10 research outputs found

    Rate-Distortion Theory for Secrecy Systems

    Full text link
    Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary. A model is considered in which an adversary not only intercepts the communication from the transmitter to the receiver, but also potentially has side information. Specifically, the adversary may have causal or noncausal access to a signal that is correlated with the source sequence or the receiver's reconstruction sequence. The main contribution is the characterization of the optimal tradeoff among communication rate, secret key rate, distortion at the adversary, and distortion at the legitimate receiver. It is demonstrated that causal side information at the adversary plays a pivotal role in this tradeoff. It is also shown that measures of secrecy based on normalized equivocation are a special case of the framework.Comment: Update version, to appear in IEEE Transactions on Information Theor

    Source-Channel Secrecy with Causal Disclosure

    Full text link
    Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined. The communication system consists of a source and a broadcast (wiretap) channel, and lossless reproduction of the source sequence at the legitimate receiver is required. A key aspect of this model is that the eavesdropper's actions are allowed to depend on the past behavior of the system. Achievability results are obtained by studying the performance of source and channel coding operations separately, and then linking them together digitally. Although the problem addressed here has been solved when the secrecy resource is shared secret key, it is found that substituting secret key for a wiretap channel brings new insights and challenges: the notion of weak secrecy provides just as much distortion at the eavesdropper as strong secrecy, and revealing public messages freely is detrimental.Comment: Allerton 2012, 6 pages. Updated version includes acknowledgement

    Operations and Results from the 200 Gbps TBIRD Laser Communication Mission

    Get PDF
    Since launch in May 2022, the TeraByte Infrared Delivery (TBIRD) mission has successfully demonstrated 200 Gbps laser communications from a 6U CubeSat and has transferred up to 4.8 terabytes (TB) in a pass from low Earth orbit to ground. To our knowledge, this is the fastest downlink ever achieved from space. To support the narrow downlink beam required for high rate communications, the payload provides pointing feedback to the host spacecraft to precisely track the ground station throughout the 5-minute pass. The space and ground terminals utilize fiber-coupled coherent transceivers in conjunction with an automatic repeat request (ARQ) system to guarantee error-free communication through an atmospheric fading channel. This paper presents an overview of the link operations and mission results to date, as well as implications for future missions with high rate lasercom

    NASA’s Terabyte Infrared Delivery (TBIRD) Program: Large-Volume Data Transfer from LEO

    Get PDF
    Satellites in low-Earth orbit (LEO) have on-board sensors that can generate large amounts of data to be delivered to a ground user. Direct-to-Earth delivery from LEO is challenging because of the sparse contact with a ground terminal, but the short link distances involved can enable very high data rates by exploiting the abundance of spectrum available at optical frequencies. We provide an overview and update of NASA’s Terabyte Infrared Delivery (TBIRD) program, which will demonstrate a direct-to-Earth laser communication link from a small satellite platform to a small ground terminal at burst rates up to 200Gbps. Such a link is capable of transferring several terabytes per day to a single ground terminal. The high burst rates are achieved by leveraging off-the-shelf fiber-telecommunications transceivers for use in space applications. A 2U TBIRD payload is currently being developed for flight on a 6U NASA CubeSat

    Experimental demonstration of multi-aperture digital coherent combining over a 3.2-km free-space link

    Get PDF
    The next generation free-space optical communications infrastructure will need to support a wide variety of space-to-ground links. As a result of the limited size, weight, and power on space-borne assets, the ground terminals need to scale efficiently to large collection areas to support extremely long link distances or high data rates. Recent advances in integrated digital coherent receivers enable the coherent combining (i.e., full-field addition) of signals from several small apertures to synthesize an effective single large aperture. In this work, we experimentally demonstrate the coherent combining of signals received by four independent receive chains after propagation through a 3:2-km atmospheric channel. Measured results show the practicality of coherently combining the four received signals via digital signal processing after transmission through a turbulent atmosphere. In particular, near-lossless combining is demonstrated using the technique of maximal ratio combining

    Experimental demonstration of photon efficient coherent temporal combining for data rate scaling

    Get PDF
    The next generation free-space optical (FSO) communications infrastructure will need to support a wide range of links from space-based terminals at LEO, GEO, and deep space to the ground. Efficiently enabling such a diverse mission set requires a common ground station architecture capable of providing excellent sensitivity (i.e., few photons-per-bit) while supporting a wide range of data rates. One method for achieving excellent sensitivity performance is to use integrated digital coherent receivers. Additionally, coherent receivers provide full-field information, which enables efficient temporal coherent combining of block repeated signals. This method allows system designers to trade excess link margin for increased data rate without requiring hardware modifications. We present experimental results that show a 45-dB scaling in data rate over a 41-dB range of input powers by block-repeating and combining a PRBS sequence up to 36,017 times. Keywords: digital signal processing, optical receivers, phase shift keying, coherent combiningUnited States. Dept. of Defense. Assistant Secretary of Defense for Research & Engineering (Contract FA8721-05-C-0002

    Rate-Distortion Theory for Secrecy Systems

    No full text
    The purpose of any communication system is to ensure reliable transmission of data from a sender to a receiver. An important secondary goal is to suitably encrypt the data so that an eavesdropper cannot glean any useful information from the communication. From an information-theoretic point of view, an ideal secure communication system ensures that an eavesdropper's observations are statistically independent of the information source. Unfortunately, a prohibitively large amount of shared secret key is necessary to guarantee such perfect secrecy. This prompts a natural question: if perfect secrecy is relaxed in order to ease the key requirement, then what is a good measure of "imperfect" secrecy? One of the successes of information theory has been to establish fundamental limits of lossy data compression through the use of rate-distortion theory. In rate-distortion theory, the receiver is allowed some loss in reproducing the source in order to reduce the compression ratio; the goal is to find the optimal tradeoff between the rate of compression and the receiver's distortion. This thesis explores the consequences of applying the rate-distortion paradigm to the problem of measuring imperfect secrecy in a communication system. In particular, the key question is: what is the optimal tradeoff between the rate of secret key and the distortion that an eavesdropper suffers in trying to reconstruct the source? It turns out that distortion-based measures of security are most appropriate in settings where the eavesdropper is assumed to have additional side information about the source. This thesis examines two such settings. In the first setting, the eavesdropper is able to view the past behavior of various parts of the communication system and update his actions accordingly. In the second setting, the eavesdropper receives rate-limited communication from an omniscient assistant. This thesis characterizes the optimal information-theoretic tradeoff between the key rate and the eavesdropper's distortion for general versions of both settings

    The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List

    No full text

    Demonstration of a variable data-rate free-space optical communication architecture using efficient coherent techniques

    No full text
    The next generation free-space optical (FSO) communications infrastructure will need to support a wide range of links from space-based terminals in low Earth orbit, geosynchronous Earth orbit, and deep space to the ground. Efficiently enabling such a diverse mission set requires an optical communications system architecture capable of providing excellent sensitivity (i.e., few photons-per-bit) while allowing reductions in data rate for increased system margin. Specifically, coherent optical transmission systems have excellent sensitivity and can trade data rate for system margin by adjusting the modulation format, the forward error correction (FEC) code rate, or by repeating blocks of channel symbols. These techniques can be implemented on a common set of hardware at a fixed system baud rate. Experimental results show that changing modulation formats between quaternary phase-shifted keying and binary phase-shifted keying enables a 3-dB scaling in data rate and a 3.5-dB scaling in system margin. Experimental results of QPSK transmission show a 5.6-dB scaling of data rate and an 8.9-dB scaling in system margin by varying the FEC code rate from rate-9/10 to rate-1/4. Experimental results also show a 45.6-dB scaling in data rate over a 41.7-dB range of input powers by block-repeating and combining a pseudorandom binary sequence up to 36,017 times.United States. Dept. of Defense. Assistant Secretary of Defense for Research & Engineering (Air Force Contract FA8721-05-C-0002
    corecore