Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis

被引:10
作者
Harrison, Willie K. [1 ]
McLaughlin, Steven W. [1 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
来源
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4 | 2009年
关键词
CODES;
D O I
10.1109/ISIT.2009.5205606
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive an error-prone version of the transmitted message which must be corrected prior to decryption. This paper considers the implications of using both channel and cryptographic codes under the wiretap channel model in a way that enhances the information-theoretic security for the friendly parties by keeping the information transfer to the eavesdropper small. We consider a secret-key cryptographic system with a linear feedback shift register (LFSR)-based keystream generator and observe the mutual information between an LFSR-generated sequence and the received noise-corrupted ciphertext sequence under a known-plaintext scenario. The effectiveness of a noniterative fast correlation attack, which reduces the search time in a brute-force attack, is shown to be correlated with this mutual information. For an iterative fast correlation attack on this cryptographic system, it is shown that an EXIT chart and mutual information are very good predictors of decoding success and failure by a passive eavesdropper.
引用
收藏
页码:1939 / 1943
页数:5
相关论文
共 15 条
[1]  
[Anonymous], 1963, Low-Density Parity-Check Codes
[2]   Extrinsic information transfer functions: Model and erasure channel properties [J].
Ashikhmin, A ;
Kramer, G ;
ten Brink, S .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (11) :2657-2673
[3]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[4]  
CHEPYZHOV VV, 1991, EUROCRYPT, P176
[5]  
Cover T. M., 2001, Elements of information theory
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]  
HARRISON WK, 2009, ICC 2009 JA IN PRESS
[8]   Theoretical analysis of a correlation attack based on convolutional codes [J].
Johansson, T ;
Jönsson, F .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (08) :2173-2181
[9]  
Meier W., 1989, Journal of Cryptology, V1, P159, DOI 10.1007/BF02252874
[10]  
Moon TK, 2005, ERROR CORRECTION CODING: MATHEMATICAL METHODS AND ALGORITHMS, P1, DOI 10.1002/0471739219