Advanced topics in information theoretic security (Vorlesung)
|Stellung in Studienplänen||Siehe TUMonline|
- 17.10.2017 13:15-16:15 N4410, Seminarraum/Besprechungsraum
- 07.11.2017 13:15-16:15 N4410, Seminarraum/Besprechungsraum
- 21.11.2017 13:15-16:15 N4410, Seminarraum/Besprechungsraum
- 05.12.2017 13:15-16:15 N4410, Seminarraum/Besprechungsraum
- 19.12.2017 13:15-16:15 N4410, Seminarraum/Besprechungsraum
- 16.01.2018 13:15-16:15 N4410, Seminarraum/Besprechungsraum
- 30.01.2018 13:15-16:15 N4410, Seminarraum/Besprechungsraum
After participating in this lecture, the students will have a deep knowledge of the concept of secret key generation for models where the adversary has side information. The students are also able to derive results based on the compound models where the statistics of the source are not necessarily known to the participants.
The lecture includes topics in advanced information theory and security. Different secret key generation models based on a discrete memoryless source are introduced and investigated from an information theoretical point of view. The simplest model is made up of a transmitter (Alice), a receiver (Bob) and an eavesdropper (Eve) whose knowledge are based on a source. Alice and Bob try to generate a shared secret key by communicating over a public noiseless channel while keeping it secret from Eve. The main difficulty arises when Eve has side information which might not be known to Alice and Bob. On the other hand, the statistics of the source might not be necessarily known to Alice and Bob. Therefore, the model is also studied based on a compound source, where the secret key generation protocol should guarantee the security and reliability of the generated secret key simultaneously for all possible realizations of the compound source which is unknown to the participants.
Prerequisites: - Fundamentals of communications engineering and information theory - Fundamentals of probability theory - Mathematical interest It is recommended to visit the following courses in advance: - Communications engineering - Information theory - Mathematics 1-4
Lehr- und Lernmethoden
The contents of the lecture are presented by means of : - Presentation on the blackboard
Imre Csiszár und János Körner, Information Theory: Coding Theorems for Discrete Memoryless Systems, 2. Auflage, Cambridge University Press