Keyless Authentication for AWGN Channels

11/11/2021
by   Eric Graves, et al.
0

This work establishes that the physical layer can be used to perform information-theoretic authentication in additive white Gaussian noise channels, as long as the adversary is not omniscient. The model considered consists of an encoder, decoder, and adversary, where the adversary has access to the message, a non-causal noisy observation of the encoder's transmission, and unlimited transmission power, while the decoder observes a noisy version of the sum of the encoder and adversary's outputs. A method to modify a generic existing channel code to enable authentication is presented. It is shown that this modification costs an asymptotically negligible amount of the coding rate, while still enabling authentication as long as the adversary's observation is not noiseless. Also notable is that this modification is not (asymptotically) a function of the statistical characterization of the adversary's channel and furthermore no secret key is required, hence paving the way for a robust practical implementation. Using these results, the channel-authenticated capacity is calculated and shown to be equal to the non-adversarial channel capacity. While this modular scheme is designed for use in the given channel model, it is applicable to a wide range of settings.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/10/2020

Authentication Against a Myopic Adversary

We consider keyless authentication for point-to-point communication in t...
research
04/26/2018

Communication over an Arbitrarily Varying Channel under a State-Myopic Encoder

We study the problem of communication over a discrete arbitrarily varyin...
research
01/06/2020

Secret key authentication capacity region, Part II: typical authentication rate

This paper investigates the secret key authentication capacity region. S...
research
01/06/2020

Secret key authentication capacity region, Part I: average authentication rate

This paper investigates the secret key authentication capacity region. S...
research
01/11/2018

Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement

The rate regions of many variations of the standard and wire-tap channel...
research
05/27/2019

On the Commitment Capacity of Unfair Noisy Channels

Noisy channels are a valuable resource from a cryptographic point of vie...
research
02/02/2023

Universal Coding for Shannon Ciphers under Side-Channel Attacks

We study the universal coding under side-channel attacks posed and inves...

Please sign up or login with your details

Forgot password? Click here to reset