Title :
Known plaintext attack on the binary symmetric wiretap channel
Author :
Vaidyanathaswami, Rajaraman ; Thangaraj, Andrew
Author_Institution :
Dept. of Electr. Eng., Indian Inst. of Technol., Chennai, India
Abstract :
The coset encoding scheme for the wiretap channel depends primarily on generating a random sequence of bits for every code block. The secret message indexes into the set of cosets, and a random vector selects the actual code word to be transmitted from that coset. In the literature, it is usually assumed that a statistically perfect uniform random generator is available for this purpose. This study looks at security issues arising from practical ways of implementing a random number generator, especially the ones based on Linear Feedback Shift Registers. Stream ciphers based on LFSRs are vulnerable to correlation attacks and their improved variants. This article considers the known-plaintext attack, where the random vector used in wiretap coset encoding is attacked under the assumption that the message is known to the eavesdropper a priori.
Keywords :
codes; cryptography; random number generation; binary symmetric wiretap channel; code block; code word transmission; correlation attack; coset encoding scheme; eavesdropper; linear feedback shift register; plaintext attack; random sequence generation; random vector; secret message index; security issue; stream cipher; wiretap coset encoding; Convolutional codes; Correlation; Encoding; Generators; Parity check codes; Security; Vectors;
Conference_Titel :
GLOBECOM Workshops (GC Wkshps), 2011 IEEE
Conference_Location :
Houston, TX
Print_ISBN :
978-1-4673-0039-1
Electronic_ISBN :
978-1-4673-0038-4
DOI :
10.1109/GLOCOMW.2011.6162588