2011
DOI: 10.1109/tifs.2011.2145371
|View full text |Cite
|
Sign up to set email alerts
|

Coding for Cryptographic Security Enhancement Using Stopping Sets

Abstract: In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the difficulty of cryptographic attacks. The system setup is the wiretap channel model where transmitted data traverse thro… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 33 publications
(35 citation statements)
references
References 36 publications
(68 reference statements)
0
35
0
Order By: Relevance
“…The system provides cryptographic security enhancement [1]- [2]. The issue of end-to-end security was upgraded by turning to consider disorder infused in ciphertext.…”
Section: Related Workmentioning
confidence: 99%
“…The system provides cryptographic security enhancement [1]- [2]. The issue of end-to-end security was upgraded by turning to consider disorder infused in ciphertext.…”
Section: Related Workmentioning
confidence: 99%
“…There is a danger in adopting other less rigorous measures to make secrecy guarantees in general, as there is often no direct mapping from the information-theoretic measures to measures such as bit error rate (BER) [9], [10] or degrees of freedom [4] in a decoder. However, in the spirit of computational security and/or semantic security, we can still make guarantees on secrecy as long as the eavesdropper is constrained to a known set of decoders as done in [9], [10].…”
Section: Physical-layer Security Measuresmentioning
confidence: 99%
“…Taking a base-2 logarithm of this quantity yields an information-theoretic number of information bits about which the eavesdropper cannot make any distinction when constrained to that decoder. This quantity will be utilized in relation to the ML decoder, and is analogous to degrees of freedom in [4]. We will denote this metric as H M L (M |Z n ).…”
Section: Physical-layer Security Measuresmentioning
confidence: 99%
See 2 more Smart Citations