Resilient Network Coding in the Presence of Eavesdropping Byzantine Adversaries Michael Langberg Sidharth Jaggi Open University of Israel ISIT 2007 Tsinghua.

Slides:



Advertisements
Similar presentations
Polylogarithmic Private Approximations and Efficient Matching
Advertisements

Ari Juels RSA Laboratories Marty Wattenberg 328 W. 19th Street, NYC A Fuzzy Commitment Scheme.
By Md Emran Mazumder Ottawa University Student no:
On error and erasure correction coding for networks and deadlines Tracey Ho Caltech NTU, November 2011.
1 Index Coding Part II of tutorial NetCod 2013 Michael Langberg Open University of Israel Caltech (sabbatical)
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
On error correction for networks and deadlines Tracey Ho Caltech INC, 8/5/12.
Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li Institute of Network Coding (INC) The Chinese University of Hong Kong October 19, 2011 IEEE Information.
From: Cryptographers’ Track of the RSA Conference 2008 Date: Reporter: Yi-Chun Shih 1.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Beyond the MDS Bound in Distributed Cloud Storage
Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Low Complexity Encoding for Network Codes Yuval Cassuto Michelle Effros Sidharth Jaggi.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 18 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Fighting Byzantine Adversaries in Networks: Network Error-Correcting Codes Michelle Effros Michael Langberg Tracey Ho Sachin Katti Muriel Médard Dina Katabi.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Resilient Network Coding in the presence of Byzantine Adversaries Michelle Effros Michael Langberg Tracey Ho Sachin Katti Muriel Médard Dina Katabi Sidharth.
Network Coding and Reliable Communications Group A Multi-hop Multi-source Algebraic Watchdog Muriel Médard † Joint work with MinJi Kim †, João Barros ‡
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
How to Share a Secret Amos Beimel. Secret Sharing [Shamir79,Blakley79,ItoSaitoNishizeki87] ? bad.
Bikash Dey Sidharth Jaggi Causal Michael Langberg OPEN UNIVERSITY OF ISRAEL (adversarial) channel codes.
An Algebraic Watchdog for Wireless Network Coding MinJi Kim † Joint work with Muriel Médard †, João Barros ‡, Ralf Kötter * † Massachusetts Institute of.
FIGHTING ADVERSARIES IN NETWORKS Michelle Effros Michael Langberg Tracey Ho Philip Chou Kamal Jain Muriel Médard Dina Katabi Peter Sanders Ludo Tolhuizen.
10th Canadian Workshop on Information Theory June 7, 2007 Rank-Metric Codes for Priority Encoding Transmission with Network Coding Danilo Silva and Frank.
Bikash Dey Sidharth Jaggi Causal Michael Langberg OPEN UNIVERSITY OF ISRAEL adversarial channel codes.
Tracey Ho Sidharth Jaggi Tsinghua University Hongyi Yao California Institute of Technology Theodoros Dikaliotis California Institute of Technology Chinese.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
1 Verification Codes Michael Luby, Digital Fountain, Inc. Michael Mitzenmacher Harvard University and Digital Fountain, Inc.
Optimal Multicast Algorithms Sidharth Jaggi Michelle Effros Philip A. Chou Kamal Jain.
Low Complexity Algebraic Multicast Network Codes Sidharth “Sid” Jaggi Philip Chou Kamal Jain.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Ger man Aerospace Center Gothenburg, April, 2007 Coding Schemes for Crisscross Error Patterns Simon Plass, Gerd Richter, and A.J. Han Vinck.
Network Coding: Mixin’ it up Sidharth Jaggi Michelle Effros Michael Langberg Tracey Ho Philip Chou Kamal Jain Muriel MédardPeter Sanders Ludo Tolhuizen.
Computer Security CS 426 Lecture 3
Quantum Public Key Cryptography with Information- Theoretic Security Daniel Gottesman Perimeter Institute.
Boulat A. Bash Dennis Goeckel Don Towsley LPD Communication when the Warden Does Not Know When.
Pushing the Limits of Wireless Networks Prof. Dina Katabi Jan 9, 2006.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,
Correction of Adversarial Errors in Networks Sidharth Jaggi Michael Langberg Tracey Ho Michelle Effros Submitted to ISIT 2005.
Introduction to Quantum Key Distribution
Attacking Cryptographic Schemes Based on ‘Perturbation Polynomials’ Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Lecture 2: Introduction to Cryptography
1 Private codes or Succinct random codes that are (almost) perfect Michael Langberg California Institute of Technology.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
Lecture 5.1: Message Authentication Codes, and Key Distribution
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
Security for Broadcast Network
Network RS Codes for Efficient Network Adversary Localization Sidharth Jaggi Minghua Chen Hongyi Yao.
Reliable Deniable Communication: Hiding Messages in Noise The Chinese University of Hong Kong The Institute of Network Coding Pak Hou Che Mayank Bakshi.
RELIABLE COMMUNICATION 1 IN THE PRESENCE OFLIMITEDADVERSARIES.
Network Coding Tomography for Network Failures
ON AVCS WITH QUADRATIC CONSTRAINTS Farzin Haddadpour Joint work with Madhi Jafari Siavoshani, Mayank Bakshi and Sidharth Jaggi Sharif University of Technology,
Secret Sharing in Distributed Storage Systems Illinois Institute of Technology Nexus of Information and Computation Theories Paris, Feb 2016 Salim El Rouayheb.
Secure Error-Correcting (SEC) Network Codes Raymond W. Yeung Institute of Network Coding & Department of Information Engineering The Chinese University.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Selective Jamming Attacks in Wireless Networks Alejandro Proaño - Loukas Lazos Dept. of Electrical and Computer Engineering University of Arizona.
RELIABLE COMMUNICATION
Reliable Deniable Communication: Hiding Messages in Noise
Distributed Network Codes
MinJi Kim, Muriel Médard, João Barros
Amplify-and-Forward Schemes for Wireless Communications
Recent developments in group key exchange
Information-Theoretic Security
“Hello Bob, Alice” ---Secure wireless communication with mutual link information (a tutorial perspective) Dr. Shaoen Wu School of Computing
Presentation transcript:

Resilient Network Coding in the Presence of Eavesdropping Byzantine Adversaries Michael Langberg Sidharth Jaggi Open University of Israel ISIT 2007 Tsinghua University Hongyi Yao Proof incorrect! 2009

Network Codes Resilient to Eavesdropping and Jamming Michael Langberg Sidharth Jaggi OR How to share a secret when a (bad) person’s listening and trying to fool the receiver Open University of Israel Tsinghua University Hongyi Yao University of Campinas Danilo Silva NetCod 2010

Multicast ALL of Alice’s information decodable EXACTLY by EACH Bob Network Model

Multicast Network Model ALL of Alice’s information decodable EXACTLY by EACH Bob [ACLY00] With mixing, C = min{C i } achievable [LCY02],[KM01],[JCJ03],[HKMKE03] Simple (linear) distributed codes suffice

Problem! Eavesdropped Links Z I Attacked Links Z O Corrupted links

Existence proofs/Conver ses Efficient random distributed schemes Cryptographic schemes Universal schemes Privacy (Secrecy) [CY02], …, [RS07], … [FMSS04],…[OB08], …[SK08],… Security (Error Correction) [CY06]/[YC06], …, [M06], … [JLKKHM07],…[CJL06], [GP06], [ZKMH07], … [KK07], [SKK08]… Background

Setup 1.Scheme A B C 2.Network C 3.Data A 4.Code C 5.Bad links C 6.Randomness A 7.Transmission A B C 8.Decode B Eureka Eavesdropped links Z I Attacked links Z O Who knows what Stage Privacy

Background Efficient algorithms[SK08][JLKKHM07],[SKK08]  “Optimal” rates (Secrecy) C-Z I (Security) C-2Z O  Poly-time  Distributed  End-to-end  Packet-based  Topology unknown a priori  Information-theoretically secure, private

Privacy at rate C-Z I ([CY02],…) Z I random symbols C-Z I rate Network coding + one-time pad Optimal Z I eavesdropped links

Security at rate C-2Z O (…,[SKK08]) Optimal rate R = C-2Z O Error-correcting code Network (Operator channel [KK07], Rank-metric codes [SKK08]) Z O corrupted links

Privacy + Security at rate C-2Z O -Z I Optimal rate for zero-error codes Network error- correcting code Rate C-2Z O Z I random symbols Overall rate C-2Z O -Z I [NY09], [SK10] ε -error?

Shared-secret Security at rate C-Z O [JLKKHM07] Invertible w.h.p. [HKMKE03] C 2 secret hashes of X Linear list with C 2 variables* Secure transmission at rate C-Z O ! Secure + private transmission at rate C-Z O -Z I ! w.h.p., unique decoding! * Different list-decoding used

Upper bound: C-Z O -Z I

Just one (secret) bit for Bob… [JL07] ??

Just one (secret) bit for Bob… [YSJL10] Privacy: [SK08] (Only sees Z I links) Security:

Questions?