The Wiretap Channel
Why Information-Theoretic Secrecy?
In every channel model we have studied so far, the goal was to maximize the rate of reliable communication. We never asked: can someone else, listening to the transmission, learn the message? In cryptography, this problem is solved by encryption — the message is scrambled with a shared secret key before transmission. But what if the transmitter and receiver do not share a secret key?
Information-theoretic secrecy takes a fundamentally different approach: it exploits the physical properties of the communication channel itself to provide confidentiality. If the eavesdropper's channel is noisier than the legitimate receiver's, we can transmit at a rate that the receiver can decode but the eavesdropper cannot — and we can prove this mathematically, without relying on computational hardness assumptions.
The point is that the noise in the channel, which we have been fighting against throughout this book, now becomes our ally.
Definition: The Wiretap Channel
The Wiretap Channel
The wiretap channel consists of a transmitter, a legitimate receiver, and an eavesdropper. The transmitter sends over a discrete memoryless channel. The legitimate receiver observes through the main channel , and the eavesdropper observes through the wiretap channel .
The channel is degraded if forms a chain, meaning the eavesdropper sees a noisier version of what the legitimate receiver sees.
A wiretap code consists of:
- Stochastic encoder: a (possibly randomized) mapping
- Decoder: a mapping
The code must satisfy two requirements:
- Reliability:
- Secrecy: (weak secrecy) or (strong secrecy)
The encoder is stochastic — for each message , it randomly selects among multiple codewords. This randomization is the key mechanism for confusing the eavesdropper. It is reminiscent of random binning in Slepian–Wolf coding, and indeed the achievability proof uses the same technique.
Wiretap channel
A channel model with three parties: a transmitter, a legitimate receiver, and an eavesdropper. The goal is to communicate reliably to the receiver while keeping the message secret from the eavesdropper.
Secrecy capacity
The maximum rate at which reliable and secret communication is possible over a wiretap channel. Denoted .
Related: Wiretap channel
Equivocation rate
The normalized conditional entropy , measuring the eavesdropper's uncertainty about the message after observing the wiretap channel output. Perfect secrecy requires the equivocation rate to approach the message rate.
Definition: Weak and Strong Secrecy
Weak and Strong Secrecy
Two notions of secrecy are commonly used:
-
Weak secrecy: as . The per-symbol information leakage vanishes.
-
Strong secrecy: as . The total information leakage vanishes.
Strong secrecy is strictly stronger than weak secrecy. The difference matters because under weak secrecy, the total leakage can grow sublinearly with — the eavesdropper may learn a vanishing fraction but a growing number of bits. Under strong secrecy, even the total leakage vanishes.
Remarkably, the secrecy capacity is the same under both notions: the achievable rate does not change when we strengthen the secrecy requirement from weak to strong.
Theorem: Secrecy Capacity of the Degraded Wiretap Channel
For a degraded wiretap channel , the secrecy capacity is
More generally, for a non-degraded wiretap channel, the secrecy capacity is where forms a chain and .
The secrecy capacity is the difference between the mutual information to the legitimate receiver and the mutual information to the eavesdropper. Intuitively, we can communicate secretly at a rate equal to the "advantage" the main channel has over the wiretap channel. If the eavesdropper's channel is better than the legitimate receiver's ( for all ), then — no secret communication is possible.
The achievability uses a beautiful combination of random coding and random binning. We generate a codebook with codewords, partition them into bins (one per message), and for each message, randomly select a codeword from its bin. The legitimate receiver can decode (the codewords are distinguishable through the main channel), but the eavesdropper cannot determine which bin the codeword belongs to because the randomization within each bin creates confusion.
Achievability — Codebook generation
Fix and a target rate .
Generate codewords i.i.d. , indexed by message and randomization index , where and .
Achievability — Encoding
To send message , the encoder selects uniformly at random from and transmits .
The key idea: each message has possible codewords. The randomization index is unknown to both the receiver and the eavesdropper.
Achievability — Decoding and reliability
The legitimate receiver decodes both using joint typicality decoding. Since (by our choice of rates), the receiver can reliably recover .
Achievability — Secrecy analysis
For the eavesdropper, the effective rate of the randomization is . Since , the eavesdropper cannot distinguish the different randomization indices for a given message . By the packing lemma and standard equivocation analysis: where . This gives weak secrecy. Strong secrecy follows from a more refined analysis using the soft covering lemma.
Converse
For any sequence of codes with and :
where by the secrecy constraint. The first difference term is bounded using the degradedness and the chain rule to yield . Dividing by and taking gives .
Random Binning: From Source Coding to Secrecy
Notice the deep connection between the achievability proof here and the Slepian–Wolf proof in Chapter 7. In Slepian–Wolf coding, random binning compresses correlated sources by assigning multiple source sequences to the same bin. In the wiretap channel, random binning creates secrecy by assigning multiple codewords to the same message.
This is the same technique — random binning — used for a completely different purpose. In source coding, binning exploits decoder side information to reduce rate. In secrecy coding, binning exploits the eavesdropper's noise to hide information. The unifying mathematical structure is what makes information theory so powerful.
Historical Note: Wyner's Wiretap Channel (1975)
1975Aaron Wyner introduced the wiretap channel model in 1975, motivated by the question of whether the physical layer of a communication system could provide secrecy guarantees. His key insight was that if the eavesdropper's channel is a degraded version of the main channel, the noise difference can be exploited for secrecy — without any shared secret key.
Wyner's result was initially viewed as a theoretical curiosity: in wired communication, ensuring that the eavesdropper has a worse channel is unrealistic. But in wireless communication, where the channel to different receivers is inherently different due to path loss, fading, and antenna geometry, the wiretap model became highly relevant. The explosion of interest in physical-layer security after 2005 is a direct consequence of the wireless revolution validating Wyner's original insight.
Example: BSC Wiretap Channel
The main channel is a BSC() and the wiretap channel is a BSC() with (the eavesdropper's channel is noisier). Compute the secrecy capacity.
Verify degradedness
The BSC() is a degraded version of the BSC() when (convolution) for some , where . For , we can write , so the channel is degraded.
Compute mutual informations
For the BSC with input (which maximizes for BSC):
Secrecy capacity
p = 0C_s = h(q)p = qC_s = 0$.
Example: Gaussian Wiretap Channel
The main channel is with and the wiretap channel is with , where (eavesdropper is noisier). The transmitter has power constraint . Compute the secrecy capacity.
Mutual informations with Gaussian input
With :
Secrecy capacity
The Gaussian distribution maximizes under the power constraint (this follows from the maximum entropy property and the degradedness of the Gaussian channel). Therefore:
At high SNR, , which is determined by the noise ratio and independent of the transmit power. This is a fundamental difference from the non-secrecy capacity, which grows without bound with power.
Interpretation
The secrecy capacity saturates at high SNR — throwing more power at the problem does not help beyond a certain point. This is because both the main channel and the wiretap channel benefit equally from increased power. The secrecy advantage comes entirely from the noise difference , not from the absolute power level.
Common Mistake: Zero Secrecy Capacity Means No Security
Mistake:
Assuming that if (e.g., when the eavesdropper has a better channel), it is impossible to achieve any form of secrecy.
Correction:
When , information-theoretic secrecy at a positive rate is indeed impossible. However, computational secrecy (via encryption with a pre-shared key) still works regardless of the channel quality. Information-theoretic secrecy is a stronger guarantee but requires a channel advantage. The two approaches are complementary, not competing.
Common Mistake: Confusing Weak and Strong Secrecy
Mistake:
Treating weak secrecy () as sufficient for practical applications.
Correction:
Under weak secrecy, the total information leakage can grow as — the eavesdropper may eventually learn a sublinear but unbounded number of bits. For practical security, strong secrecy () or even semantic secrecy (for all message distributions) is needed. Fortunately, the secrecy capacity is the same under all three notions.
Gaussian Wiretap Channel: Secrecy Capacity
Explore how the secrecy capacity of the Gaussian wiretap channel depends on the SNR, the noise ratio , and compare it with the non-secrecy capacity. Notice how secrecy capacity saturates at high SNR while the regular capacity grows without bound.
Parameters
Maximum SNR for the x-axis
Ratio of eavesdropper noise to main channel noise
Quick Check
The secrecy capacity of the degraded wiretap channel is . What happens when the eavesdropper's channel is better than the main channel?
— no positive secrecy rate is achievable
The secrecy capacity is negative
We can still achieve secrecy by using more power
When for all , the maximum of is non-positive. Since by convention (we can always achieve rate 0), .
Quick Check
What is the role of the stochastic encoder in the wiretap channel?
It confuses the eavesdropper by randomly choosing among multiple codewords for each message
It improves reliability at the legitimate receiver
It implements a key agreement protocol
For each message , the encoder randomly selects one of codewords. This randomization ensures that the eavesdropper sees a different codeword each time the same message is sent, making it impossible to determine the message from the wiretap channel output.
Physical-Layer Security in 5G NR
5G NR does not currently use physical-layer security (PLS) for data confidentiality — all security relies on cryptographic protocols (AES-128/256 at the PDCP layer). However, PLS techniques based on the wiretap channel model are being investigated for several use cases:
- Key generation: Channel reciprocity in TDD systems allows Alice and Bob to extract a shared secret key from the channel state, which Eve cannot replicate due to spatial decorrelation.
- Artificial noise for anti-eavesdropping: Massive MIMO beamforming can direct information to the intended receiver while flooding the eavesdropper with noise.
- Authentication: Physical-layer features (channel response, hardware impairments) can authenticate devices without cryptographic overhead.
The information-theoretic results in this chapter provide the fundamental limits for all these applications.
- •
5G NR currently relies on AES-128/256 encryption at PDCP layer
- •
PLS requires CSI at the transmitter, which may not be available in FDD systems
- •
Practical PLS schemes must handle imperfect CSI and active attackers
Key Takeaway
The wiretap channel achieves secrecy by exploiting the eavesdropper's channel disadvantage. The secrecy capacity is the information-theoretic limit on secret communication without shared keys. The achievability proof uses stochastic encoding (random binning), the same technique that appears in Slepian–Wolf coding — a unifying theme in multiuser information theory.
Why This Matters: Physical-Layer Security in Wireless Networks
The wiretap channel model maps directly to wireless communication: the transmitter (Alice) sends to a legitimate receiver (Bob) while an eavesdropper (Eve) listens. In wireless channels, the channel gains to different receivers are inherently different due to path loss, fading, and spatial separation. This natural channel variation provides the "advantage" needed for information-theoretic secrecy.
Massive MIMO amplifies this advantage dramatically: with many antennas, the transmitter can beamform the signal to Bob while creating a null in Eve's direction, achieving very high secrecy rates. See Book telecom, Chapter 17 for the MIMO beamforming foundations.