H04L9/0875

Method, device and system for secure distance measurement
11489680 · 2022-11-01 · ·

Device for secure distance measurement being a prover (P) or a verifier (V) comprising: a receiver (R3) configured to receive a receiving signal (RS) with a transmitted message (M) encoded therein, wherein the transmitted message (M) contains a verifying bit sequence (VBS), wherein a bit of the transmission message (M) is transmitted in the transmission signal (TS) by a pulse with a pulse modulation parameter with two pulse states, and a decoder (R2) configured to decode the verifying bit sequence (VBS) from the transmitted message (M) encoded in the receiving signal (RS). The decoder (R2) is based on a transmission format of the transmitted message (M) and based on the transmitted message (M) detected in the receiving signal (RS) defines sub-periods (4) in the receiving signal (RS) in which the first path (F1, F2) of the pulses (S1, S2) of the bits of the verifying bit sequence (VBS) of the transmitted message (M) are expected in the receiving signal (RS); and the decoder (R2) decodes a pulse state of a pulse (S1, S2) of a bit of the verifying bit sequence (VBS) based on the receiving signal (RS) received during one of the defined sub-periods (4) belonging to the pulse (S1, S2) to be decoded.

Symmetric Encryption Key Generation Using Wireless Physical Layer Information Without Sharing Any Information Pertinent To The Key
20220345306 · 2022-10-27 ·

Symmetric keys are generated by an algorithm that uses the randomness from the wireless PHY layer to extract the keys. When used with reconfigurable antennas, the algorithm yields longer keys. By using the randomness from the wireless PHY layer, the algorithm solves the issue of secure information leakage to the wireless channel during key establishment phase. The algorithm also omits transmitting anything secure during this phase and prevents any intruder from obtaining information related to the key. This approach can automatically secure the communications over open wireless networks (those without authentication or encryption) or closed wireless networks using other methods of authentication.

SECURITY KEY GENERATION IN WIRELESS NETWORKS

According to an example aspect of the present invention, there is provided a method comprising, transmitting to a second wireless node timing information for security key adoption and information indicative of a third wireless node, transmitting to the third wireless node a message to estimate a channel between the second wireless node and the third wireless node, the message to estimate the channel comprising information indicative of the second wireless node and channel measurement resource information associated with the second wireless node, obtaining a security key generated on the basis of channel estimation information based on estimation of the channel by the third wireless node, and applying the security key for encrypted data transmission between the first wireless node and the second wireless node.

Encryption hybrid model SI simulation method based on ADS and HSPICE

It is provided an encryption hybrid model SI simulation method based on an ADS and an HSPICE. The method includes: extracting step response data of a TX end chip encryption model by using HSPICE transient simulation; externally generating a random code signal; and taking the extracted step response data and the random code signal as input sources of ADS channel simulation, to realize active simulation to the encryption hybrid model.

METHODS FOR SECURE DATA STORAGE
20230118320 · 2023-04-20 ·

A method includes receiving, from a server, a plurality of data packets at a wireless client device; identifying, by the wireless client device, receive times for the plurality of data packets; identifying, by the wireless client device, a first subset of the plurality of data packets having shorter delay times than a second subset of the plurality of data packets having higher delay times based on the received times; and mixing, by the wireless client device, a subset of the first plurality of data packets to generate an encryption key.

DEVICE SPECIFIC MULTIPARTY COMPUTATION
20230143175 · 2023-05-11 ·

In one implementation, the disclosure provides systems and methods for a multi-party secret sharing protocol that is device specific in that the secret matrix used herein is tied to individual computing devices. Specifically, the method includes determining device channel errors of a plurality of computing devices based on channel impulse response (CIR) of communication channels of the plurality of computing devices, training a linear regression model using the device channel errors to generate learning with error (LWE) secrets for each of the plurality of computing devices, generating a general access structure secret matrix using the LWE secrets from each of the plurality of computing devices, and distributing shares of the general access structure secret matrix to the plurality of computing devices based on a multi-party secret sharing protocol, wherein the multi-party secret sharing protocol provides that the general access structure secret matrix cannot be constructed without shares from an authorized set of the computing devices.

Apparatus and method for generating security key in wireless communication system
11646882 · 2023-05-09 · ·

The present disclosure relates to a fifth generation (5G) or a pre-5G communication system for supporting higher data transmission rate compared to fourth generation (4G) communication systems such as Long Term Evolution (LTE). The present disclosure relates to generating a security key in a wireless communication system, and a method for operating a transmission end comprises the steps of: generating an encryption key using information related to channel estimation; and transmitting encrypted data to a receiving end using the encryption key.

Communication latency based cryptographic negotiations

A method of selecting a particular cryptographic algorithm for an optimal cryptographic negotiation in which higher security level is obtained with an acceptable performance speed. The method includes exchanging information between a first device and a second device for establishing a secure communication connection, measuring network latency between the first device and the second device, and selecting a particular cryptographic algorithm from among a plurality of mutually supported cryptographic algorithms based on the network latency for establishing the secure communication connection.

METHOD AND APPARATUS FOR OPTICAL ENCRYPTION COMMUNICATION USING A MULTITUDE OF HARDWARE CONFIGURATIONS
20230198766 · 2023-06-22 ·

A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.

Systems and methods for generating shared keys, identity authentication and data transmission based on simultaneous transmission on wireless multiple-access channels

Methods of half-duplex communication systems or full-duplex communication systems are provided. The half-duplex communication system includes n number user units-including a transmitting unit of transmitting units, wherein the transmitting unit including a channel estimation module, an identity update module and a modulation module; a receiving unit of receiving units including a demodulation module, a post-processing module and a reconciliation and verification module; a memory unit for storing prime identities, data to be transmitted and shared secret key; a control unit; an antenna connected to each of the transmitting units and each of the receiving units; and the methods are used for realizing a generation of shared secret keys, and an integrated identity verification and a data transmission using the half-duplex communication systems and the full-duplex communication systems.