A Wire‑Tap Approach to Enhance Security in Communication Systems Using the Encoding‑Encryption Paradigm

Total Page:16

File Type:pdf, Size:1020Kb

A Wire‑Tap Approach to Enhance Security in Communication Systems Using the Encoding‑Encryption Paradigm This document is downloaded from DR‑NTU (https://dr.ntu.edu.sg) Nanyang Technological University, Singapore. A wire‑tap approach to enhance security in communication systems using the encoding‑encryption paradigm Mihaljevic, Miodrag; Oggier, Frederique 2010 Mihaljevic, M. & Oggier, F. (2010). A wire‑tap approach to enhance security in communication systems using the encoding‑encryption paradigm. Information and Coding Theory Workshop, International Conference on Telecommunications (ICT) 2010. https://hdl.handle.net/10356/93759 Downloaded on 28 Sep 2021 14:24:25 SGT A Wire-tap Approach to Enhance Security in Communication Systems using the Encoding-Encryption Paradigm Miodrag Mihaljevic´ Fred´ erique´ Oggier Mathematical Institute Division of Mathematical Sciences Serbian Academy of Sciences and Arts, Belgrade, Serbia School of Physical and Mathematical Sciences and Research Center for Information Security (RCIS) Nanyang Technological University Institute of Advanced Industrial Science and Technology (AIST), Singapore Tokyo, Japan Email: [email protected] Email:[email protected] Abstract—Motivated by the GSM system, we consider com- the redundant data from the cryptographic security point of munication systems which employ the encoding-encryption view has been pointed out even in [6] where the cryptography paradigm of first encoding the data before encrypting it for as a scientific topic has been established. Performing error- transmission. We add one level of security to the existing system designs by introducing a wiretap encoder. We analyze the security correction coding of a message before encryption introduces a from an information theoretical point of view, and prove the structured redundancy, which could be an origin for mounting enhanced security of the proposed scheme, focusing on the certain attacks against the employed keystream generator. case of known plain text attacks that can endanger not only The question that we address in this work is a generic the confidentiality of some messages but also the safety of the approach for enhancing the security of communication systems key used for encryption, and thus the security of the whole communication system. where the data is first encoded and then encrypted, of which GSM is maybe the most famous motivating example. We are I. INTRODUCTION mainly focusing on the security of the keystream generator, Reliability in wireless communication systems has been more important than the security of a given confidential extensively studied in the past decades. Recently, more and message. This is done by employing an additional dedicated more attention has been paid to the fact that wireless channels wire-tap channel coding. Similar ideas have recently appeared are by nature more vulnerable to eavesdropping. Accordingly in the context of stream ciphers designs [3], [4], but the focus wireless systems should include coding algorithms for pro- of this paper is very different since we deal with existing viding error-corrections as well as ciphering algorithms for (given) encryption schemes. encryption and decryption. The contribution of this paper is to propose and elaborate An illustrative example where the coding and ciphering an approach for improving the security of communication are of high importance is GSM (see [2]-[1]), which is the systems which utilize the “first encoding then encryption” most widespread system of mobile communications. GSM paradigm, employing a stream cipher and an error correcting must use error correction to withstand reception errors, as code. As a starting point for our study, we consider the case well as encryption to provide privacy for the users. The GSM of certain discrete memoryless channels (DMCs). We involve protocol uses the encoding-encryption paradigm: a message is into an existing system an additional block which performs a first subjected to an error-correction code which considerably dedicated wire-tap channel like coding. This dedicated coding increases the size of the message. The encoded message is then provides origin for enhancing the security as a trade-off with a encrypted and transmitted (see [1], Annex A). This approach slight/moderate increase of the implementation complexity and contradicts to the common practice of first encrypting a the communications overhead. The improved security appears message, and only then subjecting it to error-correction codes. as a consequence of joint impact of the proposed dedicated Note that an advantage of encoding and then encrypting wire-tap channel coding based on a linear mapping controlled is that even in a known plaintext attacking scenario, a wire- by a pure randomness and a noise which is inherent in the tapper can learn only a noisy version of the keystream which communication channel. makes, generally speaking, the cryptanalysis of the employed We study the security of the proposed approach from an keystream generator more complex. On the other hand, this information-theoretic point. More precisely, we show that approach implies encryption of more data because the error- the information-theoretic security of the keystream is a de- correction encoding generates redundant data in order to creasing function of the sample available for cryptanalysis. provide possibility of the errors correction. Undesirability of The achieved trade-off between the enhanced security and • operators of the homophonic wire-tap channel encoding Transmitter Keystream −1 Generator CH (·) and decoding C (·). secret key H {xi} {yi} {ai} Error-Correction A. Encoding and encryption at the transmitter Encoding encryption message {b } i The transmitter goes through the following steps: Discrete Memoryless 1) Employing the random vector u, it performs the homo- Channel (DMC) phonic (wire-tap channel) encoding of the plain text a Receiver to get { } {a } zi i Error-Correction decryption CH (a||u), Decoding message {bi} {x } i where || denotes the concatenation. How the wire-tap Keystream channel coding is concretely done will be discussed later secret key Generator on. 2) The transmitter then does the error-correction encoding Fig. 1. Model of the communications system under consideration. of the resulting vector: CE(CH (a||u)). (1) the increased implementation and communications overheads 3) Finally, it generates the ciphertext in form of an n- appears as very appropriate in a number of scenarios where dimensional binary vector y given by the security is a high priority. y = CECC (CH (a||u)) ⊕ x, (2) II. COMMUNICATION SYSTEMS MODEL where x is the output of the keystream generator and ⊕ We consider a class of communications systems which denotes XOR or addition modulo 2. employs coding and ciphering for providing the reliability and The vector y is then sent over the channel. secrecy of the transmissions, as shown in Fig. 1. The system is composed of: B. Decryption and decoding at the receiver • an ℓ-dimensional binary vector of message/plaintext data ℓ Assuming transmission over a class of binary discrete a = [ai]i=1 to be sent; n memoryless channel (DMC), the receiver gets the noisy vector • an n-dimensional binary vector x = [xi]i=1 of the keystream generator output bits used to protect the vector z given by a of data; z = y ⊎ v • a noisy binary channel, represented by an n-dimensional n binary vector v = [vi]i=1 of random noise, where each = CECC (CH (a||u)) ⊕ x ⊎ v, (3) coefficient vi is the output of a random variable Vi where stands for the operations of complementation and/or satisfying that Pr(Vi = 1) = p and Pr(Vi = 0) = 1 − p; ⊎ −1 erasures controlled by the vector v in the considered class of • CECC (·) and CECC (·): operator of the error-correction encoding and decoding, respectively. binary DMCs. Upon reception, the receiver first computes We assume the employed encryption is a stream ciphering. Indeed, the trick of reversing the order of encryption and z ⊕ x = C (C (a||u)) ⊎ v error-correction is not possible if a block-cipher were to be ECC H used for encryption. Accordingly, modulo 2 addition of the and then decode z ⊕ x: corrupted binary sequence of ciphertext and the keystream −1 −1 yields a corrupted version of the error-correction encoded CECC (z ⊕ x) = CECC (CECC (CH (a||u)) ⊎ v) plaintext where the employed encoding provides possibility for = CH (a||u) recovering the error-free plaintext. As such, the above given system is already able to provide reliability via error correcting since by assumption the error correcting code can correct the codes and some security via the use of the keystream generator. errors introduced by v. The only things left are thus to decode To enhance the security without having to change the the wire-tap code, and to remove the random bit string u, existing system, we incorporate a wire-tap encoder, composed namely of: −1 −1 a = tcatℓ(CH (CECC (z ⊕ x))) • an (m−ℓ)-dimensional binary vector of random data u = m−ℓ [ui]i=1 where each ui is the realization of the random where tcatℓ(·) denotes truncation of the argument vector to variable Ui such that Pr(Ui = 1) = Pr(Ui = 0) = 1/2; the first ℓ bits. the employed codeword inside the coset u(s) ⊕ C. The Transmitter Keystream Generator transmitted word c is specified by: secret key {xi} C C C {y } c = s1h1 ⊕s2h2 ⊕. .⊕slhl ⊕u1g1 ⊕u2g2 ⊕. .⊕ukgk {ai} i Homophonic Error-Correction encryption Encoding Encoding message { } where u = [u1,u2,...,uk] is a uniformly distributed {u } bi i random k-bit vector and k ≤ n − l. Source of Discrete Randomness Memoryless Channel We can now summarize the overall encoding operation: (DMC) Receiver h1 {z } {a } i i Homophonic Error-Correction decryption h2 Decoding Decoding message . {bi} c = [s||u] . = [s||u]G , {x } . H i Keystream hl Generator C secret key G where GH is a (l + k) × n binary matrix corresponding to Fig. 2. A framework for enhancing security employing dedicated wire-tap CH (·). channel like coding and pure randomness. B.
Recommended publications
  • Tap Code 1 2 3 4 5 1 a B C D E 2 F G H I J 3 L M N O P 4 Q R S T U 5
    Solution to Kryptos 2: Challenge 1 The audio files indicate that the prisoners are communicating with each other by “tapping”. There are two distinct tapping sounds which indicate the two prisoners are exchanging some sort of information back and forth. Furthermore, unlike Morse Code, each audio file is made up of pairs of taps which leads one to believe that each pair of taps corresponds to a word or letter. The longest tapping sequence is five, so if one assumes that each tap-pair corresponds to a pair of integers between 1 and 5, then this code could encipher 25 items – most likely letters. At this point, one could try a frequency analysis to help identify which pairs of integers correspond to which letters. Alternatively, a little research might yield the “tap code” (see e.g. Wikipedia) which has been used by prisoners of war in various conflicts throughout history, most recently Vietnam. It is based on the Polybius square, some of which have slightly different arrangements of the 26 letters placed into 25 cells. Challenge 1 was based on the following key found on Wikipedia: Tap code 1 2 3 4 5 1 A B C D E 2 F G H I J 3 L M N O P 4 Q R S T U 5 V W X Y Z The tap code table This has all letters except “K”, so “C” is used instead. The letter “X” is used to separate sentences. The first audio file begins with the following tap-pairs: (2,4), (4,3), (1,3), (3,4), (5,1), (1,5), (4,2),… which yields the following plaintext: i, s, c, o, v, e, r, … By adding in the likely punctuation, the complete conversation can be decoded: PLAINTEXT Prisoner 1: Is cover intact? Prisoner 2: Yes.
    [Show full text]
  • Jan. 2012 Issue
    AmateurAmateur AA RR SS SocietySociety NewsNews Newsletter of The Amateur Radio Society of India (Member of IARU) English / Hindi Quarterly Volume I Issue 7 KARBIL/2009/38494 Jan. 2012 Price : Rs.10/- President’s message From the Editor’s desk Dear members all of us active hams are looking at Most of us were privileged to be a part learning more about. Here's wishing you all a HAPPY of Hamfest 2011 which was held in ARSI applied for and obtained special NEW YEAR 2012. More and more Kochi. It was an extremely well suffix for use by all Indian hams in amateurs are showing interest in organised and coordinated event with a commemoration of India's first HUGE gathering of hams and SWL's Formula 1 race meet at Greater Noida. working Satellites, so I have all having a chance to have an eyeball Many hams took an active part in the included a list of operational with their old friends and make new effort in running this most prestigious satellites along with the details. ones. The location and facilities were event. really great. Band conditions seems to be The propagation on the HF bands is improving – I expect a lot of activity The display and sales areas were just picking up nicely and we can hear and this year resulting in more news and like a major exhibition and there was work stations worldwide after a gap of space to move around and see what one some months. reports for me to include in the could pick up for homebrew efforts and newsletter, Hi Please send articles, augment one's shack.
    [Show full text]
  • On the Subject of Odd One Out
    Keep Talking and Nobody Explodes Mod Odd One Out On the Subject of Odd One Out One of these things is not like the others! One of these things just doesn’t belong! There are six buttons on the module which may display a variety of things directly on the button or in the display whilst hovering over a button. Five of the buttons, referred to below as the “good buttons”, satisfy a specific property which is described in the table below. Press the button that doesn’t belong — the “odd one out” — to move on to the next stage. The current stage is indicated by LEDs at the top of the module. Once 5 stages have been completed, press the button that has had the correct answer a unique number of times to disarm the module. You may long-press any button to reset the module back to stage 1. Display set Instructions Depending on the color of the LED to the right of the display: Red LED: The good buttons form a sequence of letters with equal distance in the alphabet, wrapping around from Z back to A. Yellow LED: The good buttons, when read in reading order, form a five-letter English word that is encoded using Atbash cipher. In this cipher, A↔Z, B↔Y, C↔X, etc. Green LED: The good buttons, when read in reading order, form a five-letter English word that is encoded using ROT13. In this Letters cipher, A↔N, B↔O, C↔P, etc. Turquoise LED: The good buttons have letters whose Morse code begins with the same two symbols.
    [Show full text]
  • Inferences from Interactions with Smart Devices: Security Leaks and Defenses
    Syracuse University SURFACE Dissertations - ALL SURFACE August 2019 Inferences from Interactions with Smart Devices: Security Leaks and Defenses Diksha Shukla Syracuse University Follow this and additional works at: https://surface.syr.edu/etd Part of the Engineering Commons Recommended Citation Shukla, Diksha, "Inferences from Interactions with Smart Devices: Security Leaks and Defenses" (2019). Dissertations - ALL. 1060. https://surface.syr.edu/etd/1060 This Dissertation is brought to you for free and open access by the SURFACE at SURFACE. It has been accepted for inclusion in Dissertations - ALL by an authorized administrator of SURFACE. For more information, please contact [email protected]. ABSTRACT We unlock our smart devices such as smartphone several times every day using a pin, password, or graphical pattern if the device is secured by one. The scope and usage of smart devices’ are expanding day by day in our everyday life and hence the need to make them more secure. In the near future, we may need to authenticate ourselves on emerging smart devices such as electronic doors, exercise equipment, power tools, medical devices, and smart TV remote control. While recent research focuses on developing new behavior-based methods to authenticate these smart devices, pin and password still remain primary methods to authenticate a user on a device. Although the recent research exposes the observation-based vulnerabilities, the popular belief is that the direct observation attacks can be thwarted by simple methods that obscure the attacker’s view of the input console (or screen). In this dissertation, we study the users’ hand movement pattern while they type on their smart devices.
    [Show full text]
  • On the Subject of Seven Choose Four
    Keep Talking and Nobody Explodes Mod Seven Choose Four On the Subject of Seven Choose Four Pomelo colors? Pomelo colors! This module consists of four pink buttons, each with a flashing LED next to them. Tips to Success Successfully: In order to solve this module, you must submit four 4-digit codes in sequence. There are 4 possible type of flashes: Morse Code, Tap Code, a sequence of colors, and a number of long flashes between 1 and 7. The morse code and tap codes are deciphered in the usual way. NOTE: Always use C instead of K if the received tap code is 13. The sequence of colors will flash 5 different color. The number of long flashes corresponds to the position of this list below: R G B M C Y W Start from the LED which lights a sequence of colors, take the sequence of the colors and refer to the table below: Position Description 1 Color operator for Stage 1 2 Color operator for Stage 2 3 Color operator for Stage 3 4 Color operator for Stage 4 5 Input for Stage 1 (First letter of the color) The inputs for subsequent stages are based on the position of the LED which lights a sequence of colors, where remaining inputs continue from the its location downward, wrapping around as necessary. The instructions to determine the 4-digit code for each color operator can be found below. NOTE: When entering the code, shift down by N times, wrapping around as necessary, where N = (Current stage number - 1).
    [Show full text]
  • Les Codes Secrets Décryptés
    Les codes secrets décryptés 3ème édition corrigée et augmentée Didier Müller Nymphomath Éditions Contact : [email protected] © Nymphomath Éditions, 2018-2020 version 3.0 : 9 septembre 2018 version 3.2 : 13 décembre 2020 ISBN 978-2-8399-2485-6 À Pierre Baud « It may be roundly asserted that human ingenuity cannot concoct a cipher which human ingenuity cannot resolve... » « On peut affirmer que l'ingéniosité humaine ne peut pas élaborer un chiffre que l'ingéniosité humaine ne peut résoudre... » Edgar Allan Poe A Few Words on Secret Writing, 1841. Avant-propos AVANT-PROPOS La cryptologie, plus communément appelée la science des codes secrets, est à la fois une science et un art. C'est une science, car elle fait appel aux mathématiques et à l'informatique, que ce soit pour chiffrer des messages ou pour les décrypter. La cryptologie est aussi un art, car elle fait appel aux talents d'intuition, d'imagination et d'invention du décrypteur, ces facultés étant elles-mêmes secondées par des connaissances linguistiques approfondies. Je voulais écrire un livre qui s'inscrirait dans la ligne de ceux des grands cryptologues du 20 ème siècle : Baudouin, Friedman, Givierge, Langie, Sacco, Fouché Gaines, Sinkov, et quelques autres. Leurs livres ne se contentaient pas de présenter des systèmes de chiffrement, ils montraient aussi leurs faiblesses et comment les décrypter. Je vous invite donc à un voyage dans le temps, depuis l'Antiquité jusqu'à nos jours, où vous découvrirez les systèmes de chiffrement qui ont marqué leur époque. Nous regarderons plus d'une centaine de chiffres, la plupart ne demandant que du papier et un crayon.
    [Show full text]
  • &./3?J- Ornl-5183 Programs
    }&./3?J- ORNL-5183 PROGRAMS •ll-TEMFEMTIIE US ClllEI lEJtCTM SAFETY STIIIES PRWRESS wrwi lawni 1,1974 • Iwe 31,1975 T. t. Col* J. P. Sondvrs *. R. Kosttn ORRL-51S3 Distribution Category OC-77 Contract Ho. H-7405-eng-26 HICB-TEKPERATURE GAS-COOLED REACTOR SAPETT STUDIES PROGRESS lEPORT FOR JANUARY 1, 1974, THROUGH JURE 30, 1975 Tt S. Cole and J. P. Sanders, Program Managers P. R. Kasten, Prograa Director Dole Published: July 1977 OAK RIDGE RATIONAL LABORATORY Oak Ridge, Tennessee 37830 operated by UWI01I CARBIDE CORPORATIOR for the EHERCY RESEARCH AMD DEVELOPHERT ADMIRISTRATIOR mr CiSlRIBUTICN OF THIS DOCUMENT IS UNUMlTEd 90UHBKD The Gas-Cooled Reactor Program being carried oat at the Oak Ridge national laboratory contribute to the development and evaluation of nign-tenpereture gas-cooled reactors (nTGRs) and of gas-cooled fast reactors (OCRs). The development programa that are •nonsored by the U.S. Energy Besearch and Development Administration (Etta) include the Iberian Utilisation Program (RGg fuel lecycle Development Program), the RGR base Technology Program, the HTCK Safety Programs, and the CCFt Progran. In addition to the Una progress, safety stadias and assess- •eats have aleo been perfornad at the request and under sponsorship of the Division of Systens and Safety and the Division of leactor Safety Research of the U.S. nuclear Regulatory Commission. These stadias con­ sisted of Independent, objective assessnents of the safety aspects of specific systens of power stations for which construction or operating licenses were being considered. This report documents the work perfomed under all phases of the RGB safety atodies at OWL.
    [Show full text]
  • Perception and Action Planning
    EUROPEANJOURNAL OF COGNITIVE PSYCHOLOGY, 1997, 9 (2), 129± 154 Perception and Action Planning Wolfgang Prinz Max-Planck-Institute for Psychological Research and Institute for Psychology, University of Munich, Munich, Germany A new framework for the understanding of functional relationships between perception and action is discussed. According to this framework, perceived events and planned actions share a common representational domain (common-coding approach). Supporting evidence from two classes of experimental paradigms is presented: induction paradigms and interference paradigms. Induction paradigms study how certain stimuli induce certain actions by virtue of similarity. Evidence from two types of induction tasks is reviewed: sensorimotor synchronisation and spatial compatibility tasks. Interference paradigms study the mutual interference between the perception of ongoing events and the preparation and control of ongoing action. Again, evidence from two types of such tasks is reviewed, implying interfer- ence in either direction. It is concluded that the evidence available supports the common coding principle. A further general principle emerging from these studies is the action e ect principleÐ that is, the principle that cogni- tive representations of action e ects play a critical role in the planning and control of these actions. INTRODUCTION In this paper, I present a framework for understanding some aspects of the functional relationships between perception and action. It is mainly a framework for action control and action planning, but to some extent it is a framework for perception as well. Its core contention is that Downloaded by [University of Arizona] at 05:18 24 December 2012 perceived events and planned actions share a common representational domain.
    [Show full text]
  • Information Theoretic Secrecy for Some Multiuser Wireless
    The Pennsylvania State University The Graduate School College of Engineering INFORMATION THEORETIC SECRECY FOR SOME MULTIUSER WIRELESS COMMUNICATION CHANNELS A Dissertation in Electrical Engineering by Ender Tekin c 2008 Ender Tekin Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2008 The dissertation of Ender Tekin was reviewed and approved∗ by the following: Aylin Yener Associate Professor of Electrical Engineering Dissertation Adviser Chair of Committee David J. Miller Associate Professor of Electrical Engineering John F. Doherty Professor of Electrical Engineering Guohong Cao Associate Professor of Computer Science W. Kenneth Jenkins Professor of Electrical Engineering Head of the Department of Electrical Engineering ∗Signatures are on file in the Graduate School. iii Abstract The widespread use of multiuser wireless communications has been raising the demand for higher data rates and until now that has been the main design focus in wireless systems. This design focus, however, neglects the critical issue of communications security inherent in wireless systems that present a channel that is very easy for people of criminal intent to tap. Existing approaches leave this important issue to the higher layers of the protocol hierarchies, yet the need to deal with it in lower layers is imminent as the security of many cryptographic algorithms is hard to evaluate and has caused disappointment in the past. In addition, there is rising interest in large networks of low-complexity transmitters such as sensor nodes and RF-ID tags that do not have room for complicated and computationally intensive cryptographic algo- rithms. Historically, communication secrecy has been evaluated using one of two approaches: information theory or computational complexity.
    [Show full text]
  • Computer and Data Security Class 4 ﺳﻜﻴﻨﺔ ﺣﺴﻦ هﺎﺷﻢ . د: أﺳﺘﺎذة اﻟﻤﺎدة
    Save from: www.uotechnology.edu.iq/dep‐cs Computer and Data security 4th Class أﺳﺘﺎذة اﻟﻤﺎدة: د. ﺳﻜﻴﻨﺔ ﺣﺴﻦ هﺎﺷﻢ Introduction to Data Security Basic Terminology Suppose that someone wants to send a message to a receiver, and wants to be sure that no-one else can read the message. However, there is the possibility that someone else opens the letter or hears the electronic communication. In cryptographic terminology, the message is called plaintext or cleartext. Encoding the contents of the message in such a way that hides its contents from outsiders is called encryption. The encrypted message is called the ciphertext. The process of retrieving the plaintext from the ciphertext is called decryption. Encryption and decryption usually make use of a key, and the coding method is such that decryption can be performed only by knowing the proper key. Cryptography is the art or science of keeping messages secret. Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key. People who do cryptography are cryptographers, and practitioners of cryptanalysis are cryptanalysts. Cryptography deals with all aspects of secure messaging, authentication, digital signatures, electronic money, and other applications. Cryptology is the branch of mathematics that studies the mathematical foundations of cryptographic methods. Basic Cryptographic Algorithms A method of encryption and decryption is called a cipher. Some cryptographic methods rely on the secrecy of the algorithms; such algorithms are only of historical interest and are not adequate for real-world needs. All modern algorithms 1 use a key to control encryption and decryption; a message can be decrypted only if the key matches the encryption key.
    [Show full text]
  • Enhanced Packet Delivery Techniques Using Crypto-Logic Riddle on Jamming Attacks for Wireless Communication Medium
    International Journal of Latest Trends in Engineering and Technology (IJLTET) Enhanced Packet Delivery Techniques Using Crypto-Logic Riddle on Jamming Attacks for Wireless Communication Medium O.S.C Kesavulu Assistant Professor, Department of M.C.A., St.Ann’s College of Engineering and Technology, Chirala, Prakasam(dt), Andhra Pradesh, India B.B.V. Satya Vara Prasad Associate Professor, Department of M.C.A., St.Ann’s College of Engineering and Technology, Chirala, Prakasam(dt), Andhra Pradesh, India Y. Srinivasa Rao Assistant Professor, Department of M.C.A., St.Ann’s College of Engineering and Technology, Chirala, Prakasam(dt), Andhra Pradesh, India Abstract - In this paper, we address the problem of jamming under an internal threat model. We discuss about Swift jamming attacks in wireless networks. We present a challenger model for selective jamming attacks, which may give to the high importance for packet Delivery Techniques. in which specific messages of “high importance” are targeted We illustrate the impact of selective jamming on the network performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be launched by performing real-time packet classification at the physical layer. We examine the combination of cryptographic primitives with physical layer attributes for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes.
    [Show full text]
  • SUNY Delhi Financial Aid
    SUNY Delhi Financial Aid The Process Obtain a FSA ID for student and one parent at https://fsaid.ed.gov (opens new window). How to apply for a FSA ID Keep FSA IDs in a safe place. Use FSA IDs as electronic signatures on the FAFSA and other aid applications. File the FAFSA on the Web (opens a new window) as soon after Jan. 1st as possible. Filing online is highly recommended. It speeds the aid process. Questions? Click here for "7 Easy Steps to the FAFSA." For a paper FAFSA call 1-800-4FEDAID. SUNY Delhi does not have paper FAFSAs List SUNY Delhi on your FAFSA. Our Federal school code is 002857. Complete a Tuition Assistance Program (TAP) application (New York State residents only) at https://www.tapweb.org. Be sure to list the correct SUNY Delhi's TAP code: 3020 for certificate and associate degree programs 6020 for bachelor's degrees. Review your financial aid awards on the Bronco Web. SUNY Delhi will send you all forms, applications, and instructions needed to complete your aid, including student and parent loans. Read and follow all directions carefully. Respond promptly to all requests from SUNY Delhi for additional information. Use http://www.hesc.ny.gov to check the status of your TAP awards. Use www.studentloans.gov to check the status of your federal direct loans. Track your progress using the Financial Aid Checklist (Adobe Acrobat Reader required) Contact us if you have questions: 1-800-96-DELHI, 1-607-746-4570 or [email protected] .
    [Show full text]