The rapid development of advanced computing technologies such as quantum
computing imposes new challenges to current wireless security mechanism which
is based on cryptographic approaches. To deal with various attacks and realize
long-lasting security, we are in urgent need of disruptive security solutions.
In this article, novel security transmission paradigms are proposed to approach
Shannon’s one-time pad perfect secrecy. First, two metrics, termed as
Degree-of-Approaching (DoA) and Degree-of-Synchronous-Approaching (DoSA), are
developed to characterize the closeness between the achieved security strength
and perfect secrecy. These two metrics also serve as a guideline for secure
transmission protocol design. After that, we present two paths towards
Shannon’s one-time pad, i.e., an explicit-encryption based approach and an
implicit-encryption based approach. For both of them, we discuss the
architecture design, enabling technologies, as well as preliminary performance
evaluation results. The techniques presented in this article provide promising
security-enhancing solutions for future wireless networks.

Go to Source of this post
Author Of this post: <a href="http://arxiv.org/find/cs/1/au:+Sun_L/0/1/0/all/0/1">Li Sun</a>, <a href="http://arxiv.org/find/cs/1/au:+Lu_X/0/1/0/all/0/1">Xianhui Lu</a>, <a href="http://arxiv.org/find/cs/1/au:+Liu_P/0/1/0/all/0/1">Peng Liu</a>, <a href="http://arxiv.org/find/cs/1/au:+Wu_J/0/1/0/all/0/1">Jianjun Wu</a>, <a href="http://arxiv.org/find/cs/1/au:+You_X/0/1/0/all/0/1">Xiaohu You</a>, <a href="http://arxiv.org/find/cs/1/au:+Tao_X/0/1/0/all/0/1">Xiaofeng Tao</a>

By admin