Exercises

ex-ch20-01

Easy

State the secrecy capacity of the degraded wiretap channel. What is the operational meaning of each term in the formula?

ex-ch20-02

Easy

Compute the secrecy capacity of a BSC wiretap channel where the main channel has crossover probability p=0.05p = 0.05 and the eavesdropper's channel has crossover probability q=0.2q = 0.2.

ex-ch20-03

Easy

For the Gaussian wiretap channel with P=10P = 10 W, σY2=1\sigma^2_{Y} = 1 W, and σZ2=4\sigma^2_{Z} = 4 W, compute: (a) The main channel capacity CmainC_{\text{main}} (b) The secrecy capacity CsC_s (c) The secrecy capacity as a fraction of the main capacity

ex-ch20-04

Easy

Explain the difference between weak secrecy and strong secrecy. Why does the distinction matter for practical security?

ex-ch20-05

Easy

In a TDD system, Alice and Bob observe channel estimates X=H+NAX = H + N_A and Y=H+NBY = H + N_B where HCN(0,10)H \sim \mathcal{CN}(0, 10) and NA,NBCN(0,1)N_A, N_B \sim \mathcal{CN}(0, 1) independently. Eve's observation is independent of (X,Y)(X, Y). What is the secret key capacity?

ex-ch20-06

Medium

For the Gaussian wiretap channel, show that the secrecy capacity saturates as PP \to \infty. Find the limiting value and interpret it.

ex-ch20-07

Medium

Consider a BEC wiretap channel where the main channel is BEC(ϵ1\epsilon_1) and the wiretap channel is BEC(ϵ2\epsilon_2) with ϵ2>ϵ1\epsilon_2 > \epsilon_1.

(a) Verify that the channel is degraded.

(b) Compute the secrecy capacity.

(c) At what erasure probability ϵ2\epsilon_2 does the secrecy capacity equal half the main channel capacity?

ex-ch20-08

Medium

Sketch the achievability proof for the wiretap channel secrecy capacity. Specifically, describe: (a) The codebook structure (how many codewords, how they are organized) (b) The encoding rule (what the transmitter does) (c) Why the legitimate receiver can decode (d) Why the eavesdropper cannot determine the message

ex-ch20-09

Medium

Show that the secret key capacity with one-way communication equals the wiretap secrecy capacity for the degraded case. Specifically, if XYZX \to Y \to Z, show that CK=I(X;Y)I(X;Z)=CsC_K^{\to} = I(X;Y) - I(X;Z) = C_s.

ex-ch20-10

Medium

In the MISO wiretap channel with nt=4n_t = 4, nr=ne=1n_r = n_e = 1, compute the secrecy rate achieved by artificial noise as a function of the power split parameter α\alpha (fraction allocated to the message). Assume: hB=[1,0,0,0]T\mathbf{h}_B = [1, 0, 0, 0]^T, hE=[0.5,0.5,0.5,0.5]T\mathbf{h}_E = [0.5, 0.5, 0.5, 0.5]^T, P=20P = 20 dB.

ex-ch20-11

Medium

Show that the secrecy capacity of the MIMO wiretap channel is at least as large as the secrecy capacity of the best MISO sub-channel obtained by receive beamforming at Bob.

ex-ch20-12

Hard

Prove the converse of the wiretap channel secrecy capacity for the degraded case. Specifically, show that for any (2nR,n)(2^{nR}, n) code with Pe(n)0P_e^{(n)} \to 0 and 1nI(M;Zn)0\frac{1}{n}I(M; Z^n) \to 0, we have RmaxPX[I(X;Y)I(X;Z)]R \leq \max_{P_X}[I(X;Y) - I(X;Z)].

ex-ch20-13

Hard

For a MISO wiretap channel with ntn_t transmit antennas, show that the optimal artificial noise power fraction (1α)(1-\alpha^*) increases as the number of antennas increases (for fixed total power and a generic Eve channel).

ex-ch20-14

Hard

Prove that the secrecy degrees of freedom of the MIMO wiretap channel with ntn_t transmit, nrn_r receive, and nen_e eavesdropper antennas is ds=[min(nt,nr)min(nt,ne)]+d_s = [\min(n_t, n_r) - \min(n_t, n_e)]^+ when ntnr+nen_t \leq n_r + n_e.

ex-ch20-15

Hard

A secret key generation protocol operates as follows: Alice and Bob observe nn i.i.d. samples of (X,Y)(X, Y) with X,YN(0,1)X, Y \sim \mathcal{N}(0, 1) and correlation ρ=0.95\rho = 0.95. Eve has no observation.

(a) What is the maximum key rate?

(b) If Alice quantizes XX to 4-bit resolution, what fraction of the key rate is lost due to quantization?

(c) After quantization, Alice sends the syndrome of a rate-0.2 LDPC code over the public channel for information reconciliation. How many secret key bits can be extracted per observation?

ex-ch20-16

Hard

Show that the Gaussian distribution maximizes I(X;Y)I(X;Z)I(X;Y) - I(X;Z) under a power constraint for the degraded Gaussian wiretap channel. (Hint: use the entropy power inequality or the maximum entropy argument.)

ex-ch20-17

Challenge

(Research-flavored) Consider a massive MIMO system with nt=128n_t = 128 transmit antennas, K=8K = 8 single-antenna legitimate users, and one nen_e-antenna eavesdropper. The transmitter uses zero-forcing beamforming to serve the KK users and artificial noise in the remaining ntK=120n_t - K = 120 dimensions.

(a) Show that the per-user secrecy rate approaches the per-user rate without the eavesdropper as ntn_t \to \infty (secrecy is free in massive MIMO).

(b) Quantify the rate of convergence: how large must ntn_t be for the secrecy penalty to be less than 0.1 bits/use at SNR=10\text{SNR} = 10 dB?

(c) Discuss what happens when Eve has ne>ntKn_e > n_t - K antennas.

ex-ch20-18

Challenge

(Open-ended) Compare information-theoretic secrecy with computational secrecy (AES-256 encryption) along the following dimensions:

(a) Threat model (what does the adversary need to break the scheme?)

(b) Key management (does the scheme require pre-shared keys?)

(c) Performance overhead (bandwidth/power cost of security)

(d) Practical deployment readiness

Argue for or against the proposition: "Physical-layer security will complement, not replace, cryptographic security in 6G systems."