Universal Coding for Shannon Ciphers under Side-Channel Attacks

02/02/2023
by   Bagus Santoso, et al.
0

We study the universal coding under side-channel attacks posed and investigated by Santoso and Oohama (2019). They proposed a theoretical security model for Shannon cipher system under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel, but is also allowed to collect the physical information leaked by the devices where the cipher system is implemented on such as running time, power consumption, electromagnetic radiation, etc. For any distributions of the plain text, any noisy channels through which the adversary observe the corrupted version of the key, and any measurement device used for collecting the physical information, we can derive an achievable rate region for reliability and security such that if we compress the ciphertext using an affine encoder with rate within the achievable rate region, then: (1) anyone with secret key will be able to decrypt and decode the ciphertext correctly, but (2) any adversary who obtains the ciphertext and also the side physical information will not be able to obtain any information about the hidden source as long as the leaked physical information is encoded with a rate within the rate region.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/08/2018

Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System

We study side-channel attacks for the Shannon cipher system. To pose sid...
research
07/23/2018

Learning an Adversary's Actions for Secret Communication

Secure communication over a wiretap channel is investigated, in which an...
research
01/24/2018

On the Gold Standard for Security of Universal Steganography

While symmetric-key steganography is quite well understood both in the i...
research
11/11/2021

Keyless Authentication for AWGN Channels

This work establishes that the physical layer can be used to perform inf...
research
01/06/2020

Secret key authentication capacity region, Part I: average authentication rate

This paper investigates the secret key authentication capacity region. S...
research
01/06/2020

Secret key authentication capacity region, Part II: typical authentication rate

This paper investigates the secret key authentication capacity region. S...
research
05/21/2021

Unified Expression of Achievable Region in Privacy-Constrained Source Coding

Privacy-constrained source coding problems have become increasingly impo...

Please sign up or login with your details

Forgot password? Click here to reset