首页> 外文期刊>IEEE Journal on Selected Areas in Communications >Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver
【24h】

Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver

机译:利用窃听者接收者的非理想性实现永久保密

获取原文
获取原文并翻译 | 示例
           

摘要

Secure communication over a memoryless wiretap channel in the presence of a passive eavesdropper is considered. Traditional information-theoretic security methods require an advantage for the main channel over the eavesdropper channel to achieve a positive secrecy rate, which in general cannot be guaranteed in wireless systems. Here, we exploit the non-linear conversion operation in the eavesdropper's receiver to obtain the desired advantage - even when the eavesdropper has perfect access to the transmitted signal at the input to their receiver. The basic idea is to employ an ephemeral cryptographic key to force the eavesdropper to conduct two operations, at least one of which is non-linear, in a different order than the desired recipient. Since non-linear operations are not necessarily commutative, the desired advantage can be obtained and information-theoretic secrecy achieved even if the eavesdropper is given the cryptographic key immediately upon transmission completion. In essence, the lack of knowledge of the key during the short transmission time inhibits the recording of the signal in such a way that the secret information can never be extracted from it. The achievable secrecy rates for different countermeasures that the eavesdropper might employ are evaluated. It is shown that even in the case of an eavesdropper with uniformly better conditions (channel and receiver quality) than the intended recipient, a positive secrecy rate can be achieved.
机译:考虑了无源窃听者在无记忆窃听通道上的安全通信。传统的信息理论安全方法要求主信道相对于窃听者信道具有优势,以实现正的保密率,这在无线系统中通常无法得到保证。在这里,我们利用窃听者接收器中的非线性转换操作来获得所需的优势-即使窃听者可以完美地访问其接收器输入端的传输信号。基本思想是采用临时密码密钥来强制窃听者以与所需接收者不同的顺序执行两项操作,其中至少一项是非线性的。由于非线性操作不一定是可交换的,因此即使在传输完成后立即向窃听者提供了加密密钥,也可以获得所需的优点并实现了信息理论上的保密性。本质上,在短的传输时间内缺乏对密钥的了解会以永远无法从中提取秘密信息的方式抑制信号的记录。评估了窃听者可能采用的不同对策可达到的保密率。结果表明,即使在窃听者的情况(信道和接收者质量)均比预期接收者更好的情况下,也可以实现正的保密率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号