物理层安全剑桥大学英文.pptx
《物理层安全剑桥大学英文.pptx》由会员分享,可在线阅读,更多相关《物理层安全剑桥大学英文.pptx(44页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、1.IntroductionThe main ways of key sharing:a)Transmission the keys over secure (encrypted)channels or a delivering them by special messengers;b)Using public key concept;c)Key sharing based on a presence of any noisy channel if adversary is passive,(wire-tap channel type I and II)1,2,3d)Key sharing b
2、ased on a presence of active adversary if its channel is less noisy than channel of legal users.4,5e)Key sharing using quantum channels.6f)Key sharing based on a concept of anonymous channel.g)Key sharing based on a concept of broadcasting channel.h)Key sharing based on ESPAR-like radiator over mult
3、ipath channels.7,81第1页/共45页Because method a)is trivial and b)is well known,we consider briefly methods c)g)and method h)in more details as a subject of our presentation.c)Source model with a passive eavesdropping.Aplication Key distribution via a satellite.Fact(Maurer 3)2第2页/共45页4Privacy amplificati
4、on(Bennett,Brassard,Crepeau,Maurer 9,10)The feature of keyless cryptography is:(i )Share the secret key by legal parties using this concept(ii)Use key-cryptography after receiving this key by legal parties(including perfect cipher)To share secret key,A and B perform the following steps1.A sends to B
5、 a truly random string x over public noisy channel.2.A sends to B the check symbols to x chosen in line with some error correcting code V3.A sends to B a truly random hash function h taken from universal class,which mapsa string x of length n to string K of length k.4.B corrects errors in the string
6、 x using check symbols transmitted by A.5.Both A and B produce the key string as K=h(x).Then the amount of information leaking over the wire-tap channel to eavesdropperE has the following upper bound 9,11 where n is the length of x,k-is the length of the key K,r-is the number of check symbols,t-is t
7、he amount of collision(Renyi)information leaking over the wire-tap channel to eavesdropper E.for BSC-wire-tap channel with BER=第3页/共45页5Wire-tap channel type 2.(Wyner 2)An eavesdropper can observe a subset of his(her)choice of size t n,where n is the block lengthMain applications-quantum cryptograph
8、y(see in the sequel),optical fiber multiplexing,computer network containing eavesdroppers in some nodesRegular coding(noiseless main channel)The key shared by A and B is the following:where H is the check matrix of some binary(n,n-k)code V,x is a binary string of length n radomly chosen by A and tra
9、nsmitted over the main public channel from A to B.Then the amount of information leaking over the wire-tap channel type 2 to easvesdropper is zero(no easvesdropping at all!)providing the following inequality is true where is the minimum code distance of the code which is dual of code V.第4页/共45页6Exam
10、ple.V is(15,11)Hamming code.Then we have no easvesdropping about the key of length 4 if This concep can be exteded to noisy main channel(Korjik,Kushnir 12).Privacy amplification 9If A and B follow to the protocol described in the case type 1 in order to produce secret key,the amount of information l
11、eaking to eavesdropper has the following upper bound where n is the length of x,K is the length of the key,P is the number of check symbols,t is the maximum number of bits that cavesdropper can obseved of each block.第5页/共45页7d)A cryptographic scenario for source model(active illegal users)SatelliteA
12、liceBobEveSY()X()Z()B BAEe ee ee e1.-Initialization phase(S (X,Y,Z)over BSC-s with BER-s:eeeA B E,respectively)第6页/共45页8e =e +e (e )=e +e (e )2.-Authentication phase:(M,a),where M-a string consisting of k information bits,a-authenticatora=f(M,X),where f(,)is a public function.Intruders activity(Upon
13、 receiving the pair(M,a)and knowing theauthentication algorithm,to form a pair(M,a),where M=M-substitution attack)P -To be cheating by intruder(the pair(M,a)is accepted by Bobas the original one)P -To be rejection the original message by Bob when an intruder hasnot intervented into transmission at a
14、ll.(The length of the string ,a as well as the length of the string X(Y)arevery important parameters.)BER-s between corresponding bits of X and Y,X and Z,Y and Z are,respectively:ChRe =e +e (e )=e +e (e )AB A B A B A B1-21-2AE A E A E A E1-21-2e =e +e (e )=e +e (e )BE B E B E B E1-21-2第7页/共45页9e e e
15、 e A E AB B E(It is easy to show that this inequality results in impossibility for Bob toauthenticate message sent by Alice)b)(It offers a positive solution for the authentication problem)a)A E AB B Ee e e e k nMMM k122uuu122Code words of somebinary block code oflength n.The value 1 in the i-th posi
16、tion of some code word indicates that i-th bit of the string X should be taken as a bit of the autheticator corresponding tothe message compared with this code word.i-th positionk第8页/共45页10MMvvaaZBob accepts the message as original if and only if the fraction of bits in the received authenticator th
17、at agree with the corresponding bits of his string Yis not much smaller than 1-(In non-asymptotic case some fixed thresholdl should be chosen).The best substitution attackABeXXKeep the authenticators bits as they were in a ,Put bits of Z-stringorThe positions of the authenticator can beremoved0第9页/共
18、45页11vvxxx=011 0 0101v=11110111The probability of substituting the message Mfor M without detecting this fact by Bob is determind by 0 1 distance between the code words and .(This distance property differsfrom the ordinary Hamming distance)vvDefinition 1.Definition 2.Constant weight authentication c
19、ode:vl if=/,第10页/共45页12ifdl010(,the upper limit in the first sum in()should be changed to A simple construction of constant weigth codes (due to Maurer-Wolf 4)Take some linear binary (n,K,d)code and replace every bit in its code wordsby pair of bits following the rule:001110 第11页/共45页13It has been p
20、roved in 13第12页/共45页It gives the authentication code with parameters:ddlnXYnkk012=,/,Example 1.BCH (1023,208,231)code.Let:eeABBE=,andthenOptimization procedure.Given the parameters minimize the length l of the authenticator over all (n,K,d)linear codes.130,01770,2第13页/共45页15Relative date rate(R=k/(w
21、+k)as a function of information block length k for different BE and fixed parametrs AB=0.01 ,PRe10-4,PCh10-4 Rk1.BE=0.452.BE=0.403.BE=0.354.BE=0.305.BE=0.256.BE=0.207.BE=0.158.BE=0.109.BE=0.05123456789第14页/共45页16Relative date rate(R=k/(w+k)as a function of information block length k for different BE
22、 and fixed parametrs AB=0.03 ,PRe10-4,PCh10-4Rk234567891.BE=0.452.BE=0.403.BE=0.354.BE=0.305.BE=0.256.BE=0.207.BE=0.158.BE=0.109.BE=0.051第15页/共45页17Basic quantum key distribution protocol.1.A sends a random sequence of photons polarized horizontal(),vertical(),right-circular(),and left-circular().2.
23、B measures the photons polarization in a random sequence of bases,rectlinear(+)and circular(o).3.Results of Bs measurments(some photons may not be recived at all).4.B tells A whicj bases be used for each photons he recived.5.A tells him which bases were correct.6.A and B keep only the data from thes
24、e correctly-measured photons,discarding all the rest.7.This data is interpreted as binary sequence according to the coding scheme:e)Quantum cryptography第16页/共45页18f)Anonymous ChannelEavesdropper learns all bits transmitted between legitimate users A and B but does not know who(A or B)is an“author of
25、 any bit.Application.Key agreement protocol第17页/共45页SatelliteABEFig.1.The case g.g)Key sharing based on a concept of broadcasting channel.18第18页/共45页h)Key sharing based on ESPAR-like radiators over multipath channels(general theory)2.1 Real word justification 7Legal user A transmits a series of pack
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 物理层 安全 剑桥大学 英文
限制150内