In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the difficulty of cryptographic attacks. The system setup is the wiretap channel model where transmitted data traverse through independent packet erasure channels with public feedback for authenticated ARQ (Automatic Repeat reQuest). The code design relies on puncturing nonsystematic low-density parity-check codes with the intent of inflicting an eavesdropper with stopping sets in the decoder. Furthermore, the design amplifies errors when stopping sets occur such that a receiver must guess all the channel-erased bits correctly to avoid an expected error rate of one half in the ciphertext. We extend previous results on the coding scheme by giving design criteria that reduces the effectiveness of a maximum-likelihood attack to that of a message-passing attack. We further extend security analysis to models with multiple receivers and collaborative attackers. Cryptographic security is enhanced in all these cases by exploiting properties of the physical-layer. The enhancement is accurately presented as a function of the degrees of freedom in the eavesdropper's knowledge of the ciphertext, and is even shown to be present when eavesdroppers have better channel quality than legitimate receivers.
In this paper we consider tandem error control coding and cryptography in the
setting of the {\em wiretap channel} due to Wyner. In a typical communications
system a cryptographic application is run at a layer above the physical layer
and assumes the channel is error free. However, in any real application the
channels for friendly users and passive eavesdroppers are not error free and
Wyner's wiretap model addresses this scenario. Using this model, we show the
security of a common cryptographic primitive, i.e. a keystream generator based
on linear feedback shift registers (LFSR), can be strengthened by exploiting
properties of the physical layer. A passive eavesdropper can be made to
experience greater difficulty in cracking an LFSR-based cryptographic system
insomuch that the computational complexity of discovering the secret key
increases by orders of magnitude, or is altogether infeasible. This result is
shown for two fast correlation attacks originally presented by Meier and
Staffelbach, in the context of channel errors due to the wiretap channel model.Comment: 12 pages, 5 figures. Submitted and accepted to the International
Conference on Communications (ICC) 2009. v2: equivalent to the version that
will be published in the conference proceedings. Has some altered notation
from version 1 as well as slight changes in the wording to make the paper
more readable and easier to understan
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.