Secret Key Generation from Channel Noise with the Help of a Common Key

03/14/2018
by   Tatsuya Tomaru, et al.
0

Information-theoretically secure communications are possible when channel noise is usable and when the channel has an intrinsic characteristic that a legitimate receiver (Bob) can use the noise more advantageously than an eavesdropper (Eve). This report deals with the case in which the channel does not have such an intrinsic characteristic. Here, we use a pre-shared common key as a tool that extrinsically makes Bob more advantageous than Eve. This method uses error-correcting code in addition to the common key and noise, and manages the three components in random-number transmission. Secret keys are generated from noise, and messages are encrypted with the secret keys in a one-time pad manner. As a result, information leaks meaningful to Eve are restricted to the parity-check symbols for the random numbers. It is possible to derive the candidates of the common key from the parity check symbols, and the security of this method is quantified in terms of the amount of computations needed for an exhaustive search of the candidates, where we evaluate the security by assuming that all parity check symbols leak to Eve without bit errors. Noise contributes to not only generating secret keys but also enhancing the security because the candidates of the common key increase with it.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/05/2023

Physical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes

Physical layer approaches for generating secret encryption keys for wire...
research
09/25/2018

Physical Layer Key Generation for Secure Power Line Communications

Leakage of information in power line communication networks is a threat ...
research
10/17/2021

Novel Secret-Key-Assisted Schemes for Secure MISOME-OFDM Systems

We propose a new secure transmission scheme for uplink multiple-input si...
research
11/22/2020

Electt: running auditable and verifiable elections in untrusted environments

We present a system for running auditable and verifiable elections in un...
research
01/17/2019

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks

We consider the secure communication problem for broadcasting of two enc...
research
03/01/2018

A Hybrid Artificial-Noise and Secret-Key Scheme for Securing OFDM Transmissions in V2G Networks

We propose a new scheme to enhance the physical-layer security of wirele...
research
10/19/2020

KaFHCa: Key-establishment via Frequency Hopping Collisions

The massive deployment of IoT devices being utilized by home automation,...

Please sign up or login with your details

Forgot password? Click here to reset