Secure Communication over Adversarial Channel

atmire.migration.oldid3404
dc.contributor.advisorSafavi-Naini, Reihaneh
dc.contributor.authorwang, pengwei
dc.date.accessioned2015-07-24T15:56:20Z
dc.date.available2015-11-20T08:00:33Z
dc.date.issued2015-07-24
dc.date.submitted2015en
dc.description.abstractDigital Communications play an important role in modern worlds, and it is crucial to consider the security problems associated with network communication. This dissertation explores the use of physical layer characteristics of communication channels and network multipath to build secure and reliable communication in adversarial setting. We investigate four ad- versarial models: limited view adversary channel, adversarial wiretap channel, adversarial wiretap channel with public discussion, and Secure Message Transmission. The first three models are about secure communication using physical layer characters, and the last is about using network multipath for communication. We first consider secure and reliable communication over a wiretap channel with an active adversary. We consider on adversarial channel model, in which the adversary is able to eavesdrop the communication between the sender and the receiver, and also corrupt the communication by adding adversarial noise. The model of limited view adversary focuses on reliable communication over this channel, and the construction of limited view adversary code achieves reliable communication in this setting. Adversarial wiretap channel studies secure and reliable transmission over this adversarial channel. We obtain an upper bound on the capacity of this channel, and construct an adversarial wiretap code that provides secure and reliable communication over this channel. By allowing communicants to have access to a public discussion channel, secure communication becomes possible over adversarial wiretap channel for a wider range of parameters. We then consider on Secure Message Transmission in networks. We propose a new construction for secure message transmission protocols using a list decodable code and a message authentication code. Our protocol has optimal transmission rate and provides the highest reliability among all known comparable protocols.en_US
dc.identifier.doihttp://dx.doi.org/10.11575/PRISM/27727
dc.identifier.urihttp://hdl.handle.net/11023/2362
dc.language.isoeng
dc.publisher.facultyGraduate Studies
dc.publisher.institutionUniversity of Calgaryen
dc.publisher.placeCalgaryen
dc.rightsUniversity of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission.
dc.subjectComputer Science
dc.subject.classificationInformation Securityen_US
dc.subject.classificationCryptographyen_US
dc.subject.classificationWiretap Channelen_US
dc.subject.classificationAdversarial Jammingen_US
dc.titleSecure Communication over Adversarial Channel
dc.typedoctoral thesis
thesis.degree.disciplineComputer Science
thesis.degree.grantorUniversity of Calgary
thesis.degree.nameDoctor of Philosophy (PhD)
ucalgary.item.requestcopytrue
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ucalgary_2015_wang_pengwei.pdf
Size:
994.33 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.65 KB
Format:
Item-specific license agreed upon to submission
Description: