Next Article in Journal
Heterogeneous Nucleation in Solutions on Rough Solid Surfaces: Generalized Gibbs Approach
Next Article in Special Issue
Some New Results on the Gaussian Wiretap Feedback Channel
Previous Article in Journal
The Rényi Entropies Operate in Positive Semifields
Previous Article in Special Issue
Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach
Article

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks

by *,‡ and
Department of Computer and Network Engineering, University of Electro-Communications, Tokyo 182-8585, Japan
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in 2019 IEEE International Symposium on Information Theory (ISIT) B. Santoso and Y. Oohama: “Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks”, ISIT 2019.
Current address: 1-5-1 Chofugaoka, Tokyo 182-8585, Japan.
Entropy 2019, 21(8), 781; https://doi.org/10.3390/e21080781
Received: 8 June 2019 / Revised: 2 August 2019 / Accepted: 6 August 2019 / Published: 9 August 2019
(This article belongs to the Special Issue Information-Theoretic Security II)
In this paper, we propose a theoretical framework to analyze the secure communication problem for broadcasting two encrypted sources in the presence of an adversary which launches side-channel attacks. The adversary is not only allowed to eavesdrop the ciphertexts in the public communication channel, but is also allowed to gather additional information on the secret keys via the side-channels, physical phenomenon leaked by the encryption devices during the encryption process, such as the fluctuations of power consumption, heat, or electromagnetic radiation generated by the encryption devices. Based on our framework, we propose a countermeasure against such adversary by using the post-encryption-compression (PEC) paradigm, in the case of one-time-pad encryption. We implement the PEC paradigm using affine encoders constructed from linear encoders and derive the explicit the sufficient conditions to attain the exponential decay of the information leakage as the block lengths of encrypted sources become large. One interesting feature of the proposed countermeasure is that its performance is independent from the type of side information leaked by the encryption devices. View Full-Text
Keywords: information theoretic security; side-channel attacks; Shannon cipher system; one helper source coding problem; strong converse theorem information theoretic security; side-channel attacks; Shannon cipher system; one helper source coding problem; strong converse theorem
Show Figures

Figure 1

MDPI and ACS Style

Santoso, B.; Oohama, Y. Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks . Entropy 2019, 21, 781. https://doi.org/10.3390/e21080781

AMA Style

Santoso B, Oohama Y. Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks . Entropy. 2019; 21(8):781. https://doi.org/10.3390/e21080781

Chicago/Turabian Style

Santoso, Bagus, and Yasutada Oohama. 2019. "Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks " Entropy 21, no. 8: 781. https://doi.org/10.3390/e21080781

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop