首页> 外文会议>Asilomar Conference on Signals, Systems Computers >Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers
【24h】

Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers

机译:在不利的无线环境中针对机密窃听者的永久保密

获取原文

摘要

Secure communication over a wireless channel in the presence of a passive eavesdropper is considered. Our main interest is in the disadvantaged wireless environment, where the channel from the transmitter Alice to the eavesdropper Eve is (possibly much) better than that from Alice to Bob, hence making information-theoretic secrecy challenging. We present a method to exploit inherent vulnerabilities of the eavesdropper's receiver through the use of “cheap” cryptographically-secure key-bits, which only need be kept secret from Eve for the (short) transmission period of the message, to obtain information-theoretic (i.e. everlasting) secret bits at Bob. In particular, based on an ephemeral cryptographic key pre-shared between Alice and Bob, a random jamming signal with large variations is added to each symbol. The legitimate receiver Bob uses the key to subtract the jamming signal immediately, while Eve is forced to perform the inherently nonlinear operation of recording the signal; when Eve then obtains the key, which we assume pessimistically (for Alice) happens right after message transmission, Eve can then immediately subtract the jamming signal from the recorded signal. But, because of the intervening non-linear operation in Eve's receiver and the non-commutativity of nonlinear operations, Bob's channel and Eve's channel have different achievable rates and information-theoretic secrecy can be obtained, hence achieving the goal of converting the vulnerable cryptographic secret key into information-theoretic secure bits. The achievable secrecy rates for different settings are evaluated. Among other results, it is shown that, even when the eavesdropper has perfect access to the output of the transmitter (albeit through an imperfect analog-to-digital converter), the method can still achieve a positive secrecy rate.
机译:考虑了在存在无声窃听者的情况下通过无线信道进行的安全通信。我们的主要兴趣是在不利的无线环境中,从发射机Alice到窃听者Eve的信道(可能要比从Alice到Bob的信道更好),因此使信息理论上的保密性具有挑战性。我们提出一种方法,通过使用“便宜的”密码安全密钥位来利用窃听者接收方的固有漏洞,该密钥位仅在消息的(短)传输周期内对Eve保密,以获取信息理论上的信息。 (即永恒的)Bob的秘密位。特别地,基于在爱丽丝和鲍勃之间预先共享的短暂密码密钥,具有大变化的随机干扰信号被添加到每个符号。合法的接收器Bob使用该键立即减去干扰信号,而Eve被迫执行固有的非线性操作来记录信号;当Eve然后获得密钥时,我们悲观地认为(对于Alice)消息发送后立即发生了,因此Eve可以立即从记录的信号中减去干扰信号。但是,由于Eve接收器中的非线性操作介入和非线性操作的非可交换性,Bob通道和Eve通道具有不同的可实现速率,并且可以获得信息理论上的保密性,从而达到了转换易受攻击的密码秘密的目的密钥进入信息论安全位。评估了不同设置下可达到的保密率。除其他结果外,还表明,即使窃听者可以完美地访问发送器的输出(尽管通过不完善的模数转换器),该方法仍可以实现正的保密率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号