InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity:...

61
Information Theoretic Security: Fundamentals and Applications Ashish Khisti University of Toronto IPSI Seminar Nov 25th 2013 Information Theoretic Security: Fundamentals and Applications : Ashish Khisti (University of Toronto) 1 / 35

Transcript of InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity:...

Page 1: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Information Theoretic Security: Fundamentals

and Applications

Ashish Khisti

University of Toronto

IPSI SeminarNov 25th 2013

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 1 / 35

Page 2: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Layered Architectures

Layered architecture for communication systems.

A p p l i c a t i o n L a y e r

( S e m a n t i c s o f I n f o r m a t i o n )

T r a n s p o r t L a y e r

( E n d t o E n d C o n n e c t i v i t y )

( R o u t i n g a n d P a t h D i s c o v e r y )

D a t a L i n k L a y e r

( E r r o r C o r r e c t i o n C o d e s )

N e t w o r k L a y e r

P h y s i c a l L a y e r

( S i g n a l s , R F h a r d w a r e )

E n c r y p t i o n ,A u t h e n t i c a t i o n

S e c u r e S o c k e tL a y e r

V i r t u a l P r i v a t e N e t w o r k sA n o n y m o u s R o u t i n g

D e v i c e l e v e lA u t h e n t i c a t i o n

A n t i - J a m m i n g

Where is Security?

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 2 / 35

Page 3: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Layered Architectures

Layered architecture for communication systems.

A p p l i c a t i o n L a y e r

( S e m a n t i c s o f I n f o r m a t i o n )

T r a n s p o r t L a y e r

( E n d t o E n d C o n n e c t i v i t y )

( R o u t i n g a n d P a t h D i s c o v e r y )

D a t a L i n k L a y e r

( E r r o r C o r r e c t i o n C o d e s )

N e t w o r k L a y e r

P h y s i c a l L a y e r

( S i g n a l s , R F h a r d w a r e )

E n c r y p t i o n ,A u t h e n t i c a t i o n

S e c u r e S o c k e t L a y e r

V i r t u a l P r i v a t e N e t w o r k sA n o n y m o u s R o u t i n g

Where is Security?

Wireless Systems

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 2 / 35

Page 4: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Traditional Approach

A typical graduate level course in computer security introducesShannon’s notion of security.

Shannon’s Notion

Alice

Eve

BobMessage Wdecoded

message W

key K

X X

X key K

Perfect Secrecy: p(w|x)=p(w)

Note that Key Size = Message length, hence impractical

Focus: computational cryptography

Is this all about information theoretic security?Information Theoretic Security: Fundamentals and Applications :

Ashish Khisti (University of Toronto) 3 / 35

Page 5: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Outline

Motivating Applications

Secure BiometricsSmart-Meter PrivacyWireless Systems

Information Theoretic Models

Wiretap Channel ModelSecret-key agreement

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 4 / 35

Page 6: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Biometric Technologies

Laptop ATM Passport

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 5 / 35

Page 7: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Biometric Technologies

Laptop ATM Passport

= ?= ?

Enrollment

Authentication

Feature

Extraction

Feature

Extraction

Biometric

Stored in clear

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 5 / 35

Page 8: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Biometric Technologies

Laptop ATM Passport

= ?= ?

Enrollment

Authentication

Feature

Extraction

Feature

Extraction

Biometric

Stored in clear

Issue: Biometrics are stored in the clear

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 5 / 35

Page 9: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Biometrics: Toy Example

0 1 1 0 1 0 0

Biometric

Channel

No

Error

Bit 1

Flipped

Bit 6

Flipped

Bit 7

Flipped

8 Possible Events : All Equally Likely

Enrolment Biometric

Authentication Biometric

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 6 / 35

Page 10: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Biometrics: Toy Example

X, Y : length seven binary sequence

Channel Model: one bit flip (8 possibilities)

3 bits required.

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 7 / 35

Page 11: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Biometrics: Toy Example

X, Y : length seven binary sequence

Channel Model: one bit flip (8 possibilities)

3 bits required.

0

1

1

0

1

0

0

1

0

0

0

1

1

0

1

0

0

1

0

0

Enro

llment B

iom

etric

0

1

0

0

1

0

0

0

1

1

0

0

0

Auth

entic

atio

n B

iom

etric

1

Syndrome Decoder

Syndro

me b

its

Syndrome Encoder

1

0

0

1

0

0

Syndr.

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 7 / 35

Page 12: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Biometrics: Toy Example

X, Y : length seven binary sequence

Channel Model: one bit flip (8 possibilities)

3 bits required.

0

1

1

0

1

0

0

1

0

0

0

1

1

0

1

0

0

1

0

0

Enro

llment B

iom

etric

1

1

0

0

1

0

0

1

1

1

0

0

0

Auth

entic

atio

n B

iom

etric

1

Syndrome Decoder

Syndro

me b

its

Syndrome Encoder

1

0

0

1

0

0

Syndr.

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 7 / 35

Page 13: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Biometrics: Toy Example

X, Y : length seven binary sequence

Channel Model: one bit flip (8 possibilities)

3 bits required.

0

1

1

0

1

0

0

1

0

0

0

1

1

0

1

0

0

1

0

0

Enro

llment B

iom

etric

0

0

0

0

1

0

0

1

0

1

0

0

0

Auth

entic

atio

n B

iom

etric

1

Syndrome Decoder

Syndro

me b

its

Syndrome Encoder

1

0

0

1

0

0

Syndr.

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 7 / 35

Page 14: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Biometrics: Toy Example

X, Y : length seven binary sequence

Channel Model: one bit flip (8 possibilities)

3 bits required.

0

1

1

0

1

0

0

1

0

0

0

1

1

0

1

0

0

1

0

0

Enro

llment B

iom

etric

0

1

1

0

1

0

0

1

0

0

0

0

0

Auth

entic

atio

n B

iom

etric

1

Syndrome Decoder

Syndro

me b

its

Syndrome Encoder

1

0

0

1

0

0

Syndr.

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 7 / 35

Page 15: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Privacy Preserving Biometrics

S. Draper, A. Khisti, et. al “Using distributed source coding to secure fingerprintbiometrics” ICASSP, 2007

Encode

enrollment

biometric Store syndrome S

SyndromeEncoding

X S

Originalenrollment

biometric

Store syndromes

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 8 / 35

Page 16: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Privacy Preserving Biometrics

S. Draper, A. Khisti, et. al “Using distributed source coding to secure fingerprintbiometrics” ICASSP, 2007

Encode

enrollment

biometric

SyndromeEncoding

Store syndrome S

X SSyndromeDecoding

Authentication biometric

Decode

w/ probe

biometric

FingerprintChannel

Y

Original

enrollment

biometric

Originalenrollment

biometric

Store syndromes

Reproduce enrollment biometric

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 8 / 35

Page 17: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Privacy Preserving Biometrics

S. Draper, A. Khisti, et. al “Using distributed source coding to secure fingerprintbiometrics” ICASSP, 2007

Encode

enrollment

biometric

SyndromeEncoding

Store syndrome S

Originalenrollment

biometric

X SSyndromeDecoding

Authentication biometric

Decode

w/ probe

biometric

FingerprintChannel

Y

Original

enrollment

biometric

One way hash

BiometricAuthentication

One way hash

Store syndromes

Reproduce enrollment biometric

AuthenticateInformation Theoretic Security: Fundamentals and Applications :

Ashish Khisti (University of Toronto) 8 / 35

Page 18: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Smart-Meter PrivacyD. Varodayan and A Khisti, ICASSP 2011

C. Efthymiou and G. Kalogridis, Smart grid privacy via anonymization of smart

metering data, Smart Grid Commun. Conf., Gaithersburg, 2010.Information Theoretic Security: Fundamentals and Applications :

Ashish Khisti (University of Toronto) 9 / 35

Page 19: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Smart-Meter PrivacyD. Varodayan and A Khisti, ICASSP 2011

Rechargeable

BatteryUser

Appliances

X YUtility

Company

Privacy Leakage: I (XN ;Y N)

Battery: Limited Storage

Model Battery as a Finite State Communication Channel

“Design the Channel”

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 9 / 35

Page 20: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secret-Key Generation in Wireless Fading Channels

A B

KAKB

Forward Link

Reverse Link

mA mB

ABAABB nxhy !

BABBAA nxhy !

time

Channel Gain

Forward ChannelReverse Channel

Fading

Reciprocity

Spatial Decorrelation

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 10 / 35

Page 21: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secret-Key Generation in Wireless Fading Channels

A B

E

KAKB

Forward Link

Reverse Link

mA mB

ABAABB nxhy !

BABBAA nxhy !

AEAAEAE nxgz ! BEBBEBE nxgz !

time

Channel Gain

Forward ChannelReverse Channel

Eavesdropper Link

Fading

Reciprocity

Spatial Decorrelation

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 10 / 35

Page 22: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secret-Key Generation in Wireless Fading ChannelsA. Khisti 2013

A B

E

KA

KB

Forward Link

Reverse Link

mA

mB

ABAABB nxhy !

BABBAA nxhy !

AEAAEAE nxgz !BEBBEBE nxgz !

Start

Channel Probing

N

ABh N

BAh

Shared Key

Key Extraction

Two Phase Approach:

Phase I: Channel Probing andEstimation: (hNAB , h

NBA)

Phase 2: Source Reconciliationand Key Extraction

Secret-Key Generation: CapacityLimits

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 11 / 35

Page 23: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secure MIMO Communication

Rx. 101011

Dec.

Tx.

101011

Eaves.

??????

Enc.

Signal of interest: direction of legitimate receiver.

Synthetic noise: null-space of legitimate receiver.

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 12 / 35

Page 24: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secure MIMO MulticastA. Khisti, 2011

Artificial Noise Alignment

Ev 1

Rx2

Rx1

IA P

rec

od

er

Transmitter

Noise

Symbols

Information

SymbolsSignal

Masking

Align Noise Symbols at Legitimate Receivers

Mask Information Symbols at Eavesdroppers

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 13 / 35

Page 25: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Outline

Motivating Applications

Secure BiometricsSmart-Meter PrivacyWireless Systems

Information Theoretic Models

Wiretap Channel ModelSecret-key agreement

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 14 / 35

Page 26: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Wiretap ChannelWyner’75

AWGN Wiretap Channel Model

E n c o d e r

R e c e i v e r

E a v e s .

M

M

X n

Y nr

Z nr

Z ne

Y ne ??

Reliability Constraint : Pr(M 6= M)n

−→ 0

Secrecy Constraint : 1nH(M|Y n

e ) =1nH(M)− on(1)

Secrecy Capacity

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 15 / 35

Page 27: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secrecy Criterion

1

nH(M|Y n

e )︸ ︷︷ ︸

Equivocationrate

=1

nH(M)

︸ ︷︷ ︸

Informationrate

−on(1)

Perfect Secrecy: on(1) ≡ 0, (Shannon ’49)

Weak Secrecy: on(1)n

−→ 0, (Wyner ’75)

Strong Secrecy: on(1) ∈ O(1n

), (Maurer and Wolf ’00)

Guessing approach : (Arikan & Merhav ’02)

Focus: Wyner’s notion

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 16 / 35

Page 28: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Joint Encryption and Encoding

Separation based approach vs. Wiretap codes

Traditional Approach : Separation ...

E n c o d e r

D e c o d e r

E a v e s .

E n c r y p t i o n

K e y

D e c r y p t i o n

K e y

M

M

X n

Y nr

Z nr

Z ne

Y ne ??

Traditional Approach

Separation based

Requires keys

Wiretap Codes

Joint encryption/encoding

Channel based secrecy

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 17 / 35

Page 29: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Joint Encryption and Encoding

Separation based approach vs. Wiretap codes

Wiretap Codes: Joint Encryption and Encoding

D e c o d e r

E a v e s .

D e c r y p t i o n

K e y

S e c u r e E n c o d e rM

M

X n

Y nr

Z nr

Z ne

Y ne ??

Traditional Approach

Separation based

Requires keys

Wiretap Codes

Joint encryption/encoding

Channel based secrecy

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 17 / 35

Page 30: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Joint Encryption and Encoding

Separation based approach vs. Wiretap codes

Wiretap Codes: Joint Encryption and Encoding

S e c u r e D e c o d e r

E a v e s .

S e c u r e E n c o d e rM

M

X n

Y nr

Z nr

Z ne

Y ne ??

Traditional Approach

Separation based

Requires keys

Wiretap Codes

Joint encryption/encoding

Channel based secrecy

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 17 / 35

Page 31: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Wiretap Codes

Uniform Noise Wiretap Channel Model

S e c u r e D e c o d e r

E a v e s .

S e c u r e E n c o d e rM

M

X n

Y nr

Z nr

Z ne

Y ne ??

QAM Modulation

Uniform noise model

σ2e = 4σ2

r

Recv. Noise Eaves. Noise σ2e = 4σ2

r

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 18 / 35

Page 32: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Wiretap Codes

QAM Modulation

Uniform noise model

Recv. Noise Eaves. Noise σ2e = 4σ2

r

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 19 / 35

Page 33: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Wiretap Codes

QAM Modulation

Uniform noise model

Recv. Noise Eaves. Noise σ2e = 4σ2

r

Receiver’s Constellation

Cr = log2 64 = 6 b/s

Eavesdropper’s Constellation

Ce = log2 16 = 4 b/s

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 19 / 35

Page 34: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Wiretap Codes

QAM Modulation

Uniform noise model

Recv. Noise Eaves. Noise σ2e = 4σ2

r

Receiver’s Constellation

Cr = log2 64 = 6 b/s

Eavesdropper’s Constellation

Ce = log2 16 = 4 b/s

Cs = Cr − Ce = 2 b/sInformation Theoretic Security: Fundamentals and Applications :

Ashish Khisti (University of Toronto) 19 / 35

Page 35: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Wiretap Codes

Secure QAM Constellation

Msg 1

Msg 2

Msg 3

Msg 4

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 20 / 35

Page 36: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Wiretap Codes

Encoding: Randomly select one candidate

Msg 1

Msg 2

Msg 3

Msg 4

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 20 / 35

Page 37: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Wiretap Codes

Decoding at legitimate receiver

Msg 1

Msg 2

Msg 3

Msg 4

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 20 / 35

Page 38: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Wiretap Codes

Confusion at the eavesdropper

Msg 1

Msg 2

Msg 3

Msg 4

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 20 / 35

Page 39: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Gaussian Wiretap ChannelLeung-Yan-Cheong and Hellman’78

E n c o d e r

R e c e i v e r

E a v e s .

M

M

X n

Y nr

Z nr

Z ne

Y ne ??

Secrecy Capacity

Cs = {log(1 + SNRr )− log(1 + SNRe)}+

= {C (SNRr )− C (SNRe)}+

SNRr : Legitimate receiver’s signal to noise ratio

SNRe : Eavesdropper’s signal to noise ratio

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 21 / 35

Page 40: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Other Classical Results

The secrecy capacity was also characterized for:

Degraded Memoryless Wiretap Channel(Wyner’75)X → Yr → Ye

C = maxpX

I (X ;Yr )− I (X ;Ye)

Discrete Memoryless Wiretap Channel (Csiszar-Korner ’78)

C = maxpU,X

I (U;Yr )− I (U;Ye),

U → X → (Yr ,Ye)Cardinality bounds on the alphabet of U

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 22 / 35

Page 41: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Gaussian Wiretap Channel

101011 Receiver

Eavesdropper

101011

??????Transmitter

Strong Requirement: Eavesdropper must not be closer to thetransmitter

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 23 / 35

Page 42: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Gaussian Wiretap Channel

101011 Receiver

Eavesdropper

101011

101011Transmitter

Strong Requirement: Eavesdropper must not be closer to thetransmitter

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 23 / 35

Page 43: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Solution ... Multiple AntennasKhisti-Wornell 2010

Multi-antenna wiretap channel

1 0 1 1

1 0 1 1

? ? ? ?Transmitter

Receiver

Eavesdropper

Spatial Diversity: Multiple Antennas

Temporal Diversity: Fading Channels

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 24 / 35

Page 44: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Solution ... Multiple AntennasKhisti-Wornell 2010

Multi-antenna wiretap channel

1 0 1 1

1 0 1 1

? ? ? ?Transmitter

Receiver

Eavesdropper

Channel Model

Yr = HrX + Zr

Ye = HeX + Ze

Channel matrices:Hr ∈ C

Nr×Nt , He ∈ CNe×Nt

Nt : # Tx antennas

AWGN noise: Zr , Ze

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 24 / 35

Page 45: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

MIMOME: Secrecy CapacityKhisti-Wornell 2010

Theorem

Secrecy capacity of the Multi-antenna wiretap channel is given by,

Cs = maxQ�0:Tr(Q)≤P

log det(Ir + HrQH†r )− log det(Ie + HeQH

†e )

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 25 / 35

Page 46: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

MIMOME: Secrecy CapacityKhisti-Wornell 2010

Theorem

Secrecy capacity of the Multi-antenna wiretap channel is given by,

Cs = maxQ�0:Tr(Q)≤P

log det(Ir + HrQH†r )− log det(Ie + HeQH

†e )

Scalar Gaussian Case (Leung-Yan-Cheong & Hellman ’78),

Cs = log(1 + SNRr )− log(1 + SNRe)

New information theoretic upper-bound

Convex Optimization

Matrix Analysis

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 25 / 35

Page 47: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secrecy Capacity: Remarks

Cs = maxQ�0:Tr(Q)≤P

log det(Ir + HrQH†r )− log det(Ie + HeQH

†e )

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 26 / 35

Page 48: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secrecy Capacity: Remarks

Cs = maxQ�0:Tr(Q)≤P

log det(Ir + HrQH†r )− log det(Ie + HeQH

†e )

1 Convex Reformulation

Cs = minΦ∈P

maxQ∈Q

R+(Φ,Q)

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 26 / 35

Page 49: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secrecy Capacity: Remarks

Cs = maxQ�0:Tr(Q)≤P

log det(Ir + HrQH†r )− log det(Ie + HeQH

†e )

1 Convex Reformulation

Cs = minΦ∈P

maxQ∈Q

R+(Φ,Q)

2 MISOME Case: rank-one covariance is optimal

Cs = log+ λmax(I + Phrh†r , I + PH†

eHe)

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 26 / 35

Page 50: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secrecy Capacity: Remarks

Cs = maxQ�0:Tr(Q)≤P

log det(Ir + HrQH†r )− log det(Ie + HeQH

†e )

1 Convex Reformulation

Cs = minΦ∈P

maxQ∈Q

R+(Φ,Q)

2 MISOME Case: rank-one covariance is optimal

Cs = log+ λmax(I + Phrh†r , I + PH†

eHe)

3 High SNR case: GSVD transformSimultaneous diagonalization: (Hr ,He)

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 26 / 35

Page 51: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Masked Beamforming Scheme

MISOME Case: Yr = h†rX + Zr , Ye = HeX + Ze

Rx. 101011

Dec.

Tx.

101011

Eaves.

??????

Enc.

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 27 / 35

Page 52: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Masked Beamforming Scheme

MISOME Case: Yr = h†rX + Zr , Ye = HeX + Ze

Rx. 101011

Dec.

Tx.

101011

Eaves.

??????

Enc.

Signal of interest: direction of legitimate receiver.

Synthetic noise: null-space of legitimate receiver.

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 27 / 35

Page 53: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Masked Beamforming vs. Capacity Achieving Scheme

MISOME Case: Yr = h†rX + Zr , Ye = HeX + Ze

Masked beamforming scheme

Scalar

Wiretap Code

Masked

Beam-forming

rh

erHh ,

Capacity achieving scheme

Scalar

Wiretap Code

Optimal

Beam-forming

rh e

H,

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 28 / 35

Page 54: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Masked Beamforming vs. Capacity Achieving Scheme

MISOME Case: Yr = h†rX + Zr , Ye = HeX + Ze

Masked beamforming scheme

Scalar

Wiretap Code

Masked

Beam-forming

rh

erHh ,

Capacity achieving scheme

Scalar

Wiretap Code

Optimal

Beam-forming

rh e

H,

limP→∞

{

C

(

hr ,He ,P

Nt

)

− RMB(hr ,He ,P)

}

= 0

Transmit Power: P

Transmit antennas: Nt

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 28 / 35

Page 55: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Outline

Motivating Applications

Secure BiometricsSmart-Meter PrivacyWireless Systems

Information Theoretic Models

Wiretap Channel ModelSecret-key agreement

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 29 / 35

Page 56: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Secret Key GenerationMaurer ’93, Ahlswede-Csiszar ’93

A B

uN vN

F = f (uN)

k = KA(uN) k = KB(v

N , f )

Error Probability: Pr(k 6= k) ≤ εN

Equivocation: 1NH(k |f ) ≥ 1

NH(k) − εn

Rate R = 1NH(k)

Ckey = I (u; v)

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 30 / 35

Page 57: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Achievability

Random Binning Technique (Slepian-Wolf ’73)

S l e p a i n - W o l f E n c o d e rB i n - I n d e x

B i n 1 B i n 2

1

23

41

23

4 1

23

4

uN

No. of Bins: ≈ 2nH(v |u)

No. of Sequences/Bin: ≈ 2nI (u;v)Information Theoretic Security: Fundamentals and Applications :

Ashish Khisti (University of Toronto) 31 / 35

Page 58: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Joint Source and Channel CodingKhisti-Diggavi-Wornell ’08

E n c .

d e c

w. t .

uN

vN

p(y , z |x)xn

yn

zn

Two types of uncertainty

Sources

Channel

How to combine both these equivocation for secret-key-distillation?Information Theoretic Security: Fundamentals and Applications :

Ashish Khisti (University of Toronto) 32 / 35

Page 59: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Achievability

W y n e r - Z i vC o d e b o o k

W i r e t a pC o d e b o o k

S e c r e t - K e yC o d e b o o k

B i n I n d e x

W - Z C o d e w o r d

E n c o d e r D e c o d e r

W i r e t a pD e c o d e r

B i n I n d e x

W y n e r - Z i vD e c o d e r

S e c r e t K e yC o d e b o o k

W - Z C o d e w o r d

xn yn

uN vN

kk

Rkey = maxt,x

βI (t; v)︸ ︷︷ ︸

src. equiv.

+ I (x ; y) − I (x ; z)︸ ︷︷ ︸

channel equiv.

t → u → v , β{I (t; u)− I (t; v)} ≤ I (x ; y)

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 33 / 35

Page 60: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Capacity Results

Rkey = maxt,x

βI (t; v) + I (x ; y |z)

t → u → v , β{I (t; u)− I (t; v)} ≤ I (x ; y)

Upper and lower bounds coincide, when channels are degradedor parallel reversely degraded broadcast.

Capacity for Parallel Gaussian broadcast channels andGaussian sources

Extension to side information at the eavesdropper, whensources and channels are degraded.

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 34 / 35

Page 61: InformationTheoreticSecurity: Fundamentals …akhisti/IPSIv2.pdfInformationTheoreticSecurity: Fundamentals andApplications Ashish Khisti University of Toronto IPSI Seminar Nov 25th

Conclusions

Motivating Applications

Secure BiometricsSmart-Meter PrivacyWireless Systems

Information Theoretic Models

Wiretap Channel ModelSecret-key agreement

Information Theoretic Security: Fundamentals and Applications :Ashish Khisti (University of Toronto) 35 / 35