Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle Attack

12/31/2019
by   Masahito Hayashi, et al.
0

In this work, we focus on the classical optical channel having Poissonian statistical behavior and propose a novel secrecy coding-based physical layer protocol. Our protocol is different but complementary to both (computationally secure) quantum immune cryptographic protocols and (information theoretically secure) quantum cryptographic protocols. Specifically, our (information theoretical) secrecy coding protocol secures classical digital information bits at photonic level exploiting the random nature of the Poisson channel. It is known that secrecy coding techniques for the Poisson channel based on the classical one-way wiretap channel (introduced by Wyner in 1975) ensure secret communication only if the mutual information to the eavesdropper is smaller than that to the legitimate receiver. In order to overcome such a strong limitation, we introduce a two-way protocol that always ensures secret communication independently of the conditions of legitimate and eavesdropper channels. We prove this claim showing rigorous comparative derivation and analysis of the information theoretical secrecy capacity of the classical one-way and of the proposed two-way protocols. We also show numerical calculations that prove drastic gains and strong practical potential of our proposed two-way protocol to secure information transmission over optical channels.

READ FULL TEXT
research
11/19/2019

Two-Way Physical Layer Security Protocol for Gaussian Channels

In this paper we propose a two-way protocol of physical layer security u...
research
04/28/2018

Towards Practical Implementation of Deep Random Secrecy

We have formerly introduced Deep Random Secrecy, a new cryptologic techn...
research
03/02/2018

Physical Layer Security for RF Satellite Channels in the Finite-length Regime

Secure communications is becoming increasingly relevant in the developme...
research
11/04/2019

Mice and Covert Channels

Any secure network is only as secure as its weakest component. With over...
research
02/25/2020

Protocol Proxy: An FTE-based Covert Channel

In a hostile network environment, users must communicate without being d...
research
01/16/2018

Relaxed Conditions for Secrecy in a Role-Based Specification

In this paper, we look at the property of secrecy through the growth of ...
research
10/14/2019

Verifiable Quantum Secure Modulo Summation

We propose a new cryptographic task, which we call verifiable quantum se...

Please sign up or login with your details

Forgot password? Click here to reset