Efficient random physical layer secrete key generation method based on vector quantization

A technology of vector quantization and generation method, which is applied in the field of security keys of cryptographic algorithms, and can solve the problems of low bit error rate, inability to meet high bit generation rate at the same time, and mathematical difficulties of security systems.

Inactive Publication Date: 2014-05-28
XIDIAN UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The existing 802.11 security technology provides authentication and security mechanisms for data frames, but management frames and control frames are not protected
[0006] (2) The theoretical basis of existing security systems is mathematically difficult problems (such as large integer decomposition problems and discrete logarithm calculation problems)
With the development of computing technology, especially the emergence of quantum computers, the computing power of attackers has been greatly improved, and the security of these cryptographic techniques based on computational complexity will be reduced.
[0007] (3) Most cryptographic techniques, especially public key cryptography, have high complexity and computational requirements, so they are not suitable for low-profile distribute

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient random physical layer secrete key generation method based on vector quantization
  • Efficient random physical layer secrete key generation method based on vector quantization
  • Efficient random physical layer secrete key generation method based on vector quantization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0080] In this example, Alice and Bob, the communication parties, run on two PCs respectively, both of which are equipped with ubuntu12.04 operating systems, and both use the same model of network card Atheros TL-WN650G, driven by Madwifi, and work in 802.11g mode Send and receive packets. In this implementation process, we modified Madwifi and added a reply to the beacon frame. The beacon_ack frame carries the same serial number as the beacon frame. Through the matching of the serial numbers, the two parties in communication can complete the RSS pairing. The length of the beacon_ack is 49 bytes. Bob moves back and forth around Alice and sends beacon frames to Alice at intervals of 100ms. After receiving the beacon frame, Alice will record the serial number and the corresponding RSS value, and immediately send a beacon_ack confirmation frame to Bob. After Bob receives the confirmation frame, he also records the serial number and the corresponding RSS value. In this embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient random physical layer secrete key generation method based on vector quantization. According to the method, a first wireless network communication party and a second wireless network communication party respectively and simultaneously detect RSS information of a wireless channel and transmit the information to each other, and the first wireless network communication party and the second wireless network communication party operate in the steps of inconsistent removal, vector quantization and fuzzy extraction and ultimately obtain identical bit streams to be used as encrypted secrete keys. The bit generation rate can reach 284%, and random bit streams can be quickly provided for authentication encrypted algorithms of the two communication parties in a wireless network environment to serve as the encrypted secrete keys; the zero error rate can be achieved through the two communication parties, it can be guaranteed that the two communication parties reliably generate the identical bit streams to be used as the encrypted secrete keys, and stability of the method in the operation process is guaranteed; the bit streams produced in the method can pass an NIST randomness test, the produced random bit streams can be used as the secrete keys, and safe communication of the two communication parties is guaranteed.

Description

technical field [0001] The invention belongs to the field of wireless network security, and relates to a method and a related device for efficiently and randomly generating a security key used in a cryptographic algorithm from a physical layer. Generally speaking, the invention can meet the requirements of the security key generation speed and security intensity in the field of wireless network security. Background technique [0002] Various wireless devices have become an integral part of our daily life, through which we can share information and exchange data. For example, a group of tourists need to share resources such as pictures and videos through point-to-point connections, while preventing others from accessing these resources. In order to safely deploy and adopt these applications, it is very important to ensure the confidentiality, integrity and authentication of data transmission. [0003] The broadcast characteristics of wireless networks make it face greater s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 李兴华杨丹李鑫姚青松马建峰毛立强高胜姜奇
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products