DeepAI AI Chat
Log In Sign Up

Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle Attack

by   Masahito Hayashi, et al.

In this work, we focus on the classical optical channel having Poissonian statistical behavior and propose a novel secrecy coding-based physical layer protocol. Our protocol is different but complementary to both (computationally secure) quantum immune cryptographic protocols and (information theoretically secure) quantum cryptographic protocols. Specifically, our (information theoretical) secrecy coding protocol secures classical digital information bits at photonic level exploiting the random nature of the Poisson channel. It is known that secrecy coding techniques for the Poisson channel based on the classical one-way wiretap channel (introduced by Wyner in 1975) ensure secret communication only if the mutual information to the eavesdropper is smaller than that to the legitimate receiver. In order to overcome such a strong limitation, we introduce a two-way protocol that always ensures secret communication independently of the conditions of legitimate and eavesdropper channels. We prove this claim showing rigorous comparative derivation and analysis of the information theoretical secrecy capacity of the classical one-way and of the proposed two-way protocols. We also show numerical calculations that prove drastic gains and strong practical potential of our proposed two-way protocol to secure information transmission over optical channels.


Two-Way Physical Layer Security Protocol for Gaussian Channels

In this paper we propose a two-way protocol of physical layer security u...

Towards Practical Implementation of Deep Random Secrecy

We have formerly introduced Deep Random Secrecy, a new cryptologic techn...

Physical Layer Security for RF Satellite Channels in the Finite-length Regime

Secure communications is becoming increasingly relevant in the developme...

Mice and Covert Channels

Any secure network is only as secure as its weakest component. With over...

Protocol Proxy: An FTE-based Covert Channel

In a hostile network environment, users must communicate without being d...

Relaxed Conditions for Secrecy in a Role-Based Specification

In this paper, we look at the property of secrecy through the growth of ...

Verifiable Quantum Secure Modulo Summation

We propose a new cryptographic task, which we call verifiable quantum se...