摘要:
A method for establishing shared information is described. The method includes estimating characteristics of a communication channel between two nodes based on signals transmitted between the nodes. The method also includes transmitting a signal from the first node to the second node, the signal being modulated with a first data sequence according to a first estimated characteristic, and transmitting a signal from the second node to the first node, the signal being modulated with a second data sequence according to a second estimated characteristic. Shared information is formed at each of the first and second nodes based on at least a portion of the first data sequence and at least a portion of the second data sequence.
摘要:
A new methodology to exchange a random secret key between two parties. The diverse physical characteristics of the wireless medium and device mobility are exploited for secure key exchange. Unique physical characteristics of wireless channels between the two devices are measured at different random locations. A function of these unique characteristics determines the shared secret key between the two devices.
摘要:
An inventive wireless communication apparatus that, in a wireless communication system to which a secret key scheme is applied, can generate a secret key, which is different from a secret key generated by a third party, even if a wireless signal is intercepted by the third part having an approximate propagation path environment to a receiving wireless communication apparatus. In the inventive apparatus, an eigenvalue selecting part (317) of a secret key generating part (207) selects a maximum one of MIMO channel eigenvalues received from an eigenvalue detecting part (206) and inputs the selected maximum eigenvalue to a quantizing part (327). The quantizing part (327) quantizes the magnitude of the maximum eigenvalue received from the eigenvalue selecting part (317) to produce and input a quantized data to a key generating part (337). The key generating part (337) uses a predetermined scheme to generate a secret key from the quantized data received from the quantizing part (327), and inputs the generated secret key to a control part or the like not shown.
摘要:
There is disclosed a radio communication device capable of preventing wire-tap of an encrypted communication even if a radio signal is wire-tapped by a third person in a radio communication system using the MIMO technique. In this device, an inter-channel correlation calculation unit (104) calculates an inter-channel correlation value between two channels in the MIMO channel according to four channel estimation values inputted from a channel estimation unit (103). The six channel correlation values calculated are all inputted to a channel selection unit (105). The channel selection unit (105) selects a minimum channel correlation value from the six channel correlation values inputted from the inter-channel correlation calculation unit (104) and reports two channels corresponding to the selected channel correlation value to an inter-channel correlation monitoring unit (110) and inputs the channel estimation value of the two channels to a secret key generation unit (106).
摘要:
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
摘要:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
摘要:
A security system is disclosed which is suitable for use in a passive entry and passive starting arrangement for a vehicle 10. A set of transmitters in the form of coils A, B, C are spaced around the vehicle 10, one A, B in each door mirror 20R, 20L and one in a high level brake light 16 at the rear end.Operation of a door handle initiates an access challenge from the vehicle 10 which is sent out successively on a plurality of the coils A, B, C. A portable transponder 26 carried by an authorised user is adapted to pick up the challenge signal and send back to a security controller 18 a response signal in which is included vector information relating to the relative positioning between the vehicle 10 and the transponder 26.
摘要:
A security system is disclosed which is suitable for use in a passive entry and passive starting arrangement for a vehicle 10. A set of transmitters in the form of coils A, B, C are spaced around the vehicle 10, one A, B in each door mirror 20R, 20L and one in a high level brake light 16 at the rear end. Operation of a door handle initiates an access challenge from the vehicle 10 which is sent out successively on a plurality of the coils A, B, C A portable transponder 26 carried by an authorised user is adapted to pick up the challenge signal and send back to a security controller 18 a response signal in which is included vector information relating to the relative positioning between the vehicle 10 and the transponder 26.
摘要:
A cryptographic communications system enables two entities related by an insecure communication channel and having initially no privately shared knowledge, to agree on a shared unconditionally secure information. Each one of the entities has the capability to generate a new form of randomness called Deep Random, such that any other entity than itself cannot know anything about the probability distribution except a given public characteristic. The internal system of each entity is made up with: (1) a Deep Random Generator (DRG) capable of generating Deep Random signals and of making calculations using the generated signals, and (2) an Interactive Communication Module (ICM) capable of publishing to and reading from the insecure channel. The two entities execute a communication protocol such that they can each compute their respective estimations of the shared information that are probabilistically as close as desired from perfect equality.
摘要:
A method is described for generating a secret sequence of values in a first device as a function of measured physical properties of a transmission channel between the first device and at least one second device. In this context, movements are detected by at least one sensor, and as a function of the detected movements, it is determined whether values of the physical properties of the transmission channel measured during the detected movements are suitable for generating the secret sequence of values.