arXiv Analytics

Sign in

arXiv:1412.8007 [cs.IT]AbstractReferencesReviewsResources

Combining Conventional Cryptography with Information Theoretic Security

Jason Castiglione

Published 2014-12-27Version 1

This paper highlights security issues that can arise when incorrect assumptions are made on the capabilities of an eavesdropper. In particular, we analyze a channel model based on a split Binary Symmetric Channel (BSC). Corresponding security parameters are chosen based on this channel model, and assumptions on the eavesdroppers capabilities. A gradual relaxation of the restrictions on the eavesdropper's capabilities will be made, and the resulting loss of security will be quantified. An alternative will then be presented that is based on stochastic encoding and creating artificially noisy channels through the usage of private keys. The artificial channel will be constructed through a deterministic process that will be computationally intractable to reverse.

Related articles: Most relevant | Search more
arXiv:1309.5262 [cs.IT] (Published 2013-09-20, updated 2014-03-21)
Near-Field Passive RFID Communication: Channel Model and Code Design
arXiv:1804.08428 [cs.IT] (Published 2018-04-20)
Robust User Scheduling with COST 2100 Channel Model for Massive MIMO Networks
arXiv:2004.13618 [cs.IT] (Published 2020-04-28)
UAV-to-Ground Communications: Channel Modeling and UAV Selection