CN108366370B - A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic - Google Patents

A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic Download PDF

Info

Publication number
CN108366370B
CN108366370B CN201810105180.8A CN201810105180A CN108366370B CN 108366370 B CN108366370 B CN 108366370B CN 201810105180 A CN201810105180 A CN 201810105180A CN 108366370 B CN108366370 B CN 108366370B
Authority
CN
China
Prior art keywords
channel
information
communication
party
parties
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810105180.8A
Other languages
Chinese (zh)
Other versions
CN108366370A (en
Inventor
彭林宁
胡爱群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201810105180.8A priority Critical patent/CN108366370B/en
Priority to PCT/CN2018/086477 priority patent/WO2019148690A1/en
Publication of CN108366370A publication Critical patent/CN108366370A/en
Application granted granted Critical
Publication of CN108366370B publication Critical patent/CN108366370B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0875Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Invention describes a kind of information transferring methods for quantifying privately owned asymmetric key based on radio channel characteristic.Radio channel characteristic is measured by communicating pair, extracts respective private cipher key.One side of communication carries out xor operation again after needing the information transmitted first to carry out channel coding using private cipher key pair, realize the encryption to transmission information.Recipient carries out xor operation using the received information of its private cipher key pair, realizes the decryption to transmission information.Due to the influence of wireless channel and equipment feature, the private cipher key of communicating pair may be asymmetric, that is, has certain difference.The information of recipient's decryption needs to reuse channel error correction decoding, solves correctly transmission information.It can not need to reconcile by additional information using this method and privacy amplification process, the security information of realization sharing wireless channel feature are transmitted.

Description

一种基于无线信道特征量化私有不对称密钥的信息传输方法An Information Transmission Method Based on Quantizing Private Asymmetric Keys Based on Wireless Channel Characteristics

技术领域technical field

本发明涉及信息安全传送技术领域,特别是涉及一种基于无线信道特征量化私有不对称密钥的信息传输方法。The invention relates to the technical field of information security transmission, in particular to an information transmission method for quantizing a private asymmetric key based on wireless channel characteristics.

背景技术Background technique

基于无线信道特征物理层安全技术主要是基于测量无线信道的特征将其量化成通信双方对称的密钥,再使用其密钥加密上层传输的信息。然而,在实际的通信系统中,由于通信双方的通信链路可能存在着些许的差别,获得的无线信道特征不尽相同。因此,为了能够获得对称的密钥,在以往的基于无线信道特征物理层安全技术中需要引入信息调和过程,通过通信双方交互信息调和信息,从而获得通信双方一致的密钥。然而,引入信息调和将不可避免的泄漏通信双方秘密的无线信道特征信息。为了能够解决信息调和带来的双方秘密的无线信道特征信息的泄漏,通信双方还需要进一步通过隐私放大过程来保护最终获得密钥的安全性和随机性。因此,这些过程将增加最终获得密钥的复杂度。此外,在现有的基于无线信道特征的密钥生成技术体制中,信道纠错编码大多被用于考虑在信息调和的过程中使用,用于生成对称的密钥。在现有的研究中,并没有将将信道纠错编码和基于无线信道特征密钥生成的安全信息传输结合在一起考虑。The physical layer security technology based on wireless channel characteristics is mainly based on measuring the characteristics of the wireless channel to quantify it into a symmetric key for both communication parties, and then use the key to encrypt the information transmitted by the upper layer. However, in an actual communication system, because there may be some differences in the communication links between the two communicating parties, the obtained wireless channel characteristics are not the same. Therefore, in order to obtain a symmetric key, an information reconciliation process needs to be introduced in the previous physical layer security technology based on wireless channel characteristics, and a key that is consistent between the two parties can be obtained by exchanging information and reconciling information between the two communicating parties. However, the introduction of information reconciliation will inevitably leak the secret wireless channel characteristic information of both communicating parties. In order to solve the leakage of the secret wireless channel characteristic information caused by information reconciliation, the communication parties need to further protect the security and randomness of the finally obtained key through the privacy amplification process. Therefore, these procedures will increase the complexity of finally obtaining the key. In addition, in the existing key generation technology system based on wireless channel characteristics, channel error correction coding is mostly used in the process of information reconciliation to generate symmetric keys. In the existing research, the combination of channel error correction coding and secure information transmission based on wireless channel characteristic key generation is not considered together.

发明内容SUMMARY OF THE INVENTION

为了解决上述存在的问题,本发明提供一种基于无线信道特征量化私有不对称密钥的信息传输方法,通过本发明方法,可以基于通信双方测量得到的无线信道特征,将需要的信息通过安全的方式传递给对方,从而避免在以往通过无线信道特征直接生成密钥方法中的信息调和和隐私放大过程,具有更好的实用性,为达此目的,本发明提供一种基于无线信道特征量化私有不对称密钥的信息传输方法,包括了以下步骤:In order to solve the above existing problems, the present invention provides an information transmission method based on wireless channel characteristics to quantify private asymmetric keys. Through the method of the present invention, the required information can be transmitted through a secure In order to avoid the process of information reconciliation and privacy amplification in the previous method of directly generating keys through wireless channel characteristics, it has better practicability. To achieve this purpose, the present invention provides a quantitative private key based on wireless channel characteristics. The information transmission method of an asymmetric key includes the following steps:

步骤A,通信双方A和B通过各自发射的导频序列,测量通信双方各自到对方信道的信道特征,通信双方将各自测量得到的无线信道特征量化成一种私有密钥,所述私有密钥是通信双方不对称的密钥;In step A, the communication parties A and B measure the channel characteristics of the communication parties to each other's channel through the pilot sequences transmitted respectively, and the communication parties quantify the wireless channel characteristics measured by each into a private key, and the private key is The asymmetric key of the communication parties;

步骤B,通信的A方将需要传输的信息通过预处理后进行信道纠错编码,生成信道纠错编码后的比特序列;In step B, party A of the communication performs channel error correction coding on the information to be transmitted after preprocessing, and generates a bit sequence after channel error correction coding;

步骤C,通信的A方将步骤B中生成的信道纠错编码后的比特序列和步骤A中得到的私有密钥进行编码操作,生成加密后的数据流;In step C, party A in the communication encodes the channel error correction coded bit sequence generated in step B and the private key obtained in step A to generate an encrypted data stream;

步骤D,通信的A方将加密后的数据流通过公开信道发送给B;Step D, the communication party A sends the encrypted data stream to B through the open channel;

步骤E,通信的B方使用在步骤A获得的私有密钥对从A接收到的数据流进行解码操作;Step E, communicating party B uses the private key obtained in step A to decode the data stream received from A;

步骤F,通信的B方使用信道编码解码算法对步骤E进行解码操作后的数据流进行信道纠错编码解码;In step F, party B in the communication uses a channel coding and decoding algorithm to perform channel error correction coding and decoding on the data stream after the decoding operation in step E;

步骤G,通信的B方将信道解码后的比特序列进行和步骤B预处理过程相逆的处理后得到A传输给B的信息。In step G, party B in the communication processes the channel-decoded bit sequence inversely to the preprocessing process in step B to obtain the information transmitted by A to B.

本发明的进一步改进,步骤A中的导频序列应是多载波传输系统中的频域子载波导频序列,或者是单载波传输系统中的时域符号序列,步骤A中的信道特征应是测量得到的信道频域幅度响应特征,或者是测量得到的信道时域冲击响应特征,步骤A中的量化过程为,当信道特征为信道频域幅度响应特征时,应将信道的频域幅度响应特征在不同子载波的幅度值量化为与幅度对应的比特序列;当信道特征为信道时域冲击响应特征时,应将信道的时域冲击响应在不同时间点的冲击响应幅度值量化为与幅度对应的比特序列。As a further improvement of the present invention, the pilot sequence in step A should be the frequency domain subcarrier pilot sequence in the multi-carrier transmission system, or the time domain symbol sequence in the single carrier transmission system, and the channel characteristics in step A should be The measured frequency-domain amplitude response characteristics of the channel, or the measured channel time-domain impulse response characteristics, the quantization process in step A is, when the channel characteristics are channel frequency-domain amplitude response characteristics, the frequency-domain amplitude response of the channel should be The amplitude values of the features at different subcarriers are quantized into bit sequences corresponding to the amplitudes; when the channel feature is the channel time-domain impulse response feature, the impulse response amplitude values of the time-domain impulse response of the channel at different time points should be quantized as the corresponding amplitude the corresponding bit sequence.

本发明的进一步改进,步骤A中的私有密钥,应由通信的A和B方将相应的信道测量的结果,通过预处理后量化成比特序列。As a further improvement of the present invention, the private key in step A should be quantized into a bit sequence after the corresponding channel measurement results are preprocessed by communicating parties A and B.

本发明的进一步改进,步骤A预处理过程包括了将信道测量的结果进行变换域处理或主成份分析处理,提取出A和B方一致性较高的比特序列并将测量的信道特征量化成的比特序列通过一定的方式进行抽取或排列组合变化。As a further improvement of the present invention, the preprocessing process of step A includes performing transform domain processing or principal component analysis processing on the channel measurement results, extracting bit sequences with high consistency between A and B, and quantizing the measured channel features into The bit sequence is extracted or permuted and combined in a certain way.

本发明的进一步改进,步骤B中的预处理包括了通信A方使用通信双方已经共有的信息和传输的帧序号对需要传输的信息进行加密处理。As a further improvement of the present invention, the preprocessing in step B includes that the communication party A encrypts the information to be transmitted using the information shared by both communication parties and the transmitted frame sequence number.

本发明的进一步改进,步骤B中的信道编码,包括了卷积码,Turbo码,RS码,LDPC码,Polar码,并将原传输信息转化为比原传输信息更长的码序列,用于纠正传输过程中比特错误的编码方法。In a further improvement of the present invention, the channel coding in step B includes convolutional codes, Turbo codes, RS codes, LDPC codes, and Polar codes, and converts the original transmission information into a longer code sequence than the original transmission information for use in An encoding method that corrects bit errors during transmission.

本发明的进一步改进,步骤C中的编码操作,包括了将步骤B中通信A方生成的信道纠错编码后的比特序列和步骤A中通信A方得到的私有密钥进行逐个比特的异或操作。As a further improvement of the present invention, the encoding operation in step C includes bit-by-bit XOR of the channel error correction coded bit sequence generated by communication party A in step B and the private key obtained by communication party A in step A operate.

本发明的进一步改进,步骤E中的解码操作,包括了将步骤D中由通信A方传输来的比特序列和步骤A中通信B方得到的私有密钥进行逐个比特的异或操作。In a further improvement of the present invention, the decoding operation in step E includes performing a bit-by-bit exclusive OR operation on the bit sequence transmitted by communication party A in step D and the private key obtained by communication party B in step A.

本发明的进一步改进,步骤F中的信道纠错编码解码,包括了通信B方使用纠错码将步骤E解码后的比特进行纠正,获得正确的信道编码前的比特序列。In a further improvement of the present invention, the channel error correction coding and decoding in step F includes that communication party B uses an error correction code to correct the bits decoded in step E to obtain a correct bit sequence before channel coding.

本发明的进一步改进,步骤G中的逆操作,包括了通信B方使用通信双方已经共有的信息和传输的帧序号对在步骤F中获得的信道解码的比特序列进行解密处理。A further improvement of the present invention, the inverse operation in step G, includes that communication party B uses the information shared by both communication parties and the transmitted frame sequence number to decrypt the channel-decoded bit sequence obtained in step F.

本发明提供一种基于无线信道特征量化私有不对称密钥的信息传输方法,针对通信双方测量获得的信道特征,本发明不同于以往的密钥生成方法,设计了一种信息传输方法。由于信息调和过程有可能泄露双方秘密的共享信道信息,加入隐私放大过程后将增加系统整体的复杂度。本发明方法将测量得到的信道特征量化成私有密钥,直接和经过信道编码的需要传输的信息进行异或操作后传输给对方。对方通过将测量得到的信道特征量化成的私有密钥进行异或操作后对传输的信息进行信道纠错编码解码,最终获得传输的信息。通过该方法可以不借助于信息调和过程实现通信双方通过无线信道特征获得安全的信息传输。The present invention provides an information transmission method for quantifying private asymmetric keys based on wireless channel characteristics. The present invention is different from the previous key generation method and designs an information transmission method for the channel characteristics measured and obtained by both communication parties. Since the information reconciliation process may reveal the secret shared channel information of both parties, adding the privacy amplification process will increase the overall complexity of the system. The method of the invention quantizes the measured channel characteristics into a private key, and directly performs an XOR operation with the information to be transmitted after channel coding, and then transmits it to the other party. The other party performs channel error correction coding and decoding on the transmitted information by performing an XOR operation on the private key quantified by the measured channel characteristics, and finally obtains the transmitted information. Through this method, it is possible to achieve secure information transmission between the communication parties through wireless channel characteristics without resorting to the information reconciliation process.

附图说明Description of drawings

图1为本发明系统流程图;Fig. 1 is a flow chart of the system of the present invention;

图2为本发明基于无线信道得到的频域子载波幅度信道特征图;Fig. 2 is the frequency-domain sub-carrier amplitude channel characteristic diagram obtained based on the wireless channel in the present invention;

图3为本发明基于无线信道特征得到的信道量化结果图;Fig. 3 is the channel quantization result diagram that the present invention obtains based on wireless channel characteristic;

图4为本发明基于无线信道量化结果得到的密钥比特图;Fig. 4 is the key bit map that the present invention obtains based on the radio channel quantization result;

图5为本发明系统实施的实例图;Figure 5 is an example diagram of the implementation of the system of the present invention;

图6为本发明使用该发明方法在有窃听者情况下的安全传输性能和窃听结果示意图。FIG. 6 is a schematic diagram of the secure transmission performance and eavesdropping results of the present invention using the inventive method in the case of an eavesdropper.

具体实施方式Detailed ways

下面结合附图与具体实施方式对本发明作进一步详细描述:Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

本发明提供一种基于无线信道特征量化私有不对称密钥的信息传输方法,通过本发明方法,可以基于通信双方测量得到的无线信道特征,将需要的信息通过安全的方式传递给对方,从而避免在以往通过无线信道特征直接生成密钥方法中的信息调和和隐私放大过程,具有更好的实用性。The present invention provides an information transmission method for quantifying private asymmetric keys based on wireless channel characteristics. Through the method of the present invention, the required information can be transmitted to the other party in a safe manner based on the wireless channel characteristics measured by both communication parties, thereby avoiding It has better practicability in the process of information reconciliation and privacy amplification in the previous method of directly generating keys through wireless channel characteristics.

作为本发明一种实施例,本发明提供具体实施系统流程图如图1所示示意图。As an embodiment of the present invention, the present invention provides a specific implementation system flowchart as shown in FIG. 1 .

首先通信双方Alice和Bob通过各自的信道特征探测导频P,测量信道特征。在本实施例中,考虑Alice和Bob基于无线信道在频域的幅度特征。通过信道探测导频P,Alice获得的从Bob至Alice的信道特征为HBA,Bob获得的从Alice至Bob的信道特征为HAB。其获得的无线信道频域特征如图2所示。从图中可以看出,由于通信双方无线信道的差异以及通信双方各自器件的差异,其获得的无线信道频域特征会有一定的差异。Firstly, Alice and Bob, the communication parties, detect the pilot P through their respective channel characteristics, and measure the channel characteristics. In this embodiment, the amplitude characteristics of Alice and Bob based on the wireless channel in the frequency domain are considered. Through the channel sounding pilot P, the channel characteristic obtained by Alice from Bob to Alice is H BA , and the characteristic of the channel from Alice to Bob obtained by Bob is H AB . The obtained wireless channel frequency domain characteristics are shown in Fig. 2 . It can be seen from the figure that due to the differences in the wireless channels of the two parties in communication and the differences in the devices of the two parties in communication, the frequency domain characteristics of the wireless channel obtained will have certain differences.

Alice和Bob分别将测量得到的信道特征量化成初步获得的私有密钥PA和PB。其中,由于受到实际测量的影响,HBA≈HAB,因此,实际获得的私有密钥PA≈PB。其获得私有密钥的过程如图3和图4所示。在图4中可以看到,Alice和Bob最终获得的私有密钥中的0/1比特序列具有一定的差异。Alice and Bob respectively quantize the measured channel characteristics into initially obtained private keys PA and P B . Wherein, due to the influence of actual measurement, H BA ≈ H AB , therefore, the actually obtained private key P A ≈ P B . The process of obtaining the private key is shown in Figure 3 and Figure 4. As can be seen in Figure 4, the 0/1 bit sequences in the private keys finally obtained by Alice and Bob have certain differences.

因此,在本实施例中,我们允许PA和PB大部分的比特相同,但允许PA和PB有少量的比特不同。此外,Alice和Bob为了能够提高私有密钥的随机性,可以对初步获得私有密钥PA和PB进行抽取操作,即;Therefore, in this embodiment, we allow most of the bits of PA and P B to be the same, but allow PA and P B to have a small number of bits different. In addition, in order to improve the randomness of the private key, Alice and Bob can extract the private key P A and P B initially obtained, namely;

其中D为抽取深度。where D is the extraction depth.

最终,Alice和Bob可以通过多次测量无线信道,获得长度为L的具有高度随机性的私有密钥 Finally, Alice and Bob can obtain a highly random private key of length L by measuring the wireless channel multiple times and

Alice选择需要发送给Bob的信息M,Alice在信息M后加入传输的帧序号F,组合成信息MF。Alice通过和Bob事先共享的密钥K,将信息MF进行加密,获得信息Alice选择一种信道纠错编码算法,该信道编码算法的码率为c,即信道纠错编码后的信息长度为原传输信息长度的1/c。Alice将信息通过信道编码,获得信道编码后的信息其中,的长度为L。Alice selects the message M that needs to be sent to Bob, and Alice adds the transmitted frame number F after the message M to form the message MF. Alice encrypts the information MF through the key K shared with Bob in advance to obtain the information Alice chooses a channel error correction coding algorithm with a code rate c, that is, the length of the information after channel error correction coding is 1/c of the length of the original transmission information. Alice sends the message Through channel coding, the information after channel coding is obtained in, The length is L.

Alice将和私有密钥进行逐个比特的异或操作,获得将要传输的序列S。Alice will and private key Perform a bit-by-bit XOR operation to obtain the sequence S to be transmitted.

Alice将序列S通过公共的信道传输给Bob。Bob通过其私有的密钥和接收的序列S进行异或操作,解出信息 Alice transmits the sequence S to Bob through a public channel. Bob passes his private key Perform XOR operation with the received sequence S to solve the information

Bob通过信道纠错编码解码算法,对获得的信息进行解码,获得进行纠错后的信息最终,Bob通过和Alice事先共享的密钥K,将信息进行解密,获得信息MF,并最终提取出Alice传递的信息M。Bob uses the channel error correction coding and decoding algorithm to obtain information Decode to obtain error-corrected information In the end, through the key K shared by Bob and Alice in advance, the information Decrypt to obtain the information MF, and finally extract the information M passed by Alice.

上述的本发明方法整体系统实施实例图如图5所示。利用该发明方法进行安全信息传输的传输性能和窃听者通过窃听信道尝试解码传输信息的性能如图6所示。由图中所示,当以256比特为一组进行信息传输,传输环境的信噪比高于15dB时,使用该发明方法进行安全信息传输的分组错误率低于10%,可以实现信息的安全传输。而窃听者窃听后进行信息解码的分组错误率为100%,无法正确解出传输的信息。The overall system implementation example diagram of the above-mentioned method of the present invention is shown in FIG. 5 . The transmission performance of the secure information transmission using the inventive method and the performance of an eavesdropper trying to decode the transmission information by eavesdropping on the channel are shown in FIG. 6 . As shown in the figure, when 256 bits are used as a group for information transmission and the signal-to-noise ratio of the transmission environment is higher than 15dB, the packet error rate of using the inventive method for secure information transmission is lower than 10%, which can realize information security transmission. However, the packet error rate for the eavesdropper to decode the information after eavesdropping is 100%, and the transmitted information cannot be decoded correctly.

以上所述,仅是本发明的较佳实施例而已,并非是对本发明作任何其他形式的限制,而依据本发明的技术实质所作的任何修改或等同变化,仍属于本发明所要求保护的范围。The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any other form, and any modification or equivalent change made according to the technical essence of the present invention still belongs to the scope of protection required by the present invention .

Claims (7)

1. An information transmission method for quantizing a private asymmetric key based on wireless channel characteristics comprises the following steps:
step A, the two communication parties A and B measure the channel characteristics of the channels from the two communication parties to the other communication parties through the pilot frequency sequences transmitted by the two communication parties respectively, and the two communication parties quantize the wireless channel characteristics obtained by the respective measurement into a private key, wherein the private key is an asymmetric key of the two communication parties;
the pilot frequency sequence in the step A is a frequency domain subcarrier pilot frequency sequence in a multicarrier transmission system or a time domain symbol sequence in a single carrier transmission system, the channel characteristic in the step A is a measured channel frequency domain amplitude response characteristic or a measured channel time domain impulse response characteristic, and the quantization process in the step A is to quantize the amplitude values of the frequency domain amplitude response characteristic of the channel in different subcarriers into a bit sequence corresponding to the amplitude when the channel characteristic is the channel frequency domain amplitude response characteristic; when the channel characteristic is a channel time domain impulse response characteristic, the impulse response amplitude values of the time domain impulse response of the channel at different time points are quantized into bit sequences corresponding to the amplitudes;
b, the communication party A carries out channel error correction coding on the information to be transmitted after preprocessing, and generates a bit sequence after the channel error correction coding;
step C, the communication A side carries out coding operation on the bit sequence generated in the step B after channel error correction coding and the private key obtained in the step A to generate an encrypted data stream;
the encoding operation in the step C comprises the exclusive OR operation of bit by bit of the bit sequence generated by the communication A party in the step B after channel error correction encoding and the private key obtained by the communication A party in the step A;
step D, the communication party A sends the encrypted data stream to the communication party B through a public channel;
step E, the B party of communication uses the private key obtained in step A to carry out decoding operation on the data stream received from A;
the decoding operation in the step E comprises the exclusive OR operation of the bit sequence transmitted by the communication A party in the step D and the private key obtained by the communication B party in the step A one by one;
step F, the communication B party uses a channel coding and decoding algorithm to carry out channel error correction coding and decoding on the data stream subjected to the decoding operation in the step E;
and G, the communication party B performs inverse processing on the bit sequence after channel decoding with the preprocessing process in the step B to obtain the information transmitted to the party B by the party A.
2. The method for transmitting information based on quantized private asymmetric key of claim 1, wherein the private key in step a is quantized into bit sequence after preprocessing the corresponding channel measurement result by the communicating parties a and B.
3. The information transmission method according to claim 2, wherein the preprocessing of step a includes performing transform domain processing or principal component analysis processing on the channel measurement result, extracting bit sequences with high consistency between parties a and B, and performing extraction or permutation and combination change on the bit sequences quantized by the measured channel characteristics in a certain manner.
4. The method according to claim 1, wherein the preprocessing in step B includes the communication party a encrypting the information to be transmitted using the information already shared by both communication parties and the transmitted frame number.
5. The information transmission method according to claim 1, wherein the channel error correction coding in step B includes convolutional code, Turbo code, RS code, LDPC code, and Polar code, and converts the original transmission information into a code sequence longer than the original transmission information, so as to correct the bit error during transmission.
6. The method according to claim 1, wherein the decoding of the channel error correction coding in step F includes the communication B party correcting the bits decoded in step E with an error correction code to obtain a correct bit sequence before channel coding.
7. The information transmission method according to claim 1, wherein the inverse operation in step G comprises the communication B party decrypting the channel-decoded bit sequence obtained in step F using the information and the transmitted frame number that are already common to both parties.
CN201810105180.8A 2018-02-02 2018-02-02 A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic Active CN108366370B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810105180.8A CN108366370B (en) 2018-02-02 2018-02-02 A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic
PCT/CN2018/086477 WO2019148690A1 (en) 2018-02-02 2018-05-11 Information transmission method based on wireless channel feature quantized asymmetric private keys

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810105180.8A CN108366370B (en) 2018-02-02 2018-02-02 A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic

Publications (2)

Publication Number Publication Date
CN108366370A CN108366370A (en) 2018-08-03
CN108366370B true CN108366370B (en) 2019-08-02

Family

ID=63004238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810105180.8A Active CN108366370B (en) 2018-02-02 2018-02-02 A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic

Country Status (2)

Country Link
CN (1) CN108366370B (en)
WO (1) WO2019148690A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110071801B (en) * 2019-04-24 2021-09-07 东南大学 A method of generating key part reconciliation combining BBBSS protocol and BCH code
CN110086616B (en) * 2019-05-10 2021-07-16 南京东科优信网络安全技术研究院有限公司 Forward one-time pad secret communication method based on wireless channel
CN110336657B (en) * 2019-07-03 2022-02-08 上海大学 Optical OFDM dynamic key generation method based on channel characteristics
CN111404587B (en) * 2020-03-12 2022-04-01 东南大学 Multi-user MIMO symmetrical channel characteristic obtaining method based on conjugate precoding
CN112104459B (en) * 2020-09-10 2023-05-12 国网江苏省电力有限公司信息通信分公司 Key generation method based on channel fingerprint and auxiliary data
CN112533199A (en) * 2020-11-25 2021-03-19 南京熊猫电子股份有限公司 OFDM channel physical key generation method and device based on USRP and computer equipment
CN112532328B (en) * 2021-02-07 2021-05-14 中国人民解放军国防科技大学 Channel characteristic quantization method and device, electronic equipment and storage medium
CN112906874B (en) * 2021-04-06 2024-08-23 南京大学 Convolutional neural network feature map data compression method and device
CN114040392A (en) * 2021-11-04 2022-02-11 东南大学 Uniform quantization method based on median non-uniform normalization and applicable to uncoordinated wireless channel key generation system
CN116567804A (en) * 2022-01-27 2023-08-08 华为技术有限公司 Distance measuring method, device and readable storage medium in UWB

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717074A (en) * 2015-04-02 2015-06-17 东南大学 Shared key security communication method for fusing private information
CN105024824A (en) * 2014-11-05 2015-11-04 祝国龙 Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
CN106102049A (en) * 2016-06-06 2016-11-09 东南大学 A kind of safe transmission message approach utilizing the characteristic of channel
CN106211149A (en) * 2016-07-08 2016-12-07 东南大学 Channel reciprocity enhancement method based on principal component analysis

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140153723A1 (en) * 2012-06-01 2014-06-05 Georgia Tech Research Corporation System for providing physical layer security
CN104219252A (en) * 2014-09-28 2014-12-17 东南大学 Coding error correction based secret key forward direction consistency calibration method
CN106878012B (en) * 2016-12-07 2019-07-16 中国电子科技集团公司第三十研究所 A kind of wireless channel physical layer key agreement and inconsistent bit minimizing technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105024824A (en) * 2014-11-05 2015-11-04 祝国龙 Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
CN104717074A (en) * 2015-04-02 2015-06-17 东南大学 Shared key security communication method for fusing private information
CN106102049A (en) * 2016-06-06 2016-11-09 东南大学 A kind of safe transmission message approach utilizing the characteristic of channel
CN106211149A (en) * 2016-07-08 2016-12-07 东南大学 Channel reciprocity enhancement method based on principal component analysis

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
基于无线信道特征的物理层安全研究;黄夷芯;《中国优秀硕士学位论文全文数据库》;20160504;全文
无线信道的密钥生成方法;胡爱群 等;《密码学报》;20140615;全文
无线通信物理层安全方法综述;胡爱群 等;《数据采集与处理》;20140515;全文

Also Published As

Publication number Publication date
WO2019148690A1 (en) 2019-08-08
CN108366370A (en) 2018-08-03

Similar Documents

Publication Publication Date Title
CN108366370B (en) A kind of information transferring method quantifying privately owned asymmetric key based on radio channel characteristic
EP3709563A1 (en) Secure key agreement with non-trusted devices
CN110086616B (en) Forward one-time pad secret communication method based on wireless channel
CN107148015B (en) Continuous encryption physical layer secure transmission method based on polarization code structure
CN108696867B (en) Lightweight group key distribution method based on wireless channel characteristics
CN111970693B (en) A low-complexity LoRa IoT security encryption method based on physical layer waveform
KR20150129328A (en) Method and apparatus for secure communication
CN101697512A (en) Method and system for anti-interference quantum secure direct communication
CN207234973U (en) Video conferencing system based on quantum cryptography
CN110336657B (en) Optical OFDM dynamic key generation method based on channel characteristics
CN105846947A (en) Physical layer encryption method introducing Latin array
CN106027231B (en) A method of cascade error correction being carried out to error code in the processing after quantum key distribution
CN116032454A (en) Physical layer encryption method and system based on dynamic constellation rotation
CN110971399A (en) Post-processing method and device for optical network physical layer key distribution
CN115396102B (en) Physical layer key generation method based on block and cyclic code
Noura et al. A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach
Mihaljević et al. An approach for stream ciphers design based on joint computing over random and secret data
CN104540125B (en) A kind of safe transmission method using single channel encryption
CN107017960A (en) A kind of AWGN wiretap channel anti-eavesdropping safeguard constructions and its implementation based on polar codes
CN104486756A (en) Encryption and decryption method and system for secret letter short message
du Pin Calmon et al. Lists that are smaller than their parts: A coding approach to tunable secrecy
CN113824510A (en) Quantum secure direct communication method based on intermediate base decoy state
Ni et al. PHY‐Aided Secure Communication via Weighted Fractional Fourier Transform
Suresh et al. Separable reversible data hiding using Rc4 algorithm
CN114915417B (en) A method for securely distributing quantum keys on the edge of the Internet of Things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant