Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key generation method based on channel fingerprints and auxiliary data

A technology for auxiliary data and key generation, applied in the field of information security, can solve problems such as leaking key information, and achieve the effects of ensuring communication security, improving restoration success rate and security, improving randomness and restoration reliability.

Active Publication Date: 2020-12-18
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER +1
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the auxiliary data generated by the traditional fuzzy extractor is related to the key, which will leak the key information, so a new fuzzy extractor structure is urgently needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key generation method based on channel fingerprints and auxiliary data
  • Secret key generation method based on channel fingerprints and auxiliary data
  • Secret key generation method based on channel fingerprints and auxiliary data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] A key generation method based on channel fingerprints and auxiliary data, such as figure 1 shown, including the following steps:

[0027] (1) random key generation;

[0028] During specific implementation, a key is generated by an RNG random number generator for use in an encrypted communication system.

[0029] (2) The sender traverses the channel characteristic data to determine whether the data falls into the quantization interval;

[0030] In this embodiment, the sending end sequentially traverses the collected channel characteristic data; the quantization interval is

[0031]

[0032] In the formula, s is the number of key bits, Represents the distribution function of the channel characteristic data, p t = 1 / t.

[0033] (3) The sending end uses a zero-leakage quantization method to quantize the channel characteristic data;

[0034] During specific implementation, step (3) specifically includes whether the currently traversed channel characteristic data fa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an end-to-end key generation method based on channel fingerprints and auxiliary data. The method comprises the steps that a sending end generates a random key; The sending endtraverses the channel characteristic data , and judges whether the data falls into a quantization interval or not; the sending end quantizes the channel characteristic data by using a zero-leakage quantization method; the sending end obtains an auxiliary data generation function, calculates an auxiliary data value and sends the auxiliary data value to the receiving end; the receiving end traversesthe auxiliary data and restores the channel characteristic data; and the receiving end judges whether the restored channel characteristic data is equal to the channel characteristic data detected bythe receiving end or not, if not, the secret key is restored directly, if yes, the secret key is restored according to the maximum likelihood algorithm, and finally the generated secret key is obtained. According to the invention, channel characteristic data processing, secret key generation and corresponding auxiliary data extraction are carried out through a corresponding algorithm, so that therandomness and consistency rate of the secret key of the end-to-end communication equipment are enhanced, and higher communication security is ensured.

Description

technical field [0001] The invention relates to the field of information security, in particular to a key generation method based on channel fingerprints and auxiliary data. Background technique [0002] Wireless communication is more and more applied to all walks of life, which brings high efficiency and convenience to people's daily life, but it is followed by security issues that need to be solved urgently. For example, wireless networks communicate through broadcasting, without clear boundaries, making it easier to eavesdrop on the content transmitted, and the location where the wireless signal arrives may also be attacked; the network structure of wireless communication is often in dynamic changes, and different network structures are different. The large size makes it difficult to make centralized decision-making and management of the generated keys; wireless communication terminals are mobile, and physical defense measures such as firewalls cannot be applied, and once...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0869
Inventor 丁正阳徐超李达李萌顾锡华夏元轶窦昊翔吴小虎
Owner INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products