准静态环境下的回溯加扰密钥生成算法
作者单位:

重庆邮电大学

基金项目:

重庆市自然科学基金(cstc2021jcyj-msxmX0454)


Backtracking scrambled key generation algorithm in quasi-static environment
Author:
Affiliation:

Chongqing University of Posts and Telecommunications

Fund Project:

Natural Science Foundation of Chongqing(cstc2021jcyj-msxmX0454)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献
  • | |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    针对准静态环境信道变化缓慢、随机性及安全性不足问题,提出一种回溯加扰密钥生成算法。利用本次密钥与上一次密钥间的不一致索引总和生成扰码并与本次密钥加扰,使连续生成密钥间的重复比率接近0.5,并通过了NIST测试。同时,要窃听本次密钥,不仅需窃听本次信道系数,还需成功窃听上一次密钥来得到本次加密的扰码,而窃听上一次密钥又与此同理。随“一次一密”密钥生成次数的增加,即使被窃听到较相关的信道系数,密钥泄露率仍接近0.5。利用语义安全和信息论不等式分别估计了一般及恶劣信道条件成功窃听的概率上界及其随密钥生成次数N的变化情况,给定某些参数,得到这两种情况下的上界计算公式为 和 。

    Abstract:

    A backtracking scrambled key generation algorithm is proposed to address the problems of slow channel change, the lack of randomness and security in quasi-static environments. A scrambling code is generated using the sum of the in-consistent indexes between the current key and the previous key and scrambled with the current key, resulting in a repetition ratio between successive generated keys close to 0.5 and passing the NIST test. Meanwhile, to eavesdrop on the current key, it is necessary not only to eavesdrop on the current channel coefficients, but also to successfully eavesdrop on the previous key to obtain the scrambled code for this encryption, however, eavesdropping on the previous key is the same as this. As the number of "one-time pad" key generation increases, even with the higher relevant channel coefficients overheard, the key leakage rate remains close to 0.5. The upper bounds on the probability of successful eavesdropping and its variation with the number of key generation N for general and bad channel conditions are estimated using semantic security and information-theoretic inequalities, respectively, giving certain parameters, the upper bounds for these two cases are obtained as and .

    参考文献
    [1] Zeng K. Physical layer key generation in wireless networks: challenges and opportunities[J]. IEEE Communications Magazine, 2015, 53(6): 33-39.
    [2] Wang T, Liu Y, Vasilakos A V. Survey on channel reciprocity based key establishment techniques for wireless systems[J]. Wireless Networks, 2015, 21: 1835-1846.
    [3] Goldsmith A. Wireless communications[M]. US, Cambridge university press, 2005.
    [4] 李古月, 俞佳宝, 胡爱群. 基于设备与信道特征的物理层安全方法[J]. 密码学报, 2020, 7(2): 224-248.
    [5] LI Guyue, YU Jiabao, HU Aiqun. A physical layer security approach based on device and channel characteristics[J]. Journal of Cryp-tography, 2020, 7(2): 224-248.
    [6] [5] Shannon C E. Communication theory of secrecy systems[J]. The Bell system technical journal, 1949, 28(4): 656-715.
    [7] [6] Furqan H M , Hamamreh J M , Arslan H .New Physical Layer Key Generation Dimensions: Subcarrier Indices/Positions-Based Key Generation[J].IEEE Communications Letters, 2020, PP(99):1-1.
    [8] [7] TAKAYUKI S, HISATO I, AND HIDEICHI S. Physical-layer secret key agreement in two-way wireless relaying systems [J]. IEEE transactions on Information Forensics and Security, 2011, 6(3): 650-660.
    [9] [8] Mangang R K , Harshan J .Do Not Forget the Past: A Buffer-Aided Framework for Relay Based Key Generation[J]. Journal of Com-munications and Networks, vol. 2022, 24, no. 1, pp. 1-16, Feb.
    [10] [9] 郝一诺, 金梁, 黄开枝, 等. 准静态场景下基于智能超表面的密钥生成方法[J]. 网络与信息安全学报, 2021, 7(2): 77-85.
    [11] HAO Yino, JIN Liang, HUANG Kaizhi, et al. An intelligent hypersurface-based key generation method in quasi-static scenari-os[J]. Journal of Network and Information Security, 2021, 7(2): 77-85.
    [12] [10] Lu T, Chen L, Zhang J, et al. Reconfigurable intelligent surface assisted secret key generation in quasi-static environments[J]. IEEE Communications Letters, 2021, 26(2): 244-248.
    [13] [11] Wang D, Chen F, Chen Y, et al. Scramble-Based Secret Key Generation Algorithm in Physical Layer Security[J]. Mobile In-formation Systems, 2022,2022:1574-017X.
    [14] [12] 陈发堂, 郑金贵, 陈峰等. 基于PID控制的自适应密钥生成[J/OL].京邮电大学学报(自然科学版), 2023(03): 11-18[2023-07-07].
    [15] CHEN Fatang, ZHENG Jingui, CHEN Feng et al. Adaptive key generation based on PID control[J/OL].Journal of Nanjing Uni-versity of Posts and Telecommunications (Natural Science Edition), 2023(03): 11-18[2023-07-07].
    [16] [13] Aldaghri N, Mahdavifar H. Physical layer secret key generation in static environments[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 2692-2705.
    [17] [14] Tang J, Wen H, Song H H, et al. Sharing secrets via wireless broadcasting: A new efficient physical layer group secret key gen-eration for multiple IoT devices[J]. IEEE Internet of Things Journal, 2022, 9(16): 15228-15239.
    [18] [15] Juels A, Wattenberg M. A fuzzy commitment scheme[C]//Proceedings of the 6th ACM conference on Computer and communications security. 1999: 28-36.
    [19] [16] 3GPP Evolved Universal terrestrial radio access (E-UTRA); phys-ical channels and modulation[S]. Tobacco Situation.
    [20] [17] Bellare M, Tessaro S, Vardy A. Semantic security for the wiretap channel[C]//Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Springer Berlin Heidelberg, 2012: 294-311.
    [21] [18] Cover T M, Thomas J A. Elements of Information Theory[M]. John Wiley & Sons, USA: Wiley, 2012.
    [22] [19] Scarlett J, Cevher V. An introductory guide to Fano''s inequality with applications in statistical estimation[J]. arXiv preprint arXiv:1901.00555, 2019.
    [23] [20] Rukhin A, Soto J, Nechvatal J, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications[R]. Boozallen and hamilton inc mclean va, 2001.
    [24] [21] Liu H, Wang Y, Yang J, et al. Fast and practical secret key extraction by exploiting channel response[C]//2013 Proceedings IEEE IN-FOCOM. IEEE, 2013: 3048-3056.
    [25] [22] Cho Y S, Kim J, Yang W Y, et al. MIMO-OFDM wireless com-munications with MATLAB[M]. John Wiley & Sons, USA: Wiley, 2010.
    相似文献
    引证文献
    引证文献 [0]
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

王丹,方磊,何斌,陈发堂.准静态环境下的回溯加扰密钥生成算法[J].南京信息工程大学学报,,():

复制
分享
文章指标
  • 点击次数:321
  • 下载次数: 0
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2023-07-14
  • 最后修改日期:2023-10-30
  • 录用日期:2023-11-03

地址:江苏省南京市宁六路219号    邮编:210044

联系电话:025-58731025    E-mail:nxdxb@nuist.edu.cn

南京信息工程大学学报 ® 2025 版权所有  技术支持:北京勤云科技发展有限公司