H04L9/0875

KEY GENERATION METHOD, APPARATUS, ELECTRONIC DEVICE AND STORAGE MEDIUM
20230171096 · 2023-06-01 ·

Disclosed are a key generation method, apparatus, an electronic device, and a storage medium. The key generation method comprises: obtaining a channel characteristic parameter of a wireless channel; generating a key according to the channel characteristic parameter; capturing after continuously generating multiple keys, a first key matrix by means of a sliding window having a preset length, to obtain a second key matrix; determining a correlation between keys in the second key matrix, and performing key substitution on the keys in the second key matrix when the correlation between the keys in the second key matrix is greater than a preset threshold; and adding the keys in the second key matrix to a key pool until the number of keys in the key pool reaches a preset number.

Security key generation for communications between base station and terminal based on beam selection

To enable security enhancement in the case of employing beamforming. A first apparatus according to the present invention includes: an information obtaining unit configured to obtain information related to beam selection; and a key generating unit configured to generate a security key for radio communication between a base station and a terminal apparatus based on the information related to the beam selection.

Information-theoretically secure secrecy generation

A method and apparatus are provided for performing information-theoretically secure cryptography using joint randomness not shared by others. Two valid communicating entities independently generate samples of a shared source that is not available to an illegitimate entity. The shared source may be a satellite signal, and each legitimate entity may generate uniformly distributed samples from a binary phase-shift keying signal received on an independent channel. Alternatively, the shared source may be a channel between the two legitimate entities, such that each legitimate entity generates samples of unknown distribution based on the channel impulse response of the channel. One legitimate entity generates an encryption key, a quantization error, and a syndrome from its samples. The quantization error and the syndrome are reported to the other legitimate entity. The other legitimate entity generates a matching encryption key using its samples, the quantization error, and the syndrome.

METHOD FOR GENERATING A SECRET KEY FOR ENCRYPTED WIRELESS COMMUNICATIONS

The method for generating a secret key for encrypted wireless communications is a physical layer technique that exploits channel randomness between two nodes, the channel being characterized by reciprocity between the two nodes. Reference signals exchanged by the two nodes are used to faun a channel estimate, including gain location and phase location. The gain and phase locations are compared to threshold values, and locations exceeding the respective thresholds are stored in vectors. The moving differences between gain and phase locations at adjacent sampling times define secondary random processes. The moving difference values are quantized and converted to bit streams, which are concatenated to generate the secret key. Measures are provided to reduce parity errors, thereby reducing the bit mismatch rate (BMR).

Security key generator
09781079 · 2017-10-03 · ·

A communication system has a first and a second communicating device operable to send and receive data units through a communication channel. Some of the data are encrypted using a security key. The first device comprises a first key generator generating a first embodiment of the key independently of a second embodiment of the key generated by a second generator of the second device, the second embodiment being generated independently of the first, which depends on parameter(s) characterizing a first transmission quality of the channel when receiving a first set of unencrypted data sent by the second device. The second embodiment depends on parameter(s) characterizing a second transmission quality of the channel when receiving a second set of unencrypted data sent by the first device, the first set being different from the second set.

Method and apparatus for secure communication and determining secret information

A method of secure communication in a transmitter, includes determining a method of generating a training sequence that is shared with a receiver. The method further includes generating the training sequence based on the method of generating the training sequence, and secret information. The method further includes communicating with the receiver based on channel information derived from the training sequence.

OPTICAL COMMUNICATION APPARATUS, OPTICAL COMMUNICATION SYSTEM AND METHOD
20220311606 · 2022-09-29 ·

The optical communication apparatus includes a random number generator, a first key manager, a first encryption and decryption device, a driver and a transmitter. The random number generator is configured to generate a random number based on a time frequency. The first key manager is configured to generate a first key based on the random number, store and manage the first key and a second key obtained from an outside. The first encryption and decryption device is configured to encrypt the first key according to the second key to obtain a first encrypted key, and is configured to encrypt initial communication data according to the first key to obtain encrypted data. The driver is configured to obtain the encrypted data and encode the encrypted data into a visible light emission instruction. The first transmitter is configured to receive the visible light emission instruction and emit first visible light.

Methods for secure data storage
11212089 · 2021-12-28 · ·

Embodiments include a method for secure data storage including constructing an encryption key from a plurality of key elements, the constructing including distributing the plurality of key elements to a plurality of key maintenance entities, each of the plurality of key maintenance entities employing a plurality of independent safe guards for their respective key elements of the plurality of key elements; and requiring access to the plurality of key elements to construct the encryption key. The method includes receiving a subset of the plurality of key elements via a twice-encrypted communications channel; and regenerating the encryption key at the client node; and after encrypting data, deleting the subset of the plurality of key elements received over the twice-encrypted communications channel, retaining any of the plurality of key elements previously stored at the client node.

ENCRYPTION METHOD
20210377014 · 2021-12-02 ·

Disclosed is a method of encrypting a data signal for providing to an input of a radio frequency transmitter, such as modulated baseband signals in the physical layer for wireless transmission. The method comprises receiving the data signal comprising one or more first frequency components with a first phase profile in a frequency band of interest; applying a dispersive encrypting signal filter to the data signal to generate an encrypted data signal comprising the one or more frequency components with a second phase profile, wherein the second phase profile is different to the first phase profile. Decryption is achieved by applying a decrypting filter to the encrypted data signal to substantially reverse the effect of the encrypting filter and recover the first phase profile.

Sharing resources between wireless networks
11363468 · 2022-06-14 · ·

A first wireless communication device communicates a reservation to a second wireless communication device, wherein the reservation is for a shared frequency channel that is employed concurrently by a first network and a second network. The first wireless communication device and the second wireless communication device are associated with the first network. The first wireless communication device configures at least one spatial subchannel in the shared frequency channel to increase a power ratio of transmissions received by the second wireless communication device versus transmissions received by at least one receiver in the second network, and the first wireless communication device transmits data over the at least one spatial subchannel to the second wireless communication device.