Skip to main content Accessibility help
×
Hostname: page-component-68945f75b7-w588h Total loading time: 0 Render date: 2024-09-04T15:21:36.779Z Has data issue: false hasContentIssue false

6 - Coding for secrecy

from Part III - Coding and system aspects

Published online by Cambridge University Press:  07 October 2011

Matthieu Bloch
Affiliation:
Georgia Institute of Technology
João Barros
Affiliation:
Universidade do Porto
Get access

Summary

In this chapter, we discuss the construction of practical codes for secrecy. The design of codes for the wiretap channel turns out to be surprisingly difficult, and this area of information-theoretic security is still largely in its infancy. To some extent, the major obstacles in the road to secrecy capacity are similar to those that lay in the path to channel capacity: the random-coding arguments used to establish the secrecy capacity do not provide explicit code constructions. However, the design of wiretap codes is further impaired by the absence of a simple metric, such as a bit error rate, which could be evaluated numerically. Unlike codes designed for reliable communication, whose performance is eventually assessed by plotting a bit-error-rate curve, we cannot simulate an eavesdropper with unlimited computational power; hence, wiretap codes must possess enough structure to be provably secure. For certain channels, such as binary erasure wiretap channels, the information-theoretic secrecy constraint can be recast in terms of an algebraic property for a code-generator matrix. Most of the chapter focuses on such cases since this algebraic view of secrecy simplifies the analysis considerably.

As seen in Chapter 4, the design of secret-key distillation strategies is a somewhat easier problem insofar as reliability and security can be handled separately by means of information reconciliation and privacy amplification. Essentially, the construction of coding schemes for key agreement reduces to the design of Slepian–Wolf-like codes for information reconciliation, which can be done efficiently with low-density parity-check (LDPC) codes or turbo-codes.

Type
Chapter
Information
Physical-Layer Security
From Information Theory to Security Engineering
, pp. 215 - 246
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Coding for secrecy
  • Matthieu Bloch, Georgia Institute of Technology, João Barros, Universidade do Porto
  • Book: Physical-Layer Security
  • Online publication: 07 October 2011
  • Chapter DOI: https://doi.org/10.1017/CBO9780511977985.008
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Coding for secrecy
  • Matthieu Bloch, Georgia Institute of Technology, João Barros, Universidade do Porto
  • Book: Physical-Layer Security
  • Online publication: 07 October 2011
  • Chapter DOI: https://doi.org/10.1017/CBO9780511977985.008
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Coding for secrecy
  • Matthieu Bloch, Georgia Institute of Technology, João Barros, Universidade do Porto
  • Book: Physical-Layer Security
  • Online publication: 07 October 2011
  • Chapter DOI: https://doi.org/10.1017/CBO9780511977985.008
Available formats
×