Unlock instant, AI-driven research and patent intelligence for your innovation.

Active channel key generation method and system for preventing near-end eavesdropping

A channel key and generation system technology, applied in the field of active channel key generation, can solve the problems of not being able to block the passive attack or near-end attack of eavesdroppers, and the security needs to be improved, so as to achieve the effect of improving security and enhancing practicability

Active Publication Date: 2020-08-25
PURPLE MOUNTAIN LAB
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing construction methods are often unable to block passive attacks or near-end attacks by eavesdroppers. Although these methods have improved the key generation rate in quasi-static scenarios, the security needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active channel key generation method and system for preventing near-end eavesdropping
  • Active channel key generation method and system for preventing near-end eavesdropping
  • Active channel key generation method and system for preventing near-end eavesdropping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] This embodiment provides an active channel key generation method for preventing near-end eavesdropping, such as figure 1 shown, including the following steps:

[0043] (1) Communication party A obtains public pilot signal X A , and locally generate the private channel coefficient gain unitary matrix G A and private signal X RA , the communicating party B locally generates the private channel coefficient gain matrix G B .

[0044] Wherein, the signals generated by each party may be generated by a random method or by other methods.

[0045] (2) Communication party A increases the local private channel coefficient gain unitary matrix G A with public pilot signal X A and multiply to get G A x A , send to communication party B through the first frequency band, and send local private signal X to communication party B through the second frequency band RA .

[0046] After the communication party A sends to the communication party B, the communication party B will rece...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an active channel key generation method and system for preventing near-end eavesdropping. According to the method, the unitary matrix is introduced into two communication parties to increase the volatility of a channel, and a private signal is introduced to increase a secret source, so the consistency of information held by the two communication parties is ensured through abackhaul mechanism, and a relatively high key generation rate and relatively high security are still maintained in a quasi-static scene. A secret key is generated in the coherence time of a channel,subsequent data blocks are encrypted, and one-time pad is achieved in the whole data transmission process. According to the method, a relatively high key generation rate and key randomness are still kept in a quasi-static scene, passive eavesdropping attacks can be resisted while a channel is actively constructed, the security of a channel key generation algorithm is improved, and the availabilityin an actual scene is improved.

Description

technical field [0001] The invention relates to security information technology, in particular to an active channel key generation method and system for preventing near-end eavesdropping. Background technique [0002] The reciprocity of the wireless channel, the variability in time and space makes it a random source for extracting keys, the reciprocity determines the reliability of the key, and the variability in time and space ensures the confidentiality of the key . The rapid change of the wireless channel mainly depends on small-scale fading. When the wireless communication terminal is moving fast, the channel changes rapidly and obviously. For example, in the vehicular network, the variability of the channel is easy to be guaranteed, the generated key changes quickly, and the key information entropy is high. However, in some scenarios, the channel changes very slowly, and the channel that changes very slowly and is small is defined as a quasi-static channel, such as th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04
CPCH04W12/041
Inventor 李古月胥英豪胡爱群
Owner PURPLE MOUNTAIN LAB