Capacty Estmaton of on-ynchronous s Zhenghong Wang and uby B. Lee Department of Electrcal Engneerng Prnceton Unversty {zhenghon,rblee}@prnceton.edu Abstract Capacty estmaton s an mportant part of covert channel analyss. It measures the severty of a covert channel by estmatng the maxmum nformaton rate attanable over t. Tradtonal capacty estmaton methods usually calculate the channel capacty based on a synchronous model, assumng that the channel s synchronous or there are mechansms that can be utlzed to synchronze the transmsson. The overhead for synchronzaton s gnored. In ths paper we argue that covert channels n general are non-synchronous and the overhead for synchronzaton s not neglgble. Instead of assumng a synchronous model, we propose to use the deletonnserton channel as a more general bass of capacty estmaton. Capacty estmaton s extended to be able to evaluate the overhead for overcomng nonsynchronous effects. Our study shows that relable communcaton over a non-synchronous channel s stll possble even wthout synchronzaton mechansms. uch non-synchronzed communcatons, however, are not as effectve as the synchronzed ones. The capacty degradaton due to the non-synchronous effects s derved. A tght upper bound of the capacty of synchronzed channels s also gven.. Introducton A covert channel s a communcaton channel that s nether desgned nor ntended to transfer nformaton at all []. Wth "legtmate" use of shared resources and operatons of a system, t allows leakage of senstve or prvate nformaton. Though usually slow, covert channels have been regarded as a serous rsk to data securty n computer systems and networks. The atonal Computer ecurty Center (CC) has ncluded the Analyss (CCA) as an mportant set n ts Trusted Computer ystem Evaluaton Crtera (TCEC). The severty of a covert channel s often measured n terms of how fast t can transmt nformaton. Mllen frst establshed a connecton between hannon s theory of communcatons and nformaton flow models [5]. The term capacty s borrowed from hannon s theory and s used as a synonym of the maxmum nformaton rate that could be acheved over a covert channel. Usng hannon s theory, a communcaton channel s often modeled as a mappng from the nput symbol space to the output symbol space. The capacty s then derved by maxmzng the mutual nformaton over the dstrbuton of the nput symbol space. uch a model however, mples a synchronous channel model: for each nput symbol, the channel always generates an output symbol n response. In other words, a transmtted symbol may be corrupted by nose, but t wll never get lost and the recever wll never receve extra symbols. There are also other ways to measure the capacty of a covert channel, e.g., the nformal method descrbed n [3]. Although dfferent methods other than hannon s nformaton theory are used n these methods, the synchronous property s also assumed ether explctly or mplctly. Assumng a synchronous model n communcaton systems s usually not a problem. Most communcaton systems are desgned to avod symbol loss and/or nserton wth lttle or no overhead. Ths concluson s not true for covert channels, however. Frst, there s usually no handy mechansm avalable for synchronzaton snce t s not desgned for nformaton transfer. econd, n systems where covert channels are a concern, the ncreasng awareness of covert channels has pushed the desgners to make the covert channels harder to explot. Ths may make the synchronzaton problem more severe. In ths paper, we focus our dscusson on capacty estmaton based on a non-synchronous channel model. We try to answer questons on the exstence, capacty and mechansms for covert communcatons over nonsynchronous channels. The rest of ths paper s organzed as follows. elated past work are revewed n secton. In secton 3, we model non-synchronous channels as deletonnserton channels. Capacty bounds of deleton-
Fgure. ynchronzaton mechansm usng two synchronzaton varables nserton channels are gven n secton 4. The synchronzed form of communcaton and possble synchronzaton mechansms are studed. Capacty degradaton due to synchronzaton overhead s also shown. In secton 5 we draw our conclusons.. elated work The noton of covert communcaton was frst ntroduced n []. It was then defned and analyzed n [][6]-[9]. Currently research n covert channels focuses on four dscplnes: covert channel dentfcaton, covert channel capacty estmaton, covert channel handlng and covert channel mtgaton. In measurng the sgnfcance of a covert channel, Mllen frst establshed a connecton between hannon s theory of communcatons and nformaton flow models [5]. The term channel capacty s borrowed from hannon s theory whch stands for the maxmum nformaton rate that could be acheved over a covert channel. In 989, Mllen modeled an mportant class of covert channels as fnte state machnes [5]. The covert channels that are noseless and have nonunform transton tmes are studed. Usng hannon s theory, he derved the channel capacty of such covert channels. Moskowtz [0] studed a class of covert channels that s dscrete, noseless and memoryless, called the mple Tmng Channels (TC) n 994. The capactes of such covert channels can be regarded as an upper bound for more complcated channels and may gve a worst case scenaro. The bounds of capactes of such channels were derved. In 996, he analyzed a class of covert tmng channel, called the tmed Z-channel, and showed the bound on ts capacty []. Comprehensve nformaton and examples about covert channel analyss can be found n Vrgl Glgor s Analyss gudelne [3] and McHugh s Analyss chapter [4]. Fgure. Inserton-Deleton channel wth probabltes P d, P, P t and P s, of deletons, nsertons, transmssons and substtutons. 3. on-synchronous covert channels 3.. Overvew Covert channels are often very dfferent from normal communcaton channels. Frst of all, unlke communcaton systems where synchronzaton s often specfcally desgned for relable and effcent communcaton, synchronzaton mechansms are usually not avalable for covert channels. econdly, n covert channels the communcatng partes often have lmted or even no control n choosng the proper tme to perform an operaton, e.g., send a symbol to the channel or sample the channel to receve a symbol, whch s not a problem n normal communcaton channels. Below s an example. Consder a unprocessor system where the communcatng subjects are processes. To transmt a symbol, the sender has to make a change n the system and the recever receves t by detectng the change. As there s only one CPU n the system, at any tme only one of the two processes can be actve. In other words, the sender has to relnqush the CPU after t sends a symbol so that the recever can get the CPU to read the symbol. In most operatng systems, the scheduler determnes when and who can gan the CPU. Dependng on the schedulng algorthm, t s very lkely that the sender s woken up twce wthout the recever beng able to run n between, or the recever s woken up twce wthout the sender beng able to run n between. In the former case a symbol s dropped whle n the later case an extra symbol s nserted. Fnally, coherent tme references are often unavalable n covert channels. Tme references are known as key components n explotng many covert tmng channels. Furthermore, as long as the local tmers at the two sdes of the channel are coherent enough, t s not dffcult to synchronze operatons performed by the sender and the recever. Beng aware of these facts, hgh assurance systems have made efforts to remove event sources that can serve as such tme references to user processes.
In summary, covert channels are nherently nonsynchronous n general, although there may be some exceptons. 3.. Capacty degradaton Though the operatons of sendng and recevng symbols are non-synchronous n most covert channels, one may stll synchronze the symbol transmsson wth certan technques. Fgure shows an example. The sender makes a change on the - varable once a symbol s sent; the recever checks the - varable and reads the symbol when ready; the recever then makes a change on the - varable to nform the sender; the sender checks the - varable and sends the next symbol once the last symbol has been receved. There may be other methods that can mantan the correct order of operatons, but n essence they do the same thng: let the sender know f the recever has read the prevous symbol and let the recever know f a symbol has arrved. Wth such nformaton, each tme when the sender s able to perform an operaton t can determne whether a new symbol can be sent. However, due to the non-synchronous nature of the covert channels, t s very lkely that the sender fnds that the prevous symbol has not been read by the recever and t has to gve up the CPU and wat for the next chance. In other words, some tme s wasted for watng and therefore the channel capacty s reduced. In prevous work, the synchronous model excludes ths part of the tme n symbol transmsson. Only the tme assocated wth transmtted symbols s taken nto account. In contrast, our method consders such wasted tme and gves more accurate estmatons. It can be regarded as a more general form of capacty estmaton where the methods based on a synchronous model are specal cases. Furthermore, unlke tradtonal methods whch calculate a sngle upper bound of the capacty, our method reflects the non-synchronous behavors whch are determned by the system mplementatons. Our method can be used to evaluate the effectveness of canddate system mplementatons, e.g., the scheduler, n reducng covert channel capactes. 3.3. Deleton-nserton channel on-synchronous operatons at the two sdes of the channel may lead to loss of real symbols and nserton of false symbols. uch a channel can be modeled as a deleton-nserton channel. We adapt the defnton n [3] as follows: Defnton : A bnary deleton-nserton channel s a channel wth four parameters: P d, P, P t and P s, whch denote the rates of deletons, nsertons, transmssons and substtutons, respectvely. The symbols to be transmtted are magned enterng a queue, watng to be transmtted by the channel. Each tme the channel s used, one of four events occurs: wth probablty P d the next queued bt s deleted; wth probablty P an extra bt s nserted; wth probablty P t the next queued bt s transmtted,.e., s receved by the recever, wth probablty P s of sufferng a substtuton error (see Fgure ). A deleton-nserton channel should not be confused wth an erasure channel. In an erasure channel, channel symbols may be corrupted or lost, whch s smlar to the substtuton or deleton n a deleton-nserton channel. However, the recever of an erasure channel knows exactly whch symbols are corrupted or dropped whle n a deleton-nserton channel, the recever knows nothng about any deleton, nserton or substtuton (corrupton) of symbols. Ths makes the recovery of a message much harder. 4. Capacty estmaton Our dscussons focus on two sets of questons:. Exstence and capacty: Wthout any form of synchronzaton, s relable communcaton stll possble? If the answer s yes, what s the capacty of such channels?. Constructon and capacty: How can relable synchronzaton mechansms be constructed for non-synchronous covert channels? What s the maxmum nformaton rate one can acheve over such channels? Compared wth the capacty of an nherently synchronous channel, what s the degradaton of nformaton rate due to the nonsynchronous effect? The frst queston s a theoretcal exstence or feasblty one, whle the second set of questons shows how such a covert channel can actually be constructed. It s worth notng that the frst queston ndeed s askng f synchronzaton s always necessary. Prevous work all assumes a synchronzed form of communcaton. But t s not clear f t s the only way for relable communcaton. In fact, another nterestng queston s: can a non-synchronous form of communcaton have hgher nformaton rate than the synchronous one as the overhead assocated wth synchronzaton s totally avoded? 4.. Capacty of deleton-nserton channels Intutvely a channel wth symbol nsertons and drop-outs s hard to use and not effcent. But as mantanng synchronzed communcaton also ntroduces overhead, we wsh to know how fast the nformaton can be delvered over such channels, compared to the synchronzed channels.
ender ecever ender ecever (a) Feedback Doburshn [7] frst showed that the fundamental theorem of nformaton theory concernng the exstence of an upper bound for the transmsson rate, for whch error probablty can be made arbtrarly small, holds. Ths mples that relable communcaton s possble even f no relable synchronzaton mechansms are avalable. However, explct expresson of the capacty of such a channel s generally not avalable. A varety of approxmatons of the capactes and numercal bounds can be found n [8][9]. The accurate capacty of a deleton-nserton channel s stll unavalable, accordng to the state-of-the-art research n ths area. Despte the unavalablty of an accurate capacty, we can gve an upper bound of the capacty for the purpose of comparson wth synchronzed channels. Consder a deleton-nserton channel and an erasure channel whch are dentcal except that n the erasure channel the locaton of symbol drop-outs and nsertons are known. It s not dffcult to show that the capacty of the deleton-nserton channel s no greater than the capacty of the erasure channel. Theorem. An upper bound of the capacty of a deleton-nserton channel s the capacty of the erasure channel: C max = (-P d ) () where s the number of bts per symbol and P d s the deleton probablty The dervaton of the capacty of a bnary erasure channel can be found n many nformaton theory textbooks such as [6] and t s straght-forward to generalze t to non-bnary cases. ote that here we use the term erasure channel to refer to the one that s dentcal to the correspondng deleton-nserton channel except that the locatons of symbol nsertons/drop-outs are known. In the rest of the paper, unless otherwse specfed, we wll use erasure channel to refer to ths specfc erasure channel. ather than gvng a formal proof of theorem, we gve a more ntutve explanaton. The two channels have the same symbol drop-outs and nsertons, but the erasure channel knows more nformaton: t knows whch symbols are deleted or nserted. The erasure channel therefore has equal or hgher capacty than that of the deleton-nserton channel. Fgure 3. Two general synchronzaton mechansms E (b) Common Events The above capactes are only upper bounds of the channel capacty. They are very hard, f not mpossble, to acheve n practce. Usng exstng codng schemes such as convolutonal code and watermark code, some work [-4] have shown relable communcaton over such channels. However, they all showed that the capacty s qute low and n practce sophstcated codng technques are requred. 4.. ynchronzaton and capacty estmatons Unlke our frst queston on theoretcal exstence and capacty, past lterature does not provde any clues to answerng our second set of questons. We present new work on how synchronzaton mechansms can be constructed for nherently non-synchronous covert channels and what capacty can be acheved. We wll consder two general ways to acheve synchronzaton: usng feedback or usng common events, as shown n Fgure 3. We assume that the feedback path and the two paths from the event source E to the sender and the recever are perfect. Ths smplfes the analyss, and s also a requrement for dervng the maxmum nformaton rate. To focus on the synchronzaton problem, we assume that the channel s noseless. Let p d and p denote the probablty of deleton and nserton respectvely. 4... Channels wth feedback We now show that the capacty of a channel wth deletons can acheve the capacty of an erasure channel by utlzng feedback. We then extend the result to a channel wth nsertons. Theorem. The upper bound of the capacty of a deleton channel wth perfect feedback s the capacty of the erasure channel. Proof: Consder a deleton channel wth a deleton probablty p d and ts correspondng erasure channel. Add perfect feedback path to both of them. nce the erasure channel knows where the symbol drop-outs occurs whch the deleton channel does not know, the erasure channel knows more nformaton than the deleton channel. Therefore the erasure channel wth feedback wll gan equal or hgher capacty than the deleton channel wth feedback. nce an erasure
ender ecever ender ecever E (a) Common Events Fgure 4. Usng common events won t get better capacty than usng feedback channel s a memoryless channel and t s well known that addng feedback wll not ncrease the capacty of a memoryless channel [6], the upper bound of the capacty of a deleton channel wth perfect feedback s the capacty of the erasure channel. In theorem we only show an upper bound of the capacty, we now show that the bound s tght. Theorem 3. The capacty of a deleton channel wth perfect feedback equals the capacty of the erasure channel. Proof: Here we construct a protocol by whch the capacty of the erasure channel can be acheved. The protocol s as follows: let the recever notfy the sender va the feedback path once t receves a symbol. The sender wll keep resendng the symbol untl t knows that the symbol has been receved. Therefore no dropouts wll occur. Whle the probablty of deleton s p d, a symbol gets through wth probablty of - p d, therefore the effectve nformaton rate s (-p d ), whch s the capacty of an erasure channel wth an erasure probablty p d. nce the upper bound of the capacty can be acheved, t s the actual capacty. When symbol nsertons are present n the channel, a theorem smlar to theorem can be proved. We frst defne an extended erasure channel as follows: Defnton : An extended erasure channel s a channel where symbols may be nserted and/or dropped but the locatons of all nsertons and dropouts are known. Theorem 4. The upper bound of the capacty of a deleton-nserton channel wth perfect feed back s the capacty of the equvalent extended erasure channel,.e., C upper-bound = (-P d ). The proof s smlar to that for Theorem. A lower bound of the capacty can also be derved wth a constructve protocol. It can be shown that under certan condtons, ths lower bound and the upper bound shown n Theorem 4 asymptotcally converge. Theorem 5. A lower bound of the capacty of a deleton-nserton channel wth perfect feed back s: Pd Clower bound = C () conv P where Cconv = αp log ( ) H ( αp ) (3) α = (4) H( p) = p log p ( p) log ( p) (5) s the number of bts contaned n each symbol. A smple protocol s constructed to prove Theorem 5. The above capacty can be acheved usng ths protocol and therefore s a lower-bound of the actual capacty. A detaled proof can be found n Appendx A. To show the asymptotcal convergence, let P = P d and!, we then have Clower bound = Cconv ( Pd ) H ( Pd ) (6) C lower bound ( Pd ) H ( Pd ) lm = = (7) C ( P ) lupper bound 4... Channels wth common event source There may be several ways to explot a common event E for synchronzaton. For example, E can be a self-ncrementng counter whch serves as a common clock for the sender and recever. However, as we show below, explotng E wll not get hgher capacty than usng a feedback path n general. If one more path from to E s added, as shown n Fgure 4(b), E may gan more nformaton. Therefore an equal or hgher nformaton rate may be acheved than wthout the added path. In the best case, E and communcate wth each other wthout any overhead,.e., they ndeed can be regarded as one sngle party and such a confguraton actually becomes the synchronzaton method usng feedback. Therefore a smlar system usng feedback wll get equal or better performance for channel capacty. 4.3. emarks (b) Common Events + Feedback We have answered the two sets of questons we posed: () elable communcaton over nonsynchronous channels wthout synchronzaton s possble, but t s not as effectve as synchronzed communcaton and requres complcated codng schemes. () The capacty degradaton due to nonsynchronous effects s roughly proportonal to P d, the probablty of deletons. Accordng to the above dscusson, wth a good feedback path, synchronzaton s not a problem for a covert channel n general. Furthermore, wth the help d E
of the feedback, the theoretcal capacty of the channel can be practcally acheved usng a very smple protocol. Ths has nterestng mplcatons for a multlevel securty (ML) system. nce the legal nformaton flow (from low to hgh) can serve as a perfect feedback path, one may always explot t to acheve the channel capacty. In other words, covert channels n ML systems are relatvely easy to explot n general and tend to be fast. ote that the capacty (-P d ) we derved above s not a physcal nformaton rate. It s a relatve rato of the physcal capacty estmated usng tradtonal methods. Therefore for a gven covert channel, one could frst use tradtonal methods to estmate the physcal capacty C. The probablty of deleton P d should then be estmated. The real capacty can then be estmated as C(-P d ). ote also that the capacty degradaton modeled n our method s ndependent of the synchronzaton mechansms used and does not nclude any specfc overhead ntroduced by such mechansms. uch degradaton s nherent due to the non-synchronous nature of operatons. It s unavodable even f effcent mechansms are deployed. Fnally, although our results are derved n the context of capacty estmaton of covert channels, t may provde meanngful nsghts to researchers n other areas. ecently some ongong work [0] n the communcaton communty also shows nterest n the capacty bounds of channels wth asynchronous behavors. Although the problems and models are dfferent, smlar nsghts may apply. It would be nterestng to study the connectons n our future work. 5. Conclusons In ths paper we consdered the effect of nonsynchronous operatons n the capacty estmaton of covert channels. We argue that covert channels n general are non-synchronous and the tme taken for synchronzaton s not neglgble. To model such effect n capacty estmaton, we propose usng the deletonnserton channel as a more general bass for covert channel capacty estmatons. Our study shows that relable communcaton over a non-synchronous channel s stll possble, though such non-synchronzed communcatons are not as effectve as the synchronzed ones. In the case of synchronzed communcaton, we show that the capacty degradaton due to the non-synchronous effects s roughly proportonal to the probablty of synchronzaton errors. 6. eferences [].A. Kemmerer, hared esource Matrx Methodology: An Approach to Identfyng storage and Tmng Channels, ACM Transactons on Computer ystems, vol., ssue 3, pp. 56-77, August 983. [] B.W. Lampson, A ote on the Confnement Problem, Communcatons of the ACM, vol. 6, ssue 0, pp. 63-65, October 973. [3] atonal Computer ecurty Center, A Gude to Understandng Analyss of Trusted ystems, CC-TG-30, ovember 993, avalable at http://www.radum.ncsc.ml/tpep/lbrary/ranbow/. [4] John McHugh, Analyss: A Chapter of the Handbook for the Computer ecurty Certfcaton of Trusted ystems, December 995, avalable at http://chacs.nrl.navy.ml/publcatons/handbook/. [5] J.K. Mllen, Capacty, Proceedngs of the IEEE ymposum on esearch n ecurty and Prvacy, pp. 60-66, Aprl 987. [6].B. Lpner, A Comment on the Confnement Problem, Operatng ystems evew, vol. 9, ssue 5, pp. 9-96, ovember 975. [7] M. chaefer, B. Gold,. Lnde, and J. ched, Program Confnement n KVM/370, Proceedngs of the 977 Annual ACM Conference, pp. 404-40, October 977. [8] J.C. Huskamp, Covert Communcaton Channels n Tmesharng ystems, Techncal eport UCB-C-78-0, Ph.D. Thess, Unversty of Calforna, Berkeley, CA, 978. [9] D.E. Dennng, Cryptography and Data ecurty, Addson-Wesley, eadng, Massachusetts, 983. [0] I.. Moskowtz and A.. Mller, mple Tmng Channels, Proceedngs of IEEE Computer ymposum on esearch n ecurty and Prvacy, pp. 56-64, May 994. [] I.. Moskowtz,.J. Greenwald, and M.H. Kang, An Analyss of the Tmed-Z Channel, Proceedngs of IEEE Computer ymposum on ecurty and Prvacy, pp. -, May 996. [] K.h. Zgangrov, equental Decodng for A Bnary Channel wth Drop Outs and Insertons, Problemy Peredach Informats, vol. 5, ssue, pp. -30, 969. [3] M.C. Davey and D.J.C. Mackey, elable Communcaton over Channels wth Insertons, Deletons, and ubsttutons, IEEE Trans. on Informaton Theory, vol. 47, no., pp. 687-698, February 00. [4] Dave Legh, Capacty of Inserton and Deleton Channels, Project eport, 00, avalable at http://www.nference.phy.cam.ac.uk/s/papers/ [5] J.K. Mllen, Fnte-tate oseless s, Proceedngs of the Computer ecurty Foundatons Workshop II, pp. 8-86, June 989. [6] T. Cover and J. Thomas, Elements of Informaton Theory, John Wley & ons Inc., ew York, 99.
[7].L. Doburshn, hannon s Theorems for Channels wth ynchronzaton Errors, Problemy Peredach Informats, vol.3, o.4, pp.8-36, 967 [8].D. Vvedenskaya and.l. Doburshn, The Computaton on a Computer of The Channel Capacty of a Lne wth ymbol Drop-out, Problemy Peredach Informats, vol.4, o.3, pp.9-95, 968. [9] A.. Dolgopolov, Capacty Bounds for a Channel wth ynchronzaton Errors, Problemy Peredach Informats, vol.6, o., pp.7-37, 990. [0] J. Luo, A. Ephremdes, "On the Throughput, Capacty and tablty egons of andom Multple Access", submtted to IEEE Trans. on Informaton Theory, February 005. Appendx A: A Proof of Theorem 5 A protocol s constructed based on whch a capacty can be derved. The recever keeps a counter that records the number of symbols that t has receved. Each tme when the recever gets the chance to perform an operaton, t reads the channel and beleves that a symbol s receved. It then updates the counter and nforms the sender how many symbols t has receved. At the sender sde, the sender keeps a counter that records how many symbols of the message have been sent or skpped. Each tme when the sender gets a chance to perform an operaton, t checks the number of symbols the recever has receved. If the number s smaller than ts own counter, t means that a symbol sent n the sender s last operaton has not been receved by the recever. The sender then does nothng and wats for the next opportunty. If the two numbers are equal, t means that last symbol has been receved. The sender then sends the next symbol and updates ts own counter. If the number s larger than the sender s counter, t means that some symbols have been nserted. To synchronze the transmsson, the sender skps some symbols n the message so that the next symbol to be sent wll appear n the same locaton n the receved message at the recever s sde as n the orgnal message. The sender then sends ths symbol and updates the counter wth the locaton of the symbol next to the one that was just sent. Usng such a protocol, the sender can always ensure that the number of symbols receved by the recever equals the number of symbols t sent. For symbol nsertons, snce the sender skps the same number of symbols to be sent, n the receved symbol sequence the skpped symbols are replaced by those nserted Fgure 5. Converted channel model ones. Also, snce the sender wll not send a new symbol untl at least one symbol s receved, no symbol deleton can occur. Therefore the resultng channel s a synchronous channel, but wth some symbols replaced. To calculate the capacty of such a channel, hannon s theory can be used. For the sake of smplcty, we assume that the data channel s noseless,.e., P s = 0. We also assume the channel s memoryless. Fgure 5 shows the channel model. It s ndeed an M- ary symmetrc DMC (dscrete memoryless channel) wth the followng transton probabltes: ( p when x = y P( y x) = ) () p when x y where s the number of bts of the data channel and P s the nserton probablty. It s straght forward to get the followng capacty: Cconv = αp log ( ) H ( αp ) () where α = (3) ( p) p log p ( p) log ( p H = ) (4) when s large, C p ) H ( p ) (5) conv X -p( ) p(y x) ( ote that the above calculaton s based on the synchronous model where the tme wasted for watng s not taken nto account and the tme for skpped symbols ndeed should be 0, we need to adjust the above results wth a coeffcent. It s not dffcult to show that ths coeffcent should be (- P d )/(- P ), therefore the actual capacty should be P C = d C (6) conv P where C conv s gven n () and (5). As the above capacty can be acheved wth a real protocol, t s the lower bound of the actual capacty. Y