Authentication with Mildly Myopic Adversaries

In unsecured communications settings, ascertaining the trustworthiness of received information, called authentication, is paramount. We consider keyless authentication over an arbitrarily-varying channel, where channel states are chosen by a malicious adversary with access to noisy versions of transmitted sequences. We have shown previously that a channel condition termed U-overwritability is a sufficient condition for zero authentication capacity over such a channel, and also that with a deterministic encoder, a sufficiently clear-eyed adversary is essentially omniscient. In this paper, we show that even if the authentication capacity with a deterministic encoder and an essentially omniscient adversary is zero, allowing a stochastic encoder can result in a positive authentication capacity. Furthermore, the authentication capacity with a stochastic encoder can be equal to the no-adversary capacity of the underlying channel in this case. We illustrate this for a binary channel model, which provides insight into the more general case.

[1]  Imre Csiszár,et al.  The capacity of the arbitrarily varying channel revisited: Positivity, constraints , 1988, IEEE Trans. Inf. Theory.

[2]  Oliver Kosut,et al.  Authentication Against a Myopic Adversary , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).

[3]  Anand D. Sarwate,et al.  Coding against myopic adversaries , 2010, 2010 IEEE Information Theory Workshop.

[4]  Rick S. Blum,et al.  Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[5]  Ueli Maurer,et al.  Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion , 1997, EUROCRYPT.

[6]  H. Vincent Poor,et al.  Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.

[7]  Alex J. Grant,et al.  The arbitrarily varying channel when the jammer knows the channel input , 2010, 2010 IEEE International Symposium on Information Theory.

[8]  Eric Graves,et al.  Keyless authentication in the presence of a simultaneously transmitting adversary , 2016, 2016 IEEE Information Theory Workshop (ITW).

[9]  D. Blackwell,et al.  The Capacities of Certain Channel Classes Under Random Coding , 1960 .

[10]  Thomas M. Cover,et al.  Network Information Theory , 2001 .

[11]  Gustavus J. Simmons,et al.  Authentication Theory/Coding Theory , 1985, CRYPTO.

[12]  Jörg Kliewer,et al.  Authentication Capacity of Adversarial Channels , 2018, 2018 IEEE Information Theory Workshop (ITW).

[13]  Anand D. Sarwate,et al.  Quadratically Constrained Myopic Adversarial Channels , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).

[14]  Michael Langberg,et al.  Sufficiently myopic adversaries are blind , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[15]  Can Emre Koksal,et al.  On the Basic Limits of RF-Fingerprint-Based Authentication , 2016, IEEE Transactions on Information Theory.