11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />

Generation (WPSG) with Unequal Security Protection (USP) 103<br />

In [22, 32], a selective encryption scheme is used such that only the I-frames are encrypted.<br />

However, empirical evidence in [27, 72] shows that the scheme is insecure. The<br />

authors of [27] suggest that improvements can be made if some more parts in the data<br />

are encrypted. Although this is a good compromise, the basic idea is the same.<br />

It is important to note that the encryption scheme used in these works, such as Data<br />

Encryption St<strong>and</strong>ard (DES) <strong>and</strong> Rivest, Shamir, <strong>and</strong> Adleman (RSA) algorithm, only<br />

provides practical, but not theoretical security. Any cryptanalyst who posseses an incredibly<br />

large computing power can decrypt the secret data. Since we are interested in<br />

theoretical security, our method used to achieve scalable security is different. The next<br />

section provides the framework to our approach.<br />

7.5 Scalability Framework in Theoretical Security<br />

One normally thinks of a security concept as a dichotomy of being secure or insecure,<br />

with nothing in between. In order to underst<strong>and</strong> our framework, it is most important<br />

to underst<strong>and</strong> that absolute security <strong>and</strong> absolute insecurity are the two extremes of a<br />

continuum of the guessing success probability.<br />

Consider a piece of two-bit data, when we say that the data is absolutely secure, we<br />

mean that the probability that the enemy can correctly guess the encrypted data is 0.25.<br />

In contrast, it is absolutely insecure if such a probability, which will be called the guessing<br />

success probability from now on, is 1.<br />

Earlier frameworks based on selective encryption have only concepts of (practically)<br />

absolute security <strong>and</strong> absolute insecurity.<br />

According to our example, any encryption<br />

scheme providing the guessing success probability p g such that 0.25 < p g < 1 cannot be<br />

incorporated into those frameworks.<br />

When the concept of guessing is included in the scalable security framework, the<br />

guessing success probability p g becomes one security benchmark so that the security levels<br />

of encryption schemes can be measured <strong>and</strong> compared. n-symbol data is absolutely secure<br />

if p g = ( 1<br />

|F| )n , where |F| is the field size of each symbol. It is absolutely insecure if p g = 1.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!