally be considered are actually insecure, and we give methods for breaking them. Finally, we describe the open question of whether BBC is secure for certain families of simple hash functions.
منابع مشابه
A Novel Visual Cryptography Coding System for Jam Resistant Communication
A form of visual jam resistant coding is presented. Using Visual BBC, a modified form of BBC (Baird, Bahn, Collins) coding, it is shown that several images can be printed on clear plastic, such that when they are superimposed (i.e., a bitwise OR of the pixels is performed), the resulting image may look random, but the original images can still be recovered without any information about the orig...
متن کاملMaking the Case for War: A Comparative Analysis of CNN and BBC Coverage of Colin Powell’s Presentation to the United Nations Security Council
The normative role of journalism in democracy is well established: Democracy depends on news media to facilitate self-government. But theories of the press point to structural limitations that inhibit the democratic ideal. To examine this contradiction, this article offers a comparative analysis of online news coverage by CNN and BBC of Colin Powell’s speech to the United Nations Security Counc...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملVisually Understanding Jam Resistant Communication
The primary goal of information security is to ensure the confidentiality, integrity, authenticity, and availability of information. Availability is often relegated to a discussion of denial of service attacks on network resources. Another form of denying availability is to prevent communication through the use of traditional jamming techniques. At the United States Air Force Academy Center for...
متن کاملUSAFA-TR-2009-ACCR-02-Nov09-BBC Correlator
Leemon C. Baird III William L. Bahn Academy Center for Cyberspace Research United States Air Force Academy USAFA-TR-2009-ACCR-02 November, 2009 Abstract This paper describes the construction of an efficient matched filter designed as part of a BBC jam resistant system. It is an Efficient Golay Correlator (EGC) with very long impulse response (thousands or millions of chips), using random parame...
متن کامل