Elements of information theory
Elements of information theory
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Overview of IEEE 802.16 Security
IEEE Security and Privacy
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
IEEE Transactions on Dependable and Secure Computing
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
Journal of Cryptology
An approach for stream ciphers design based on joint computing over random and secret data
Computing - Special Issue on the occasion of the 8th Central European Conference on Cryptography
Stream-based cipher feedback mode in wireless error channel
IEEE Transactions on Wireless Communications
Random ciphering bounds on a class of secrecy systems and discrete message sources
IEEE Transactions on Information Theory
Introduction to the Special Issue on Information Theoretic Security
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Channel errors are usually treated as an obstacle in designing an encrypted wireless system. So we are supposed to reduce them as much as possible due to the potential error bursts contributed by an avalanche effect of block ciphers. In this paper, we propose that channel errors are to be explored for the benefit of security enhancement as they could be translated to additional efforts in cryptanalysis for an adversary node. To achieve this, a system with an outer block channel coder and an inner block cipher is presented. A framework for linear cryptanalysis is established under which an eavesdropper takes advantage of linear relationship among coded symbols, as well as linear approximation of ciphers. Also presented is an analysis on the tradeoff between security enhancement and performance degradation in the presence of channel errors.