Foundations and Trends® in Communications and Information Theory > Vol 5 > Issue 4–5

Information Theoretic Security

By Yingbin Liang, University of Hawaii, Department of Electrical Engineering, USA, yingbinl@hawaii.edu | H. Vincent Poor, Princeton University, Department of Electrical Engineering, USA, poor@princeton.edu | Shlomo Shamai (Shitz), Technion — Israel Institute of Technology, Department of Electrical Engineering, Israel, sshlomo@ee.technion.ac.il

 
Suggested Citation
Yingbin Liang, H. Vincent Poor and Shlomo Shamai (Shitz) (2009), "Information Theoretic Security", Foundations and Trends® in Communications and Information Theory: Vol. 5: No. 4–5, pp 355-580. http://dx.doi.org/10.1561/0100000036

Publication Date: 15 Jun 2009
© 2009 Y. Liang, H. V. Poor and S. Shamai (Shitz)
 
Subjects
Cryptology and data security,  Security
 

Free Preview:

Download extract

Share

Download article
In this article:
1. Introduction 
2. The Basic Wire-Tap Channel 
3. Specific Wire-Tap Channels 
4. Code Design to Achieve Secrecy 
5. Broadcast Channels with Confidential Messages 
6. Multiple-Access Channels with Confidential Messages 
7. Interference Channels with Confidential Messages 
8. Other Multi-User Channels with Confidential Messages 
9. Common Randomness and Secret-Key Agreement 
10. Other Issues 
11. Outlook and Conclusions 
A. Basic Concepts of Information Theory 
Notation and Abbreviations 
Acknowledgments 
References 

Abstract

The topic of information theoretic security is introduced and the principal results in this area are reviewed. The basic wire-tap channel model is considered first, and then several specific types of wire-tap channels are considered, including Gaussian, multi-input multi-output (MIMO), compound, and feedback wire-tap channels, as well as the wire-tap channel with side information. Practical code design techniques to achieve secrecy for wire-tap channels are also introduced. The wire-tap formalism is then extended to the basic channels of multi-user networks, including broadcast channels, multiple-access channels (MACs), interference channels, relay channels and two-way channels. For all of these models, results on the fundamental communication limits under secrecy constraints and corresponding coding schemes are reviewed. Furthermore, several related topics including key agreement through common randomness, secure network coding, authentication, cross-layer design, and secure source coding are discussed.

DOI:10.1561/0100000036
ISBN: 978-1-60198-240-7
236 pp. $125.00
Buy book (pb)
 
ISBN: 978-1-60198-241-4
236 pp. $150.00
Buy E-book (.pdf)
Table of contents:
1. Introduction
2. The Basic Wire-tap Channel
3. Specific Wire-tap Channels
4. Code Design to Achieve Secrecy
5. Broadcast Channels with Confidential Messages
6. Multiple Access Channels with Confidential Messages
7. Interference Channels with Confidential Messages
8. Other Multiuser Channels with Confidential Messages
9. Common Randomness and Secret Key Agreement
10. Other Issues
11. Outlook and Conclusions
Notation and Abbreviations
Acknowledgments
References

Information Theoretic Security

Security is one of the most important issues in communications. Security issues arising in communication networks include confidentiality, integrity, authentication and non-repudiation. Attacks on the security of communication networks can be divided into two basic types: passive attacks and active attacks. An active attack corresponds to the situation in which a malicious actor intentionally disrupts the system. A passive attack corresponds to the situation in which a malicious actor attempts to interpret source information without injecting any information or trying to modify the information; i.e., passive attackers listen to the transmission without modifying it.

Information Theoretic Security focuses on confidentiality issues, in which passive attacks are of primary concern. The information theoretic approach to achieving secure communication opens a promising new direction toward solving wireless networking security problems. Compared to contemporary cryptosystems, information theoretic approaches offer advantages such as eliminating the key management issue; are less vulnerable to the man-in-the-middle and achieve provable security that is robust to powerful eavesdroppers possessing unlimited computational resources, knowledge of the communication strategy employed including coding and decoding algorithms, and access to communication systems either through perfect or noisy channels.

Information Theoretic Security surveys the research dating back to the 1970s which forms the basis of applying this technique in modern systems. It proceeds to provide an overview of how information theoretic approaches are developed to achieve secrecy for a basic wire-tap channel model as well as for its extensions to multiuser networks. It is an invaluable resource for students and researchers working in network security, information theory and communications.

 
CIT-036