11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

94<br />

Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />

Generation (WPSG) with Unequal Security Protection (USP)<br />

in the next section.<br />

7.2 Perfect Secrecy in <strong>Physical</strong>-Layer Key Encoding<br />

for a One-Time-Pad Encryptor<br />

Consider a non-r<strong>and</strong>omized cipher in which elements in the plaintext X = [X 1 , X 2 , ..., X M ],<br />

ciphertext Y = [Y 1 , Y 2 , ..., Y N ], <strong>and</strong> secret key Z = [Z 1 , Z 2 , ..., Z J ] all take values in an L-<br />

ary alphabet <strong>and</strong> J = N = M. Suppose that the key is chosen to be completely r<strong>and</strong>om,<br />

i.e., P (Z i = z) = L −M , i = 1, 2, ..., M, for all possible values z of the secret key, <strong>and</strong> that<br />

the enciphering transformation is<br />

Y i = (X i + Z i ) mod L, i = 1, 2, ..., M. (7.1)<br />

Since, for each possible choice x i <strong>and</strong> y i of X i <strong>and</strong> Y i , respectively, there is a unique<br />

z i such that Z i = z i satisfies (7.1), it follows that P (Y = y|X = x) = L −M<br />

for every<br />

particular y = [y 1 , y 1 , ..., y M ] <strong>and</strong> x = [x 1 , x 2 , ..., x M ], no matter what the statistics of X<br />

may be. Thus, X <strong>and</strong> Y are statistically independent, <strong>and</strong> hence this system provides<br />

perfect secrecy [31]. The system is called a modulo-L Vernam system or one-time pad <strong>and</strong><br />

is used in our model in Fig. 7.1 to combine the message <strong>and</strong> the encoded key together.<br />

Since, out of the total I K quantized key symbols, I V K symbols are vulnerable symbols,<br />

we can see that, had a one-time pad encryptor been used without physical-key encoding,<br />

I V K ciphertext symbols would have been decrypted by the eavesdropper. Thus, in order<br />

to construct a secure Y 1 , we use the following linear combination for Z 1 .<br />

Z 1 = (K 1 + K 2 + ... + K IV K +1) mod L (7.2)<br />

After substituting (7.2) into (7.1) using i = 1, we can see that even if the set of all<br />

vulnerable key symbols is a subset of {K 1 , K 2 , ..., K IV K +1}, there is still one symbol that is<br />

unknown to the eavesdropper. If every key symbol is statistically independent of others,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!