Abstract
Cryptology is the science of information protection. In his pioneering paper “Communication Theory of Secrecy Systems” Claude E. Shannon (1949) investigated the following secrecy system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This section was written by Holger Boche and Ahmed Mansour. It is an extension of the original text of Rudolf Ahlswede, which was only a one page summary of the result of Wyner. In this text all new important developements are included. The extension of the original text was a suggestion of one of the reviewers.
References
R. Ahlswede, A note on the existence of the weak capacity for channels with arbitrarily varying channel probability functions and its relation to Shannon’s zero error capacity. Ann. Math. Stat. 41(3), 1027–1033 (1970)
R. Ahlswede, Elimination of correlation in random codes for arbitrarily varying channels. Zeitschrift für Wahrscheinlichkeitstheorie und verwandte Gebiete 44(2), 159–175 (1978)
R. Ahlswede, Remarks on Shannon’s secrecy systems. Probl. Control Inf. Theory 11(4), 301–318 (1982)
R. Ahlswede, G. Dueck, Bad codes are good ciphers. Probl. Control Inf. Theory 11(5), 337–351 (1982)
N. Alon, The Shannon capacity of a union. Combinatorica 18(3), 301–310 (1998)
G. Bagherikaram, A.S. Motahari, A.K. Khandani, Secrecy rate region of the broadcast channel with an eavesdropper, in Proceedings of the Forty-Sixth Annual Allerton Conference (2009), pp. 834–841
I. Bjelaković, H. Boche, J. Sommerfeld, Secrecy results for compound wiretap channels. Probl. Inf. Transm. 49(1), 73–98 (2013)
I. Bjelaković, H. Boche, J. Sommerfeld, Capacity results for arbitrarily varying wiretap channels, Information Theory, Combinatorics, and Search Theory (Springer, New York, 2013), pp. 123–144
D. Blackwell, L. Breiman, A.J. Thomasian, The capacity of a class of channels. Ann. Math. Stat. 30(4), 1229–1241 (1959)
M. Bloch, J. Barros, Physical-Layer Security: From Information Theory to Security Engineering (Cambridge University Press, Cambridge, 2011)
M.R. Bloch, J.N. Laneman, Strong secrecy from channel resolvability. IEEE Trans. Inf. Theory 59(12), 8077–8098 (2013)
H. Boche, N. Cai, J. Nötzel, The classical-quantum channel with random state parameters known to the sender, CoRR (2015). arXiv:abs/1506.06479
H. Boche, R.F. Schaefer, Capacity results and super-activation for wiretap channels with active wiretappers. IEEE Trans. Inf. Forensics Secur. 8(9), 1482–1496 (2013)
H. Boche, R.F. Schaefer, H.V. Poor, On the continuity of the secrecy capacity of compound and arbitrarily varying wiretap channels. IEEE Trans. Inf. Forensics Secur. 10(12), 2531–2546 (2015)
Y.-K. Chia, A. El Gamal, Three-receiver broadcast channels with common and confidential messages. IEEE Trans. Inf. Theory 58(5), 2748–2765 (2012)
I. Csiszár, Almost independence and secrecy capacity. Probl. Peredachi Inf. 32(1), 48–57 (1996)
I. Csiszár, J. Körner, Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24(3), 339–348 (1978)
I. Csiszár, J. Körner, Information Theory: Coding Theorems for Discrete Memoryless Channels (Academic, New York, 1981)
A. El Gamal, Y.-H. Kim, Network Information Theory (Cambridge University Press, New York, 2012)
G. Giedke, M.M. Wolf, Quantum communication: super-activated hannels. Nat. Photonics 5(10), 578–580 (2011)
L.H. Harper, Optimal assignments of numbers to vertices. J. Soc. Ind. Appl. Math. 12, 131–135 (1964)
A.S. Holevo, Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Inf. Transm. 9(3), 177–183 (1973)
A.S. Holevo, The capacity of the quantum channel with general signal states. IEEE Trans. Inf. Theory 44(1), 269–273 (1998)
J. Hou, G. Kramer, Effective secrecy: reliability, confusion and stealth, in Proceedings of the IEEE International Symposium on Information Theory (ISIT), Honolulu, HI, USA (2014), pp. 601–605
D. Kahn, The Codebreakers - The Story of Secret Writing (MacMillan Publishing Co, New York, 1979). 9th printing
J. Körner, K. Marton, General broadcast channels with degraded message sets. IEEE Trans. Inf. Theory 23(1), 60–64 (1977)
Y. Liang, G. Kramer, H.V. Poor, S.S. (Shitz), Compound wiretap channels. EURASIP J. Wirel. Commun. Netw. 2009(1), 1–12 (2009)
A.S. Mansour, R.F. Schaefer, H. Boche, Joint and individual secrecy in broadcast channels with receiver side information, in IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Toronto, Canada (2014), pp. 369–373
A.S. Mansour, R.F. Schaefer, H. Boche, The individual secrecy capacity of degraded multi-receiver wiretap broadcast channels, in Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, United Kingdom (2015)
K. Marton, A coding theorem for the discrete memoryless broadcast channel. IEEE Trans. Inf. Theory 25(3), 306–311 (1979)
U. Maurer, S. Wolf, Information-theoretic key agreement: from weak to strong secrecy for free, Advances in Cryptology — EUROCRYPT 2000, Lecture Notes in Computer Science (Springer, Berlin, 2000), pp. 351–368
J. Nötzel, M. Wiese, H. Boche, The arbitrarily varying wiretap channel - secret randomness, stability and super-activation, in Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT) (2015), pp. 2151–2155
J. Nötzel, M. Wiese, H. Boche, The arbitrarily varying wiretap channel - deterministic and correlated random coding capacities under the strong secrecy criterion, in Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT) (2015)
R.F. Schaefer, H. Boche, H.V. Poor, Super-activation as a unique feature of secure communication in malicious environments (2015)
C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)
C.E. Shannon, The zero error capacity of a noisy channel. IRE Trans. Inf. Theory 2(3), 8–19 (1956)
A.D. Wyner, The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355–1387 (1975)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ahlswede, R. (2016). A Short Course on Cryptography. In: Ahlswede, A., Althöfer, I., Deppe, C., Tamm, U. (eds) Hiding Data - Selected Topics. Foundations in Signal Processing, Communications and Networking, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-319-31515-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-31515-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31513-3
Online ISBN: 978-3-319-31515-7
eBook Packages: EngineeringEngineering (R0)