Secure Communication for Signals Paul Cuff Electrical Engineering Princeton University.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Lecture 2: Basic Information Theory TSBK01 Image Coding and Data Compression Jörgen Ahlberg Div. of Sensor Technology Swedish Defence Research Agency (FOI)
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Causal Secrecy: An Informed Eavesdropper.
Hybrid Codes and the Point-to-Point Channel Paul Cuff Curt Schieler.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Information Theory for Secrecy and Control.
Enhancing Secrecy With Channel Knowledge
Equivocation A Special Case of Distortion-based Characterization.
Physical Layer Security Made Fast and Channel-Independent Shyamnath Gollakota Dina Katabi.
Week 2 - Friday.  What did we talk about last time?  Substitution ciphers  Vigenère ciphers  One-time pad.
Information Theoretical Security and Secure Network Coding NCIS11 Ning Cai May 14, 2011 Xidian University.
CHARDD Kickoff Meeting, Princeton University, September 13, 2007 Toward a Theory of Protocols for Communication Through Action John Baillieul C.I.S.E.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY A Framework for Partial Secrecy.
Ref. Cryptography: theory and practice Douglas R. Stinson
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Shannon ’ s theory part II Ref. Cryptography: theory and practice Douglas R. Stinson.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Computer Security CS 426 Lecture 3
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Basic Concepts in Information Theory
Cryptography Week-6.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
Lecture 2 Overview.
Rate-distortion Theory for Secrecy Systems
EEET 5101 Information Theory Chapter 1
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Lec. 5 : History of Cryptologic Research II
Secure Communication for Distributed Systems Paul Cuff Electrical Engineering Princeton University.
The Secrecy of Compressed Sensing Measurements Yaron Rachlin & Dror Baron TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
1 Information Theory Nathanael Paul Oct. 09, 2002.
Coding Theory Efficient and Reliable Transfer of Information
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Overview: Layerless Dynamic Networks Lizhong Zheng.
Cryptography and Authentication A.J. Han Vinck Essen, 2008
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
The Classically Enhanced Father Protocol
Transmission over composite channels with combined source-channel outage: Reza Mirghaderi and Andrea Goldsmith Work Summary STATUS QUO A subset Vo (with.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
1 Source Coding and Compression Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204, Lecture 10 Rate-Distortion.
1 Lecture 7 System Models Attributes of a man-made system. Concerns in the design of a distributed system Communication channels Entropy and mutual information.
Cryptography Lecture 2 Arpita Patra. Recall >> Crypto: Past and Present (aka Classical vs. Modern Cryto) o Scope o Scientific Basis (Formal Def. + Precise.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Using Feedback in MANETs: a Control Perspective Todd P. Coleman University of Illinois DARPA ITMANET TexPoint fonts used.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
General Strong Polarization
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
Cryptography Lecture 3.
B504/I538: Introduction to Cryptography
Using Secret Key to Foil an Eavesdropper
Provable Security at Implementation-level
Information Theoretical Analysis of Digital Watermarking
Presentation transcript:

Secure Communication for Signals Paul Cuff Electrical Engineering Princeton University

Secrecy SourceChannel Information Theory Secrecy Source Coding Channel Coding

Main Idea Secrecy for signals in distributed systems Want low distortion for the receiver and high distortion for the eavesdropper. More generally, want to maximize a function Node A Node B Message Information Signal Action Adversary Distributed System Attack

Communication in Distributed Systems “Smart Grid” Image from

Example: Rate-Limited Control Adversary Signal (sensor) Communication Signal (control) Attack Signal

Example: Feedback Stabilization Data-rate Theorem [Baillieul, Brockett, Mitter, Nair, Tatikonda, Wong] Controller Dynamic System EncoderDecoder Sensor Adversary Feedback

Traditional View of Encryption Information inside

A BRIEF HISTORY OF CRYPTO Substitution Cipher to Shannon and Hellman

Cipher Plaintext: Source of information: Example: English text: Information Theory Ciphertext: Encrypted sequence: Example: Non-sense text: EnciphererDecipherer Ciphertext Key Plaintext

Example: Substitution Cipher AlphabetA B C D E … Mixed AlphabetF Q S A R … Simple Substitution Example: Plaintext: …RANDOMLY GENERATED CODEB… Ciphertext:…DFLAUIPV WRLRDFNRA SXARQ… Caesar Cipher AlphabetA B C D E … Mixed AlphabetD E F G H …

Shannon Analysis 1948 Channel Capacity Lossless Source Coding Lossy Compression Perfect Secrecy Adversary learns nothing about the information Only possible if the key is larger than the information C. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical Journal, vol. 28, pp , Oct

Shannon Model Schematic Assumption Enemy knows everything about the system except the key Requirement The decipherer accurately reconstructs the information C. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical Journal, vol. 28, pp , Oct EnciphererDecipherer Ciphertext Key Plaintext Adversary For simple substitution:

Shannon Analysis Equivocation vs Redundancy Equivocation is conditional entropy: Redundancy is lack of entropy of the source: Equivocation reduces with redundancy: C. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical Journal, vol. 28, pp , Oct

Computational Secrecy Assume limited computation resources Public Key Encryption Trapdoor Functions Difficulty not proven Can become a “cat and mouse” game Vulnerable to quantum computer attack W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. on Info. Theory, 22(6), pp , X

Information Theoretic Secrecy Achieve secrecy from randomness (key or channel), not from computational limit of adversary. Physical layer secrecy (Channel) Wyner’s Wiretap Channel [Wyner 1975] Partial Secrecy Typically measured by “equivocation:” Other approaches: Error exponent for guessing eavesdropper [Merhav 2003] Cost inflicted by adversary [this talk]

Equivocation Not an operationally defined quantity Bounds: List decoding Additional information needed for decryption Not concerned with structure

SOURCE CODING SIDE OF SECRECY Partial secrecy tailored to the signal

Our Framework Assume secrecy resources are available (secret key, private channel, etc.) How do we encode information optimally? Game Theoretic Interpretation Eavesdropper is the adversary System performance (for example, stability) is the payoff Bayesian games Information structure

First Attempt to Specify the Problem Node ANode B Message Key InformationAction Adversary Attack Encoder: System payoff:. Adversary:Decoder:

Secrecy-Distortion Literature [Yamamoto 97]: Proposed to cause an eavesdropper to have high reconstruction distortion [Schieler-Cuff 12]: Result: Any positive secret key rate greater than zero gives perfect secrecy. Perhaps too optimistic! Unsatisfying disconnect between equivocation and distortion.

How to Force High Distortion Randomly assign bins Size of each bin is Adversary only knows bin Reconstruction of only depends on the marginal posterior distribution of Example (Bern(1/3)):

Competitive Secrecy Node ANode B Message Key InformationAction Adversary Attack Encoder: System payoff:. Decoder: Adversary:

Performance Metric Value obtained by system: Objective Maximize payoff Node ANode B Message Key Information Action Adversary Attack

DISTRIBUTED CHANNEL SYNTHESIS An encoding tool for competitive secrecy

Actions Independent of Past The system performance benefits if X n and Y n are memoryless.

Channel Synthesis Black box acts like a memoryless channel X and Y are an i.i.d. multisource Source Output Q(y|x) Communication Resources

Channel Synthesis for Secrecy Node ANode B Information Action Adversary Attack Channel Synthesis Not optimal use of resources!

Channel Synthesis for Secrecy Node ANode B Information Action Adversary Attack Channel Synthesis Reveal auxiliary U n “in the clear” UnUn

Point-to-point Coordination Related to: Reverse Shannon Theorem [Bennett et. al.] Quantum Measurements [Winter] Communication Complexity [Harsha et. al.] Strong Coordination [C.-Permuter-Cover] Generating Correlated R.V. [Anantharam, Gohari, et. al.] Node ANode B Message Common Randomness Source Output Synthetic Channel Q(y|x)

Problem Statement Canonical Form Can we design: such that Alternative Form Does there exists a distribution: fg

Construction Choose U such that P X,Y|U = P X|U P Y|U Choose a random codebook C J K P X|U P Y|U UnUn XnXn YnYn Cloud Mixing Lemma [Wyner], [Han-Verdu, “resolvability”]

THEORETICAL RESULTS Information Theoretic Rate Regions Provable Secrecy

Reminder of Secrecy Problem Value obtained by system: Objective Maximize payoff Node ANode B Message Key Information Action Adversary Attack

Payoff-Rate Function Maximum achievable average payoff Markov relationship: Theorem:

Unlimited Public Communication Maximum achievable average payoff Conditional common information: Theorem (R=∞):

Converse

Theorem: [Cuff 10] Lossless Case Require Y=X Assume a payoff function Related to Yamamoto’s work [97] Difference: Adversary is more capable with more information Also required:

Linear Program on the Simplex Constraint: Minimize: Maximize: U will only have mass at a small subset of points (extreme points)

Binary-Hamming Case Binary Source: Hamming Distortion Optimal approach Reveal excess 0’s or 1’s to condition the hidden bits **00**0*0* Source Public message

Binary Source (Example) Information source is Bern(p) Usually zero (p < 0.5) Hamming payoff Secret key rate R 0 required to guarantee eavesdropper error R0R0 p Eavesdropper Error

What the Adversary doesn’t know can hurt him. [Yamamoto 97] Knowledge of Adversary: [Yamamoto 88]:

Proposed View of Encryption Information obscured Images from albo.co.uk