Предлагается новый протокол обмена ключами, работающий с постоянными общедоступными каналами без шумов (по крайней мере, без шумов для перехватчиков) и не использующий стандартные сложностные предположения. Протокол основан на схеме EVSKey, недавно предложенной Цинем и Дингом. Показано, что такая схема нестойкая, для повышения ее стойкости вводятся искусственный шум и процедура повышения конфиденциальности. Вероятности ключевых битовых ошибок как для законных, так и для нелегальных пользователей оценены с помощью моделирования. Вероятности декодирования ошибок рассчитаны для кодов LDPC. Оценен объем утечки информации Шеннона злоумышленникам. Приведен также канальный трафик, необходимый для выполнения предложенного протокола.
The method of secret key sharing between units that did not possess any secret keys in advance is considered. It is assumed that between these units there are duplex wireless MIMO fading channels. In a recent paper published by D. Qin and Z. Dingh a new key sharing protocol has been proposed between legitimate users based on eigenvalues which are invariant under permutation of two matrices in their product. We extend this statement to a characteristic polynomial and by the way to matrix trace. Methods of key bits extraction are optimized both theoretically and experimentally. On the contrary to a statement of D. Qin and Z. Ding we prove that their key sharing protocol occurs insecure if eavesdroppers have the same channels as legitimate users. In order to provide reliability and security of the shared keys both error correction codes and privacy amplification methods can be used.
In the current paper, some methods of information security protocols based on physical layer security are considered. It is proved that well known Shamir’s protocol can be applied to RSA cryptosystem but not to Rabin, Mac-Ellice and trellis based cryptosystems.The main stream of this paper is a description of key sharing protocol on constant public and noiseless channels (like Internet). It is shown that it is able to provide a high reliability and control of security in terms of Shannon’s information providing nothing-additional requirements to communication channels and without any cryptographic assumptions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.