Method for generating a secret or a key in a network

A network, secret technology, applied in the field of secret keys, to achieve the effect of low complexity, saving additional overhead, and small error probability

Active Publication Date: 2018-03-23
ROBERT BOSCH GMBH
View PDF14 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, especially in wired or optical systems, this approach is often only suitable conditionally, since the corresponding channels usually have only very limited temporal variability, and an attacker can, for example, use model formation relatively well Draw conclusions about channel parameters between sender and receiver

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating a secret or a key in a network
  • Method for generating a secret or a key in a network
  • Method for generating a secret or a key in a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The invention relates to a method for generating a common secret or (secret) symmetric encryption key between two nodes (participants of a network) of a communication system, which nodes transmit via a commonly used medium (network) channel) to communicate with each other. In this case, the generation or negotiation of the encryption key is based on a public data exchange between the two participants, wherein a possible eavesdropping third party as an attacker is still not possible or only very difficult to achieve: inference The generated secret key. Thus, with the aid of the invention it is possible to fully automatically and securely set up corresponding symmetric encryption keys between two different participants in the network, in order to then implement certain security functions, such as data encryption, based thereon. As described in more detail, a common secret is first established for this, which can be used for key generation. But such a common secret can a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a method for generating a secret or a key in a network (20). The network (20) comprises at least a first subscriber (21) and a second subscriber (22) and a common transmission channel (30) between at least the first (21) and second subscribers (22). The first subscriber (21) can output at least a first value (1) and a second value (0) and the second subscriber (22) can output at leastthe first value (1) and the second value (0) on the transmission channel, the first subscriber (21) generating a first sequence of subscriber values and the second subscriber (22) generating a secondsequence of subscriber values in order for the transmission to occur largely synchronously on the transmission channel (30); and the first subscriber (21) and the second subscriber (22) each generatea common secret or a common key, the first subscriber (21) doing so on the basis of information about the first sequence of subscriber values and on the basis of a sequence of superposed values resulting from a superposition of the second sequence of subscriber values onto the first sequence of subscriber values on the transmission channel (30), and the second subscriber (22) doing so on the basis of information about the second sequence of subscriber values and on the basis of the sequence of superposed values resulting from the superposition of the second sequence of subscriber values ontothe first sequence of subscriber values on the transmission channel (30). At least the first subscriber (21) and the second subscriber (22) determine a sequence of test values in accordance with the resulting sequence of superposed values and output same on the transmission channel (30).

Description

technical field [0001] The invention relates to a method for generating a secret encryption key in a network, in particular a common secret key between two participants of the network. Point-to-point (Punkt-zu-Punkt) connections generally also belong to networks and are therefore also addressed here using the term. In this case, the two participants communicate via a jointly used transmission medium. In this case, a logical bit sequence (or generally a value sequence) is physically transmitted via a corresponding transmission method as a signal or signal sequence. The underlying communication system can be, for example, a CAN bus. The CAN bus provides for the transmission of dominant and recessive bits or corresponding dominant and recessive signals, wherein the dominant signals or bits of the network participants are implemented relative to the recessive signals or bits. The state corresponding to the recessive signal is set on the transmission medium only when all partici...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0875
Inventor T.洛特施派赫A.米勒
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products