首页> 外文会议>IEEE Global Communications Conference >Fast Secret Key Generation in Static Environments Using Induced Randomness
【24h】

Fast Secret Key Generation in Static Environments Using Induced Randomness

机译:使用感应随机性在静态环境中快速生成秘密密钥

获取原文

摘要

Secret key agreement in distributed low-power networks, such as Internet of Things (IoT) networks, is a major requirement for deploying cryptographic protocols to protect the security of sensitive data. However, due to the distributed nature of such networks, the devices need to be able to generate secret keys locally from some common source of randomness. The randomness in the characteristics of the physical layer channel provides such sources, however, this can be quite limited if the devices operate in a static environment and experience static or very slow fading channel. Therefore, fast secret key generation in such environments while keeping a low complexity architecture for the network nodes, such as IoT devices, remains a challenging task. We design a low-complexity protocol for fast secret key generation in static environments. To this end, we propose to use a limited number of random bits independently generated by the legitimate parties, referred to as Alice and Bob, in combination with the fading parameter to create a common source of randomness. In the proposed protocol, Alice and Bob share their random bits over the public channel, assumed to be a fading channel, and then construct a common random sequence. Then they perform several steps for recovery from errors in the shared sequence, privacy amplification to limit the chances of a successful attack, and consistency checking by exploiting universal hash functions. We characterize the reliability of the proposed protocol and provide an upper bound on the probability of accepting a mismatched key by Alice and Bob. The eavesdropper Eve is assumed to be passive and a successful attack by her is the event of guessing the key right based on her observations. We provide an analytical upper bound, that can be numerically evaluated, on the probability of a successful attack by Eve using the cryptographic notion of semantic security. In the simulations, the proposed protocol achieves a bit generation rate of 64-96 bits/packet, bit mismatch rate of 11-24%, bit error rate of 0.005%, 50% randomness efficiency, the probability of successful attack of at most 2-31, and the probability of consistency checking failure of at most 2-16.
机译:分布式低功耗网络中的秘密密钥协议,如物联网(IOT)网络,是部署加密协议以保护敏感数据的安全性的主要要求。然而,由于这些网络的分布性质,设备需要能够从某些常见的随机性源自本地生成秘密键。然而,物理层信道的特征中的随机性提供了这种源,但是,如果设备在静态环境中操作并且经历静态或非常慢的衰落通道,则可以相当有限。因此,在这种环境中产生的快速秘密密钥生成,同时保持用于网络节点的低复杂性架构,例如IOT设备,仍然是一个具有挑战性的任务。我们在静态环境中设计了一个低复杂性协议,可用于快速秘密密钥生成。为此,我们建议使用由合法派对独立生成的有限数量的随机比特,并与衰落参数结合使用渐变参数来创建一个随机性的常见源。在所提出的协议中,Alice和Bob在公共信道上共享它们的随机位,假设是衰落通道,然后构建一个常见的随机序列。然后,它们执行几个步骤以在共享序列中的错误中恢复,隐私放大,以限制成功攻击的机会,并通过利用通用散列函数来进行一致性检查。我们表征了所提出的协议的可靠性,并提供了Alice和Bob接受不匹配键的概率的上限。假设窃听者前夕是被动的,她的成功攻击是基于她的观察来猜测关键权利的事件。我们提供了一个分析上限,可以使用语义安全的加密概念通过夏娃成功攻击的概率来进行数值评估。在模拟中,所提出的协议实现了64-96位/分组的比特生成率,比特不匹配速率为11-24 \%,比特错误率为0.005 \%,随机性效率为50±%,成功攻击的概率最多2个 -31 ,以及最多2的一致性检查失败的概率 -16

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号