Unlock instant, AI-driven research and patent intelligence for your innovation.

Security key extraction method based on high-frequency sound signal

A sound signal and security key technology, applied in the field of information security, can solve the problem that the key extraction method is difficult to be widely used, and achieve the effect of efficient and secure key extraction and time reduction.

Inactive Publication Date: 2021-01-12
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, although the CSI signal can generate multiple subcarriers through Orthogonal Frequency Division Multiplexing (OFDM) to provide more fine-grained physical layer information for fast key extraction, the measurement of the CSI signal requires a special wireless Network card (Intel Wi-Fi Link 5300), this type of network card is very rare in existing commercial wireless mobile devices, so the key extraction method based on CSI is difficult to be widely used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security key extraction method based on high-frequency sound signal
  • Security key extraction method based on high-frequency sound signal
  • Security key extraction method based on high-frequency sound signal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The application environment of this example is East 309 Laboratory, Building 3, Telecom Group Building, Minhang Campus, Shanghai Jiao Tong University, and the large lawn of the Electric Academy. The mobile devices used are Google Nexus 7, MEIZU MX 6, Xiaomi 3 with speakers and microphones, using Bluetooth As a support for wireless transmission between devices, the sampling frequency of the device is 44.1kHz, and the measured sound channel bandwidth is

[0018] 18kHz-22kHz, the center frequency is 20kHz, and the communication parties are named Alice and Bob respectively.

[0019] like figure 2 As shown, this embodiment includes the following steps:

[0020] In the first step, Alice sends a synchronization signal to Bob, and Alice starts to send a sound signal to Bob after receiving the confirmation signal from Bob. After Bob receives the sound signal, he also sends the sound signal to Alice, until the communication parties generate the required fixed-length security k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security key extraction method based on a high-frequency sound signal, and the method comprises the steps: firstly enabling two communication sides to estimate the state features of a sound channel through continuously receiving and transmitting sound signals, i.e., playing a processed pulse code modulation file; then respectively performing adaptive bit quantization on the estimated channel states to obtain binary bit strings; negotiating inconsistent bits in the bit string by the two parties to obtain a consistent bit string; and finally, performing privacy amplification processing on the bit string to obtain a final security key. According to the method, the signal random quantity is extracted by using the time dynamics of the sound channel, the channel reciprocity obtained through the sound channel ensures that two mobile devices extract similar signal features, and other attack devices are prevented from obtaining the similar signal features through the spatial heterogeneity of the sound channel; the method is suitable for extracting the security key, and meanwhile, the problems of practicability of key extraction and relatively low key production efficiency are solved.

Description

technical field [0001] The invention relates to a technology in the field of information security, in particular to a method for extracting a security key based on a high-frequency sound signal. Background technique [0002] The key generation rate is low in the existing key extraction technology. For example, RSSI and CIR only provide coarse-grained information of the wireless channel, and the number of valid data bits generated by each sample is small. In addition, although the CSI signal can generate multiple subcarriers through Orthogonal Frequency Division Multiplexing (OFDM) to provide more fine-grained physical layer information for fast key extraction, the measurement of the CSI signal requires a special wireless Network card (Intel Wi-Fi Link 5300), this type of network card is very rare in existing commercial wireless mobile devices, so it is difficult for the key extraction method based on CSI to be widely used. In addition, during the key extraction process, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G10L25/03
CPCG10L25/03H04L9/0816H04L9/0838
Inventor 吴帆陆尤静孔令和陈贵海
Owner SHANGHAI JIAO TONG UNIV