Tradeoff between reliability and security in block ciphering systems with physical channel errors

In this paper, we study the effects of channel errors on security and decoding error probability of three encryption systems where encrypted message is sent and eavesdropped over binary symmetric channels (BSC). The three systems are all based on Data Encryption Standard (DES) in cipher feedback (CFB) mode. They are DES only (DC), DES concatenated with Reed Solomon encoding (DCRS), and DES concatenated with RS coding and S-box diffusion (DCRSS). We adopt linear crypt-analysis to quantitatively measure the effects of channel errors on the security of these systems. We have found the required known cipher-plain text pairs in each system for linear attack launched by Eve, an eavesdropper. In addition, performance analysis in terms of decoded information bit error probability (IBER) for Bob, the legitimate receiver, has been conducted for each system, whose accuracy is later verified by simulation results. Our results suggest there exists tradeoff between communication reliability and security. More security level can be attained by sacrificing the accuracy at the legitimate receiver end, which can be captured by the relationship between IBER and our proposed novel metric, security improvement factor (SIF).

[1]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[2]  Hideki Imai,et al.  An approach for stream ciphers design based on joint computing over random and secret data , 2009, Computing.

[3]  Vincent Rijmen,et al.  The Cipher SHARK , 1996, FSE.

[4]  David G. Messerschmitt,et al.  The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks , 2001, MMNS.

[5]  Rajarathnam Chandramouli,et al.  Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[6]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[7]  Muid Mufti,et al.  On Modeling Post Decryption Error Processes in UMTS Air Interface , 2007, Inscrypt.

[8]  Robert J. McEliece,et al.  On the decoder error probability for Reed-Solomon codes , 1986, IEEE Trans. Inf. Theory.

[9]  Shu Lin,et al.  Error Control Coding , 2004 .

[10]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[11]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[12]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[13]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[14]  Mohsen Guizani,et al.  Stream-based cipher feedback mode in wireless error channel , 2009, IEEE Transactions on Wireless Communications.