Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 7: <strong>Physical</strong>-<strong>layer</strong> Key Encoding for <strong>Wireless</strong> <strong>Physical</strong>-<strong>layer</strong> Secret-key<br />
Generation (WPSG) with Unequal Security Protection (USP) 103<br />
In [22, 32], a selective encryption scheme is used such that only the I-frames are encrypted.<br />
However, empirical evidence in [27, 72] shows that the scheme is insecure. The<br />
authors of [27] suggest that improvements can be made if some more parts in the data<br />
are encrypted. Although this is a good compromise, the basic idea is the same.<br />
It is important to note that the encryption scheme used in these works, such as Data<br />
Encryption St<strong>and</strong>ard (DES) <strong>and</strong> Rivest, Shamir, <strong>and</strong> Adleman (RSA) algorithm, only<br />
provides practical, but not theoretical security. Any cryptanalyst who posseses an incredibly<br />
large computing power can decrypt the secret data. Since we are interested in<br />
theoretical security, our method used to achieve scalable security is different. The next<br />
section provides the framework to our approach.<br />
7.5 Scalability Framework in Theoretical Security<br />
One normally thinks of a security concept as a dichotomy of being secure or insecure,<br />
with nothing in between. In order to underst<strong>and</strong> our framework, it is most important<br />
to underst<strong>and</strong> that absolute security <strong>and</strong> absolute insecurity are the two extremes of a<br />
continuum of the guessing success probability.<br />
Consider a piece of two-bit data, when we say that the data is absolutely secure, we<br />
mean that the probability that the enemy can correctly guess the encrypted data is 0.25.<br />
In contrast, it is absolutely insecure if such a probability, which will be called the guessing<br />
success probability from now on, is 1.<br />
Earlier frameworks based on selective encryption have only concepts of (practically)<br />
absolute security <strong>and</strong> absolute insecurity.<br />
According to our example, any encryption<br />
scheme providing the guessing success probability p g such that 0.25 < p g < 1 cannot be<br />
incorporated into those frameworks.<br />
When the concept of guessing is included in the scalable security framework, the<br />
guessing success probability p g becomes one security benchmark so that the security levels<br />
of encryption schemes can be measured <strong>and</strong> compared. n-symbol data is absolutely secure<br />
if p g = ( 1<br />
|F| )n , where |F| is the field size of each symbol. It is absolutely insecure if p g = 1.