Loading...

Analysis of Key Agreement in Secure Networks from the View of Information Theory

Babaheidarian, Parisa | 2011

679 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 42075 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza
  7. Abstract:
  8. In this thesis the problem of simultaneously generating multiple keys among multiple terminals is investigated. After providing a survey on the related works and exploiting the problem of sharing a common secret key and a private key among three terminals, we introduce a new source model which we call it the Four-Terminal model. We consider the problem of generating three kinds of keys among legitimate terminals and investigate the problem under two different scenarios, Backward and Forward scenarios, which depend on the kind of restrictions imposed on the usage of the public channel. We derive an achievable region for the backward scenario, using the combination of superposition coding and double layer random binning which is somehow similar to the secret-superposition scheme. Also, some special cases are found in which the inner bound yields to the secret key-private keys capacity region. These special cases include the Markov chains among the source observations. It is shown that if the source observations form a Markov chain in any order then the inner bound is the capacity. The Markov chains among the source observations are dual to the degradedness and reversely degradedness conditions in the channel model. We have also derived an outer bound in some special cases. For the forward scenario we derived the rate regions of the secret key-private keys in the form of outer bound and inner bound of the capacity region. We also found some special cases in which these bound coincide with each other and result the capacity region. In the described four-terminal model, the external wiretapper is equipped with side information in addition to having access to the communication of the public channel; therefore investigating the problem of key generation in such a model is of great value.
  9. Keywords:
  10. Information Theoretic Security ; Secure Key Agreement ; Source Model ; Secret Key-Private keys Capacity Region ; External Wiretapper

 Digital Object List

 Bookmark

  • farsi.pdf
  • besm
  • farsi
  • سپاس
  • مرکز
  • چکیده
  • فهرست مطالب
  • فهرست جداول
  • فهرست تصاویر
  • هنمادها و قرارداد
  • Binder1
    • 1.pdf
    • 2ش(f)
    • 2ش(t)
    • 3
    • 4
    • 5
    • 6
    • reference
    • واژه
    • Abstract
    • english
...see more