PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.

Slides:



Advertisements
Similar presentations
Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor.
Advertisements

Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Causal Secrecy: An Informed Eavesdropper.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Information Theory for Secrecy and Control.
Enhancing Secrecy With Channel Knowledge
Equivocation A Special Case of Distortion-based Characterization.
Physical Layer Security Made Fast and Channel-Independent Shyamnath Gollakota Dina Katabi.
Week 2 - Friday.  What did we talk about last time?  Substitution ciphers  Vigenère ciphers  One-time pad.

Information Theoretical Security and Secure Network Coding NCIS11 Ning Cai May 14, 2011 Xidian University.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY A Framework for Partial Secrecy.
Ref. Cryptography: theory and practice Douglas R. Stinson
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Shannon ’ s theory part II Ref. Cryptography: theory and practice Douglas R. Stinson.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Security CS 426 Lecture 3
Secure Communication for Signals Paul Cuff Electrical Engineering Princeton University.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Basic Concepts in Information Theory
Cryptography Week-6.
Dan Boneh Stream ciphers The One Time Pad Online Cryptography Course Dan Boneh.
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Rate-distortion Theory for Secrecy Systems
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Lec. 5 : History of Cryptologic Research II
Secure Communication for Distributed Systems Paul Cuff Electrical Engineering Princeton University.
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Traditional Symmetric-Key Ciphers
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
1 Information Theory Nathanael Paul Oct. 09, 2002.
Introduction to Quantum Key Distribution
Cryptography and Authentication A.J. Han Vinck Essen, 2008
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
The Classically Enhanced Father Protocol
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Cryptography and Coding Theory
Cryptography Lecture 2 Arpita Patra. Recall >> Crypto: Past and Present (aka Classical vs. Modern Cryto) o Scope o Scientific Basis (Formal Def. + Precise.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Tutorial-5 Theory of Secret-Key.
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
Using Secret Key to Foil an Eavesdropper
Information-Theoretic Security
Cryptology Design Fundamentals
Information Theoretical Analysis of Digital Watermarking
Presentation transcript:

PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems

Main Idea Secrecy for distributed systems  Design encryption specifically for a system objective Node A Node B Message Information Action Adversary Distributed System Attack

Communication in Distributed Systems “Smart Grid” Image from

Cipher Plaintext: Source of information:  Example: English text: Information Theory Ciphertext: Encrypted sequence:  Example: Non-sense text: EnciphererDecipherer Ciphertext Key Plaintext

Example: Substitution Cipher AlphabetA B C D E … Mixed AlphabetF Q S A R … Simple Substitution  Example:  Plaintext: …RANDOMLY GENERATED CODEB…  Ciphertext:…DFLAUIPV WRLRDFNRA SXARQ… Caesar Cipher AlphabetA B C D E … Mixed AlphabetD E F G H …

Shannon Model Schematic Assumption  Enemy knows everything about the system except the key Requirement  The decipherer accurately reconstructs the information EnciphererDecipherer Ciphertext Key Plaintext Adversary C. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical Journal, vol. 28, pp , Oct For simple substitution:

Shannon Analysis Perfect Secrecy  Adversary learns nothing about the information  Only possible if the key is larger than the information C. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical Journal, vol. 28, pp , Oct

Shannon Analysis Equivocation vs Redundancy  Equivocation is conditional entropy:  Redundancy is lack of entropy of the source:  Equivocation reduces with redundancy: C. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical Journal, vol. 28, pp , Oct

Computational Secrecy Assume limited computation resources Public Key Encryption  Trapdoor Functions Difficulty not proven  Often “cat and mouse” game Vulnerable to quantum computer attack W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. on Info. Theory, 22(6), pp , X

Information Theoretic Secrecy Achieve secrecy from randomness (key or channel), not from computational limit of adversary.  Physical layer secrecy  Wyner’s Wiretap Channel [Wyner 1975]  Partial Secrecy  Typically measured by “equivocation:”  Other approaches: Error exponent for guessing eavesdropper [Merhav 2003] Cost inflicted by adversary [this talk]

Shannon Analysis Equivocation vs Redundancy  Equivocation is conditional entropy:  Redundancy is lack of entropy of the source:  Equivocation reduces with redundancy: C. Shannon, "Communication Theory of Secrecy Systems," Bell Systems Technical Journal, vol. 28, pp , Oct

Equivocation Not an operationally defined quantity Bounds:  List decoding  Additional information needed for decryption Not concerned with structure

Guessing Eavesdropper [Merhav 03]: Prob. of correct guess

Guessing Eavesdropper [Merhav 03]: Prob. of correct guess

Traditional View of Encryption Information inside

Proposed View of Encryption Information obscured Images from albo.co.uk

Competitive Distributed System Node ANode B Message Key InformationAction Adversary Attack Encoder: System payoff:. Decoder:Adversary:

Zero-Sum Game Value obtained by system: Objective  Maximize payoff Node ANode B Message Key Information Action Adversary Attack

Secrecy-Distortion Literature [Yamamoto 97]:  Cause an eavesdropper to have high reconstruction distortion  Replace payoff (π) with distortion [Yamamoto 88]:  No secret key  Lossy compression

Secrecy-Distortion Literature [Theorem 3, Yamamoto 97]: Theorem: ChooseYields

How to Force High Distortion Randomly assign bins Size of each bin is Adversary only knows bin Reconstruction of only depends on the marginal posterior distribution of Example:

INFORMATION THEORETIC RATE REGIONS PROVABLE SECRECY Theoretical Results

Lossless Transmission General Reward Function Simplex interpretation  Linear program Hamming Distortion Common Information  Secret Key Two Categories of Results

Competitive Distributed System Node ANode B Message Key InformationAction Adversary Attack Encoder: System payoff:. Decoder:Adversary:

Zero-Sum Game Value obtained by system: Objective  Maximize payoff Node ANode B Message Key Information Action Adversary Attack

Theorem: [Cuff 10] Lossless Case Require Y=X  Assume a payoff function Related to Yamamoto’s work [97]  Difference: Adversary is more capable with more information Also required:

Binary-Hamming Case Binary Source: Hamming Distortion Naïve approach  Random hashing or time-sharing Optimal approach  Reveal excess 0’s or 1’s to condition the hidden bits **00**0*0* Source Public message (black line) (orange line)

Linear Program on the Simplex

Constraint: Minimize: Maximize: U will only have mass at a small subset of points (extreme points)

Hamming Distortion – Low Key Rate Arbitrary i.i.d. source (on finite alphabet) Hamming Distortion Small Key Rate Confuse with sets of size two  Either reveal X or reveal that X is in {0,1} during each instance  ∏ = R 0 / 2

General Payoff Function No requirement for lossless transmission. Any payoff function π(x,y,z) Any source distribution (i.i.d.) Adversary:

Payoff-Rate Function Maximum achievable average payoff Markov relationship: Theorem:

Unlimited Public Communication Maximum achievable average payoff Conditional common information: Theorem (R=∞):

Encoding Scheme Coordination Strategies [Cuff-Permuter-Cover 10]  Empirical coordination for U  Strong coordination for Y K

Converse

What the Adversary doesn’t know can hurt him. [Yamamoto 97] Knowledge of Adversary: [Yamamoto 88]:

Summary Framework for Encryption  Average cost inflicted by adversary  Dynamic settings where information is available causally  No use of “equivocation”  Optimal performance uses both “strong” and “empirical” coordination.