Matches in SemOpenAlex for { <https://semopenalex.org/work/W2242981541> ?p ?o ?g. }
- W2242981541 abstract "In this dissertation we try to achieve secrecy enhancement in communications by resorting to both cryptographic and information theoretic secrecy tools and metrics. Our objective is to unify tools and measures from cryptography community with techniques and metrics from information theory community that are utilized to provide privacy and confidentiality in communication systems. For this purpose we adopt encryption techniques accompanied with privacy amplification tools in order to achieve secrecy goals that are determined based on information theoretic and cryptographic metrics. Every secrecy scheme relies on a certain advantage for legitimate users over adversaries viewed as an asymmetry in the system to deliver the required security for data transmission. In all of the proposed schemes in this dissertation, we resort to either inherently existing asymmetry in the system or proactively created advantage for legitimate users over a passive eavesdropper to further enhance secrecy of the communications. This advantage is manipulated by means of privacy amplification and encryption tools to achieve secrecy goals for the system evaluated based on information theoretic and cryptographic metrics. In our first work discussed in Chapter 2 and the third work explained in Chapter 4, we rely on a proactively established advantage for legitimate users based on eavesdropper’s lack of knowledge about a shared source of data. Unlike these works that assume an errorfree physical channel, in the second work discussed in Chapter 3 correlated erasure wiretap channel model is considered. This work relies on a passive and internally existing advantage for legitimate users that is built upon statistical and partial independence of eavesdropper’s channel errors from the errors in the main channel. We arrive at this secrecy advantage for legitimate users by exploitation of an authenticated but insecure feedback channel. From the perspective of the utilized tools, the first work discussed in Chapter 2 considers a specific scenario where secrecy enhancement of a particular block cipher called Data Encryption standard (DES) operating in cipher feedback mode (CFB) is studied. This secrecy enhancement is achieved by means of deliberate noise injection and wiretap channel encoding as a technique for privacy amplification against a resource constrained eavesdropper. Compared to the first work, the third work considers a more general framework in terms of both metrics and secrecy tools. This work studies secrecy enhancement of a general cipher based on universal hashing as a privacy amplification technique against an unbounded adversary. In this work, we have achieved the goal of exponential secrecy where information leakage to adversary, that is assessed in terms of mutual information as an information theoretic measure and Eve’s distinguishability as a cryptographic metric, decays at an exponential rate. In the second work generally encrypted data frames are transmitted through Automatic Repeat reQuest (ARQ) protocol to generate a common random source between legitimate users that later on is transformed into information theoretically secure keys for encryption by means of privacy amplification based on universal hashing. Towards the end, future works as an extension of the accomplished research in this dissertation are outlined. Proofs of major theorems and lemmas are presented in the Appendix." @default.
- W2242981541 created "2016-06-24" @default.
- W2242981541 creator A5010069288 @default.
- W2242981541 date "2022-06-10" @default.
- W2242981541 modified "2023-10-15" @default.
- W2242981541 title "Achievable secrecy enchancement through joint encryption and privacy amplification" @default.
- W2242981541 cites W116480387 @default.
- W2242981541 cites W129941705 @default.
- W2242981541 cites W1488916099 @default.
- W2242981541 cites W1499934958 @default.
- W2242981541 cites W1517444618 @default.
- W2242981541 cites W1527545029 @default.
- W2242981541 cites W1537206908 @default.
- W2242981541 cites W1573725807 @default.
- W2242981541 cites W1583972293 @default.
- W2242981541 cites W1593125407 @default.
- W2242981541 cites W1634861274 @default.
- W2242981541 cites W1660562555 @default.
- W2242981541 cites W1788426572 @default.
- W2242981541 cites W182801106 @default.
- W2242981541 cites W1849758760 @default.
- W2242981541 cites W1875021344 @default.
- W2242981541 cites W1892798954 @default.
- W2242981541 cites W1964723977 @default.
- W2242981541 cites W1976625337 @default.
- W2242981541 cites W1977109468 @default.
- W2242981541 cites W1981670729 @default.
- W2242981541 cites W1986494119 @default.
- W2242981541 cites W1994822918 @default.
- W2242981541 cites W1996360405 @default.
- W2242981541 cites W1996403876 @default.
- W2242981541 cites W2000599680 @default.
- W2242981541 cites W2007529001 @default.
- W2242981541 cites W2021980652 @default.
- W2242981541 cites W2029226988 @default.
- W2242981541 cites W2030035398 @default.
- W2242981541 cites W2033630799 @default.
- W2242981541 cites W2035894387 @default.
- W2242981541 cites W2038315579 @default.
- W2242981541 cites W2043769961 @default.
- W2242981541 cites W2052207834 @default.
- W2242981541 cites W2062951360 @default.
- W2242981541 cites W2073198021 @default.
- W2242981541 cites W2079364662 @default.
- W2242981541 cites W2093566764 @default.
- W2242981541 cites W2096798913 @default.
- W2242981541 cites W2101155862 @default.
- W2242981541 cites W2104485952 @default.
- W2242981541 cites W2106833918 @default.
- W2242981541 cites W2106895305 @default.
- W2242981541 cites W2106938400 @default.
- W2242981541 cites W2108777864 @default.
- W2242981541 cites W2109394932 @default.
- W2242981541 cites W2110162373 @default.
- W2242981541 cites W2110762757 @default.
- W2242981541 cites W2111604404 @default.
- W2242981541 cites W2121654139 @default.
- W2242981541 cites W2122882636 @default.
- W2242981541 cites W2124602541 @default.
- W2242981541 cites W2128153585 @default.
- W2242981541 cites W2131580663 @default.
- W2242981541 cites W2136228813 @default.
- W2242981541 cites W2137998717 @default.
- W2242981541 cites W2139585798 @default.
- W2242981541 cites W2141409546 @default.
- W2242981541 cites W2141580853 @default.
- W2242981541 cites W2141954204 @default.
- W2242981541 cites W2142901448 @default.
- W2242981541 cites W2143062570 @default.
- W2242981541 cites W2144007657 @default.
- W2242981541 cites W2144387589 @default.
- W2242981541 cites W2146813141 @default.
- W2242981541 cites W2147163807 @default.
- W2242981541 cites W2147407450 @default.
- W2242981541 cites W2150154572 @default.
- W2242981541 cites W2154300278 @default.
- W2242981541 cites W2154832352 @default.
- W2242981541 cites W2154909745 @default.
- W2242981541 cites W2156186849 @default.
- W2242981541 cites W2156214717 @default.
- W2242981541 cites W2156411566 @default.
- W2242981541 cites W2156759922 @default.
- W2242981541 cites W2158307590 @default.
- W2242981541 cites W2159145942 @default.
- W2242981541 cites W2159247478 @default.
- W2242981541 cites W2160288004 @default.
- W2242981541 cites W2164090669 @default.
- W2242981541 cites W2164599584 @default.
- W2242981541 cites W2170334586 @default.
- W2242981541 cites W2273440184 @default.
- W2242981541 cites W2295416995 @default.
- W2242981541 cites W2322524800 @default.
- W2242981541 cites W2461716634 @default.
- W2242981541 cites W2499656550 @default.
- W2242981541 cites W2914714618 @default.
- W2242981541 cites W3103409729 @default.
- W2242981541 cites W3123299285 @default.
- W2242981541 cites W568860736 @default.
- W2242981541 cites W64760530 @default.
- W2242981541 cites W2560960509 @default.