Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption key distribution system and method

a key distribution system and encryption key technology, applied in the field ofsignal transfer, can solve problems such as the key potentially vulnerable to an attack by a third party monitoring the network

Active Publication Date: 2016-02-23
TEXAS A&M UNIVERSITY
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The invention provides a way to safely distribute keys in a network or data communication channel. It uses a protocol called positions, encryption keys, and trust to ensure information security. This approach is suitable for any network that has data exchanged between elements connected by wires. Overall, the invention ensures that information is always secure in the network.

Problems solved by technology

However, transfer of such a key over a network makes the key potentially vulnerable to an attack by a third party monitoring the network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption key distribution system and method
  • Encryption key distribution system and method
  • Encryption key distribution system and method

Examples

Experimental program
Comparison scheme
Effect test

embodiment 1

[0104]A Kirchhoff-Law-Johnson-(like)-Noise (KLJN) system for secure key distribution, comprising:

[0105]a wired network; and

[0106]a plurality of hosts connected to each other on the wired network,

[0107]wherein each host is connected to every other host by a continuous wired path capable of transmitting electrical current,

[0108]wherein each host of the plurality of hosts comprises a first resistor and is configured to produce a first-resistor enhanced Johnson noise voltage when the first resistor is connected to a voltage source,

[0109]wherein each host of the plurality of hosts further comprises a second resistor and is further configured to produce a second-resistor enhanced Johnson noise voltage when the second resistor is connected to a voltage source,

[0110]wherein the resistance value of the first resistor of each host is identical to that of all other hosts of the plurality of hosts, and

[0111]wherein the resistance value of the second resistor of each host is the identical to tha...

embodiment 2

[0112]The system according to embodiment 1, wherein each host further comprises a filter box.

embodiment 3

[0113]The system according to embodiment 2, wherein the filter box comprises:

[0114]a first KLJN filter for KLJN key exchange; and

[0115]a main signal filter for supplying a main signal of the network to the host having the filter box.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods for the secure distribution of encryption keys in a network are provided. A Kirchhoff-Law-Johnson-(like)-Noise (KLJN) secure key exchange protocol can be utilized in a network where keys are exchanged between hosts connected by a wire. Such a KLJN secure key exchange protocol provides information security that is information theoretically secure.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001]The present application claims the benefit of U.S. Provisional Application Ser. No. 61 / 951,072 filed Mar. 11, 2014, which is hereby incorporated by reference herein in its entirety, including any figures, tables, and drawings.BACKGROUND[0002]Cybersecurity is a very important aspect of signal transfer, and an urgent need exists to protect intelligence, companies, infrastructure, and personal data in an efficient way. Encryption keys can be used to transfer data between two hosts over a network, but the key itself must also be transmitted over the network to provide it from one host to another with any reasonable speed. However, transfer of such a key over a network makes the key potentially vulnerable to an attack by a third party monitoring the network.BRIEF SUMMARY[0003]Embodiments of the subject invention provide systems and methods for the secure distribution of keys (e.g., encryption keys) in a network and / or a data communication chann...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/08G05F1/66
CPCH04L9/0819G05F1/66H04L2209/24H04L2209/08Y04S40/20
Inventor GONZALEZ, ELIAS ELICEOKISH, LASZLO B.BALOG, ROBERT S.
Owner TEXAS A&M UNIVERSITY