Information theoretical security-based key agreement method in satellite network
A technology of information theory and security key, applied in the field of wireless network communication, which can solve the problem that cryptographic security cannot be proved.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] Because the satellite network has two important characteristics of large transmission delay and asymmetric communication channel. Therefore, in the specific implementation of the information theory security key agreement protocol, technologies that meet these two characteristics should be adopted, especially the larger transmission delay puts forward higher requirements for communication: the larger delay leads to the loss of communication link resources. is scarce, all secure service links must consume less. Due to the large transmission delay of the satellite network, the consumption of link resources is mainly measured by the number of communication rounds.
[0032] In the information theory security key agreement protocol, all communication is based on the basic assumption that the communication channel is two independent discrete memoryless channels, and the negotiation technology used in the protocol process is that the number of communication rounds of the commun...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 