Exercises
ex-ch20-01
EasyState the secrecy capacity of the degraded wiretap channel. What is the operational meaning of each term in the formula?
The formula involves the difference of two mutual informations.
Think about what each term means for the receiver and the eavesdropper.
Formula
$
Interpretation
is the rate at which the legitimate receiver can reliably decode. is the rate of information leakage to the eavesdropper. The difference represents the "secrecy advantage" — the rate at which we can communicate reliably to the receiver while keeping the eavesdropper ignorant. The maximization is over the input distribution, which controls the tradeoff.
ex-ch20-02
EasyCompute the secrecy capacity of a BSC wiretap channel where the main channel has crossover probability and the eavesdropper's channel has crossover probability .
The BSC capacity is with uniform input.
For the degraded BSC wiretap, .
Compute
$
Interpretation
The main channel capacity is bits/use, and the secrecy capacity is bits/use — about 61% of the main channel capacity is available for secret communication.
ex-ch20-03
EasyFor the Gaussian wiretap channel with W, W, and W, compute: (a) The main channel capacity (b) The secrecy capacity (c) The secrecy capacity as a fraction of the main capacity
.
.
Main capacity
bits/use.
Secrecy capacity
bits/use.
Fraction
. About half the main channel capacity is available for secret communication.
ex-ch20-04
EasyExplain the difference between weak secrecy and strong secrecy. Why does the distinction matter for practical security?
Weak secrecy: per-symbol leakage vanishes. Strong secrecy: total leakage vanishes.
Think about what happens as grows.
Definitions
Weak secrecy: . The leakage rate (bits per channel use) vanishes.
Strong secrecy: . The total leakage (bits) vanishes.
Why it matters
Under weak secrecy, can grow as — for example, bits could leak. Over a long transmission (), the eavesdropper could learn bits, which might be enough to compromise a 128-bit encryption key.
Under strong secrecy, the total leakage goes to zero regardless of . This is the appropriate notion for practical security.
The good news: both notions yield the same secrecy capacity, so there is no rate penalty for requiring the stronger guarantee.
ex-ch20-05
EasyIn a TDD system, Alice and Bob observe channel estimates and where and independently. Eve's observation is independent of . What is the secret key capacity?
Since Eve is independent, .
Compute for jointly Gaussian .
Secret key capacity
Since Eve is independent: .
are jointly Gaussian with and . Correlation: .
ex-ch20-06
MediumFor the Gaussian wiretap channel, show that the secrecy capacity saturates as . Find the limiting value and interpret it.
Write and take the limit.
High-SNR limit
$
Interpretation
The secrecy capacity saturates at , determined solely by the noise ratio. Increasing power benefits both channels equally, so the gap — which is what determines secrecy — converges to a constant.
This is fundamentally different from the main channel capacity . The implication for system design: at high SNR, additional power is wasted for secrecy purposes. Better to invest in more antennas (for spatial secrecy) than more power.
ex-ch20-07
MediumConsider a BEC wiretap channel where the main channel is BEC() and the wiretap channel is BEC() with .
(a) Verify that the channel is degraded.
(b) Compute the secrecy capacity.
(c) At what erasure probability does the secrecy capacity equal half the main channel capacity?
The BEC() is a degraded version of BEC() when for some .
BEC capacity is .
Part (a): Degradedness
The output of BEC() is either the input or an erasure . We can construct BEC() from BEC() by further erasing the non-erased outputs with probability . This gives , confirming is a Markov chain.
Part (b): Secrecy capacity
and with uniform input.
Part (c): Half-capacity point
For : .
ex-ch20-08
MediumSketch the achievability proof for the wiretap channel secrecy capacity. Specifically, describe: (a) The codebook structure (how many codewords, how they are organized) (b) The encoding rule (what the transmitter does) (c) Why the legitimate receiver can decode (d) Why the eavesdropper cannot determine the message
The codebook has 'bins' with codewords in each bin.
The randomization rate is what confuses the eavesdropper.
Part (a): Codebook
Generate codewords i.i.d. , organized into bins (one per message), each containing codewords. Set and .
Part (b): Encoding
To send message , the encoder uniformly selects one of the codewords in bin and transmits it. The selection is random and independent of the message — this is the stochastic encoder.
Part (c): Reliability
The total rate , so the receiver can decode the specific codeword (both and the randomization index ) using joint typicality decoding. Reliability follows from the standard random coding argument.
Part (d): Secrecy
The eavesdropper sees , which has mutual information with the transmitted codeword. Since the randomization rate , the eavesdropper cannot distinguish which codeword within a bin was sent. Since knowing the codeword within the bin is necessary to determine the bin (message), the message remains hidden. Formally, .
ex-ch20-09
MediumShow that the secret key capacity with one-way communication equals the wiretap secrecy capacity for the degraded case. Specifically, if , show that .
Use the chain rule to expand using the Markov chain.
The Markov chain gives .
Expand using chain rule
By the Markov chain : Wait, that's not quite right. Let us use: since gives .
Also .
Therefore: .
Key capacity
\blacksquare$
ex-ch20-10
MediumIn the MISO wiretap channel with , , compute the secrecy rate achieved by artificial noise as a function of the power split parameter (fraction allocated to the message). Assume: , , dB.
The beamforming vector is .
The AN subspace is .
Bob's SNR
(linear). . .
Eve's SINR
.
AN power per dimension: . .
Secrecy rate
\alpha = 0.5\text{SNR}_B = 50\text{SINR}_E = 12.5/(1+12.5) = 0.926R_s(0.5) = \log_2(51) - \log_2(1.926) \approx 5.67 - 0.95 = 4.72\alpha = 1\text{SINR}_E = 25R_s(1) = \log_2(101) - \log_2(26) \approx 6.66 - 4.70 = 1.96$ bits/use.
AN more than doubles the secrecy rate at this operating point.
ex-ch20-11
MediumShow that the secrecy capacity of the MIMO wiretap channel is at least as large as the secrecy capacity of the best MISO sub-channel obtained by receive beamforming at Bob.
Bob can apply a receive beamforming vector to get a MISO channel.
The MIMO secrecy capacity optimizes over all input covariances, which includes rank-1 beamforming.
MISO reduction
Let Bob apply a unit-norm receive beamforming vector . The effective channel becomes MISO: , .
The effective Bob channel is with noise variance .
Lower bound
The MISO secrecy capacity with artificial noise is:
This is achievable for the MIMO channel by having Bob use and the transmitter use the corresponding MISO strategy. Since the MIMO secrecy capacity optimizes over all input covariances (a larger set that includes rank-1 + AN strategies as special cases):
The MIMO capacity is at least as large as the best MISO sub-channel.
ex-ch20-12
HardProve the converse of the wiretap channel secrecy capacity for the degraded case. Specifically, show that for any code with and , we have .
Start with and use Fano's inequality.
Decompose using the chain rule and the Markov chain .
Use the Csiszár sum identity to relate the bound to single-letter quantities.
Start with Fano
by Fano's inequality.
Subtract leakage
by the secrecy constraint .
Chain rule expansion
$
Conclude
n \to \inftyR \leq C_s\blacksquare$
ex-ch20-13
HardFor a MISO wiretap channel with transmit antennas, show that the optimal artificial noise power fraction increases as the number of antennas increases (for fixed total power and a generic Eve channel).
As increases, the null space of grows, providing more directions for AN.
More AN directions means lower per-direction AN power but more total interference at Eve.
Show that the optimal is decreasing in .
Setup
The AN occupies the -dimensional null space of . With power fraction , the AN power per direction is .
Eve's interference from AN: .
For generic , in expectation, giving .
Large $n_t$ behavior
As grows: concentrates (by the law of large numbers applied to ).
Bob's rate: (independent of ).
Eve's SINR: .
Optimal power split
The secrecy rate is maximized by choosing to balance Bob's SNR against Eve's SINR. As increases, the AN becomes more effective per unit power (more null space directions), so the optimal decreases — more power goes to AN.
In the limit : for any , and , allocating just enough power to the message to achieve the interference-free capacity.
ex-ch20-14
HardProve that the secrecy degrees of freedom of the MIMO wiretap channel with transmit, receive, and eavesdropper antennas is when .
Upper bound: use the secrecy capacity formula and the high-SNR scaling of log-det.
Lower bound: use GSVD-based precoding to separate the sub-channels.
Upper bound
At high SNR (), with optimal :
The first term scales as and the second as .
Therefore .
Lower bound
Use the GSVD of : there exist unitary matrices and a common right precoder that simultaneously diagonalize both channels. The GSVD creates parallel sub-channels indexed by , where the -th sub-channel has gains to Bob and Eve respectively.
There are sub-channels where and (visible to Bob, invisible to Eve). Sending data on these sub-channels achieves .
Special case: $n_t > n_r + n_e$
When , we can find beamforming directions that are simultaneously in the range of and the null space of . This gives — the full non-secrecy DoF.
ex-ch20-15
HardA secret key generation protocol operates as follows: Alice and Bob observe i.i.d. samples of with and correlation . Eve has no observation.
(a) What is the maximum key rate?
(b) If Alice quantizes to 4-bit resolution, what fraction of the key rate is lost due to quantization?
(c) After quantization, Alice sends the syndrome of a rate-0.2 LDPC code over the public channel for information reconciliation. How many secret key bits can be extracted per observation?
Part (a): .
Part (b): Quantization reduces the effective correlation.
Part (c): The syndrome leaks information that must be subtracted from the key rate.
Part (a): Maximum key rate
$
Part (b): Quantization loss
With 4-bit uniform quantization of (covering 99.7% of the Gaussian), the quantization noise variance is approximately .
The effective correlation after quantization: .
bits/obs.
Loss: .
Part (c): Extractable key bits
The syndrome of the rate-0.2 LDPC code leaks bits/obs to Eve over the public channel.
After privacy amplification, the extractable key rate is:
This is a conservative estimate; tighter reconciliation codes would leak less.
ex-ch20-16
HardShow that the Gaussian distribution maximizes under a power constraint for the degraded Gaussian wiretap channel. (Hint: use the entropy power inequality or the maximum entropy argument.)
The Gaussian maximizes entropy under a variance constraint.
For the degraded channel , , expand both mutual informations.
Expand mutual informations
.
Since where (degraded): .
Difference
h(X + N_Y) - h(X + N_Z)X$.
Costa's argument
By the entropy power inequality (EPI), for independent and : .
A direct proof: define where independent of . Then and .
By de Bruijn's identity, where is the Fisher information. Fisher information is convex, so is concave.
.
This integral is maximized when is as large as possible on , which happens when is Gaussian (since the Gaussian maximizes Fisher information among distributions with the same variance).
ex-ch20-17
Challenge(Research-flavored) Consider a massive MIMO system with transmit antennas, single-antenna legitimate users, and one -antenna eavesdropper. The transmitter uses zero-forcing beamforming to serve the users and artificial noise in the remaining dimensions.
(a) Show that the per-user secrecy rate approaches the per-user rate without the eavesdropper as (secrecy is free in massive MIMO).
(b) Quantify the rate of convergence: how large must be for the secrecy penalty to be less than 0.1 bits/use at dB?
(c) Discuss what happens when Eve has antennas.
The AN lives in a -dimensional space. Eve's interference grows with .
Use random matrix theory: as .
Part (a): Asymptotic secrecy
With ZF beamforming, each user achieves rate . Eve's SINR for user :
As , , so the AN power at Eve grows as . Meanwhile, .
Therefore and the secrecy rate .
Parts (b) and (c)
(b) The secrecy penalty is . Setting bits/use at dB requires . Working through the random matrix expressions, this requires , so for : .
(c) When , the AN subspace is smaller than Eve's observation space. Eve can partially resolve the AN and extract some information about the data signals. The secrecy rate degrades but remains positive as long as (some AN is still possible). The worst case is , where Eve can potentially invert all spatial processing.
ex-ch20-18
Challenge(Open-ended) Compare information-theoretic secrecy with computational secrecy (AES-256 encryption) along the following dimensions:
(a) Threat model (what does the adversary need to break the scheme?)
(b) Key management (does the scheme require pre-shared keys?)
(c) Performance overhead (bandwidth/power cost of security)
(d) Practical deployment readiness
Argue for or against the proposition: "Physical-layer security will complement, not replace, cryptographic security in 6G systems."
Information-theoretic secrecy is unconditional (no computational assumptions) but requires a channel advantage.
AES-256 is computationally secure (assumed infeasible to break) but requires key distribution.
Consider quantum computing threats to AES and post-quantum cryptography.
Comparison
(a) Threat model:
- IT secrecy: assumes eavesdropper has unbounded computation but bounded channel quality. Broken if Eve gets a better channel.
- AES-256: assumes eavesdropper has bounded computation (~ operations infeasible). Broken by a sufficiently powerful computer (quantum or classical).
(b) Key management:
- IT secrecy: no pre-shared key needed (wiretap coding) or generates keys from channel (key agreement).
- AES: requires pre-shared or Diffie-Hellman-established keys. Key distribution is the hard problem in practice.
(c) Performance overhead:
- IT secrecy: costs rate (secrecy rate < main channel rate) and may require extra antennas/power for AN.
- AES: negligible throughput overhead (AES-NI hardware acceleration), but key establishment has latency.
(d) Deployment:
- IT secrecy: research prototypes for key generation; no deployed wiretap codes.
- AES: deployed universally in all commercial systems.
Argument for complementarity: IT secrecy is most valuable where key management is hardest: IoT devices without PKI, machine-type communication, and ad-hoc networks. Channel-based key generation can bootstrap encryption keys without infrastructure, while AES handles the bulk data encryption. In 6G, the combination — PLS for key generation, AES for encryption — offers defense in depth: even if quantum computing breaks AES, the PLS-generated keys provide an unconditional fallback.