Go to:
Logótipo
Você está em: Start > Publications > View > Coding for Cryptographic Security Enhancement using Stopping Sets
Map of Premises
Principal
Publication

Coding for Cryptographic Security Enhancement using Stopping Sets

Title
Coding for Cryptographic Security Enhancement using Stopping Sets
Type
Article in International Scientific Journal
Year
2011
Authors
W. K. Harrison
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
João Almeida
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications Without AUTHENTICUS Without ORCID
S. W. McLaughlin
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Vol. 6 No. 3
Pages: 575-584
ISSN: 1556-6013
Publisher: IEEE
Indexing
Publicação em ISI Web of Science ISI Web of Science
Scientific classification
FOS: Engineering and technology > Other engineering and technologies
Other information
Abstract (EN): In this paper, we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the difficulty of cryptographic attacks. The system setup is the wiretap channel model where transmitted data traverse through independent packet erasure channels (PECs) with public feedback for authenticated automatic repeat-request (ARQ). The code design relies on puncturing nonsystematic low-density parity-check (LDPC) codes with the intent of inflicting an eavesdropper with stopping sets in the decoder. The design amplifies errors when stopping sets occur such that a receiver must guess all the channel-erased bits correctly to avoid an error rate of one half in the ciphertext. We extend previous results on the coding scheme by giving design criteria that reduce the effectiveness of a maximum-likelihood (ML) attack to that of a message-passing (MP) attack. We further extend security analysis to models with multiple receivers and collaborative attackers. Cryptographic security is even enhanced by the system when eavesdroppers have better channel quality than legitimate receivers.
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Wireless Secrecy Regions With Friendly Jamming (2011)
Article in International Scientific Journal
J. P. Vilela; M. Bloch; J. Barros; S. W. McLaughlin
Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers (2018)
Article in International Scientific Journal
Sá Sousa, J; João P. Vilela
Secure Communication in Stochastic Wireless Networks - Part II: Maximum Rate and Collusion (2012)
Article in International Scientific Journal
P. Pinto; J. Barros; M. Win
Secure Communication in Stochastic Wireless Networks - Part I: Connectivity (2012)
Article in International Scientific Journal
P. Pinto; J. Barros; M. Win
Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes (2014)
Article in International Scientific Journal
Baldi, M; Chiaraluce, F; Laurenti, N; Tomasin, S; Renna, F

See all (11)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-08-21 at 13:20:36 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book