Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Shared Key Secure Communication Method Fused with Private Information

A technology for private information and secure communication, applied in key distribution, can solve the problems of reducing the randomness of generated key bits, reducing channel characteristics, and rare research on shared key secure communication between wired channels and fiber channels, so as to improve the channel. Effects of reciprocity, increased randomness, enhanced security

Active Publication Date: 2019-06-25
SOUTHEAST UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods are designed for high-speed wireless communication systems, but in secure communication based on channel characteristics, these methods of compensating channel reciprocity through precoding may reduce the characteristics of the channel, thereby reducing the randomness of generating key bits
[0005] In addition, most of the existing research on shared-key secure communication based on channel characteristics is based on wireless channels, and the research on shared-key secure communication for wired channels and optical fiber channels is still rare.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Shared Key Secure Communication Method Fused with Private Information
  • A Shared Key Secure Communication Method Fused with Private Information
  • A Shared Key Secure Communication Method Fused with Private Information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further explained below in conjunction with the drawings.

[0027] A shared key secure communication method that integrates private information. In the TDD communication system, the device fingerprint information of the communicating parties and the generated private key are taken as implicit private information, and these private information are protected through public channel characteristics And pass it to the other party, and then at the receiving end, by superimposing the known private information on the received signal, the reconstruction of channel reciprocity is completed, thereby realizing the secure communication of the shared key that integrates channel characteristics and private information. The method includes four links: the device fingerprint feature acquisition link, the signal preprocessing link at the transmitter, the signal sending and receiving link, and the receiver integrating private information. In the implementation p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a shared key security communication method for fusing private information. According to the shared key security communication method, equipment fingerprint information and private keys of both communication parties are taken as connotative private information, the private information is protected and transmitted to opposite parties according to public channel characteristics, and reconstruction of channel reciprocity is completed at a receiving terminal in a mode that known private information is overlapped with received signals. By adopting the method disclosed by the invention, consistency in generating shared keys of the communication parties and the randomness in generating the keys can be improved, the problem of channel characteristic reciprocity under the condition that equipment fingerprint characteristics are available and the problem that the randomness in generating the keys is insufficient under the condition that the channel changes slowly can be solved, and the shared key security communication method can be applied to wireless communication systems and can be also applied to wired communication systems and optical fiber communication systems.

Description

Technical field [0001] The invention relates to a shared key secure communication method that integrates private information in the case of Time Division Duplex (TDD), and belongs to communication security technology. Background technique [0002] With the development of communication technology, high-speed communication systems have been widely used. Whether it is in the traditional wired communication field, the rapidly developing wireless communication field and the optical fiber communication field, its security has also attracted increasing attention. The traditional encryption method is based on the upper communication protocol. Both parties in communication rely on the agreed key for confidential communication. However, with the development and deepening of information countermeasures technology, the security of the key itself will become increasingly difficult to guarantee. Therefore, traditional information security technologies will be increasingly threatened in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 彭林宁胡爱群
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products