Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-skm99 Total loading time: 0 Render date: 2024-04-26T00:24:56.166Z Has data issue: false hasContentIssue false

Preface

Published online by Cambridge University Press:  28 June 2017

Rafael F. Schaefer
Affiliation:
Technische Universität Berlin
Holger Boche
Affiliation:
Technische Universität München
Ashish Khisti
Affiliation:
University of Toronto
H. Vincent Poor
Affiliation:
Princeton University, New Jersey
Get access

Summary

The ubiquity of information technologies such as wireless communications, biometric identification systems, online data repositories, and smart electricity grids has created new challenges in information security and privacy. Traditional approaches based on cryptography are often inadequate in such complex systems and fundamentally new techniques must be developed. Information theory provides fundamental limits that can guide the development of methods for addressing these challenges, and the purpose of this book is to introduce the reader to state-of-the-art developments in this field.

As a prototypical example of a system in which such methods can play an important role, one can consider a communication system. In a typical configuration, there is an architectural separation between data encryption and error correction in such systems. The encryption module is based on cryptographic principles and abstracts out the underlying communication channel as an ideal bit-pipe. The error correction module is typically implemented at the physical layer. It adds redundancy into the source message in order to combat channel impairments or multiuser interference and transforms the noisy communication channel into a reliable bit-pipe. While such a separation-based architecture has long been an obvious solution in most systems, a number of applications have emerged in recent years where encryption mechanisms must be aware of the noise structure in the underlying channel, and likewise the error correction and data compression methods must be aware of the associated secrecy constraints required by the application. Such joint approaches can be studied by developing new mathematical models of communication systems that impose both reliability constraints and secrecy constraints. Similar considerations arise throughout the information and communication technologies, and information theoretic approaches can point the way to fundamentally new solutions for such technologies. We refer to this emerging field of research as information theoretic approaches to security and privacy (ITASP). It is notable that this approach leads to guaranteeing information security irrespective of the computational power of the adversary and is a fundamental departure from current computation-based cryptographic solutions. In this book we will highlight among others the following application areas where principles of ITASP have been particularly effective.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Preface
  • Edited by Rafael F. Schaefer, Technische Universität Berlin, Holger Boche, Technische Universität München, Ashish Khisti, University of Toronto, H. Vincent Poor, Princeton University, New Jersey
  • Book: Information Theoretic Security and Privacy of Information Systems
  • Online publication: 28 June 2017
  • Chapter DOI: https://doi.org/10.1017/9781316450840.001
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Preface
  • Edited by Rafael F. Schaefer, Technische Universität Berlin, Holger Boche, Technische Universität München, Ashish Khisti, University of Toronto, H. Vincent Poor, Princeton University, New Jersey
  • Book: Information Theoretic Security and Privacy of Information Systems
  • Online publication: 28 June 2017
  • Chapter DOI: https://doi.org/10.1017/9781316450840.001
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Preface
  • Edited by Rafael F. Schaefer, Technische Universität Berlin, Holger Boche, Technische Universität München, Ashish Khisti, University of Toronto, H. Vincent Poor, Princeton University, New Jersey
  • Book: Information Theoretic Security and Privacy of Information Systems
  • Online publication: 28 June 2017
  • Chapter DOI: https://doi.org/10.1017/9781316450840.001
Available formats
×