CN112104459A - Key generation method based on channel fingerprints and auxiliary data - Google Patents

Key generation method based on channel fingerprints and auxiliary data Download PDF

Info

Publication number
CN112104459A
CN112104459A CN202010945573.7A CN202010945573A CN112104459A CN 112104459 A CN112104459 A CN 112104459A CN 202010945573 A CN202010945573 A CN 202010945573A CN 112104459 A CN112104459 A CN 112104459A
Authority
CN
China
Prior art keywords
data
key
channel characteristic
characteristic data
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010945573.7A
Other languages
Chinese (zh)
Other versions
CN112104459B (en
Inventor
丁正阳
徐超
李达
李萌
顾锡华
夏元轶
窦昊翔
吴小虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Electric Power Information Technology Co Ltd
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
Jiangsu Electric Power Information Technology Co Ltd
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Electric Power Information Technology Co Ltd, Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd filed Critical Jiangsu Electric Power Information Technology Co Ltd
Priority to CN202010945573.7A priority Critical patent/CN112104459B/en
Publication of CN112104459A publication Critical patent/CN112104459A/en
Application granted granted Critical
Publication of CN112104459B publication Critical patent/CN112104459B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an end-to-end key generation method based on channel fingerprints and auxiliary data, which comprises the following steps: a sending end generates a random key; the transmitting end traverses the channel characteristic data and judges whether the data falls into a quantization interval or not; the transmitting end quantizes the channel characteristic data by using a zero leakage quantization method; the sending end obtains an auxiliary data generating function, calculates an auxiliary data value and sends the auxiliary data value to the receiving end; the receiving end traverses the auxiliary data and restores the channel characteristic data; and the receiving end judges whether the restored channel characteristic data is equal to the channel characteristic data detected by the receiving end, if the restored channel characteristic data is equal to the channel characteristic data detected by the receiving end, the secret key is restored according to the maximum likelihood algorithm if the restored channel characteristic data is not equal to the channel characteristic data, and finally the generated secret key is obtained. The invention processes the channel characteristic data through the corresponding algorithm, generates the key, extracts the corresponding auxiliary data, enhances the key randomness and the consistency rate of the end-to-end communication equipment, and ensures higher communication safety.

Description

Key generation method based on channel fingerprints and auxiliary data
Technical Field
The invention relates to the field of information security, in particular to a key generation method based on channel fingerprints and auxiliary data.
Background
Wireless communication is increasingly applied to various industries, which brings high efficiency and convenience to daily life of people, but brings along with the safety problem which needs to be solved urgently. For example, wireless networks communicate by broadcasting, without a clear boundary, so that the content transmitted by the wireless networks is more easily intercepted, and the position where the wireless signals reach may be attacked; the network structure of wireless communication is often in dynamic change, and the difference of different network structures is large, so that the generated key is difficult to make centralized decision and management; the wireless communication terminal has mobility, physical defense measures such as a firewall and the like cannot be applied, once a wireless network is attacked, the position of an attacker is difficult to locate due to uncertainty of terminal movement, and the implementation difficulty of a security management scheme is high. Therefore, it is important to secure wireless communication.
The traditional security mechanism needs a fixed key management center to provide keys for both communication parties, however, since the openness, mobility and topology of the wireless network are often limited by dynamic changes, the wireless network has difficulty in managing and distributing keys through the fixed key management center. In recent years, in order to solve the problem of difficulty in key distribution in wireless networks, scholars have proposed a wireless physical layer key generation technique. The technology utilizes channel reciprocity to collect channel characteristics in coherent time to generate a key, avoids key distribution, has the characteristics of low calculation complexity and high safety, but the generated key is highly correlated with the channel characteristics and has low randomness. Therefore, the scholars propose a fuzzy extractor structure, which utilizes the auxiliary data to generate a secret key, can effectively enhance the randomness of the key and ensure the safety of wireless communication. However, the auxiliary data generated by the conventional fuzzy extractor is related to the key, and the key information is leaked, so that a new fuzzy extractor structure is urgently needed.
Disclosure of Invention
In view of the problems in the prior art, the present invention provides a key generation method based on channel fingerprint and auxiliary data. The structure of the traditional fuzzy extractor is improved by using symmetric encryption, error correcting codes and one-way hash functions, and the concept of zero-leakage auxiliary data is provided, so that the randomness and the consistency rate of keys are improved, and the safety of a communication system is ensured.
The purpose of the invention is realized by the following technical scheme:
a key generation method based on channel fingerprint and auxiliary data is characterized by comprising the following steps:
(1) generating a random key;
(2) the transmitting end traverses the channel characteristic data and judges whether the data falls into a quantization interval or not;
(3) the transmitting end quantizes the channel characteristic data by using a zero leakage quantization method;
(4) the sending end obtains an auxiliary data generating function, calculates an auxiliary data value and sends the auxiliary data value to the receiving end;
(5) the receiving end traverses the auxiliary data and restores the channel characteristic data;
(6) and the receiving end judges whether the restored channel characteristic data is equal to the channel characteristic data detected by the receiving end, if the restored channel characteristic data is equal to the channel characteristic data detected by the receiving end, the secret key is restored according to the maximum likelihood algorithm if the restored channel characteristic data is not equal to the channel characteristic data, and finally the generated secret key is obtained.
Further, the random key in step (1) is generated by using an RNG random number generator.
Further, the quantization interval in the step (2) is calculated according to quantiles.
Further, the zero-leakage quantization method in step (3) requires that the receiving end receives the auxiliary data to recover the secret key, but the eavesdropper cannot recover the secret key even if the eavesdropper intercepts the auxiliary data.
Further, in step (4), the auxiliary data generating function monotonically increases in each quantization interval, and any output value in each quantization interval has a variable corresponding to it, so that the cumulative distribution function of the channel characteristic data is selected as the auxiliary data generating function.
Further, in the step (5), the channel characteristic data is obtained by performing inverse function reduction on the auxiliary data generating function, is an estimated value, and is slightly different from the channel characteristic data measured by the receiving end.
Further, if the restored channel characteristic data is equal to the channel characteristic data detected by the user, directly restoring the secret key according to the located quantization interval in the step (6); if not, the key needs to be restored by using a maximum likelihood algorithm, i.e. the probability of which quantization interval the helper data falls in is the greatest.
The invention improves the structure of the traditional fuzzy extractor by utilizing symmetric encryption, error correcting codes and one-way hash functions, provides a concept of zero-leakage auxiliary data, and further improves the recovery success rate and the safety of the secret key. The key generation technology uses an error correcting code to improve the reliability of key reduction, thereby improving the information entropy of the key and enhancing the randomness of the key.
Compared with the prior art, the invention has the beneficial effects that:
when the continuous source contains sensitive information, the generated secret key can not leak the sensitive information of the continuous source, the privacy of the continuous source is protected, and meanwhile, a specific continuous source can generate a random secret key. In addition, the key generation method uses the error correcting code to improve the reliability of key reduction, thereby improving the information entropy of the key and enhancing the randomness of the key. Since the auxiliary data and the key are irrelevant, the key cannot be restored even if the auxiliary data transmitted in the channel is intercepted by an eavesdropper, and the communication safety of both communication parties is further ensured.
Experiments show that compared with the existing continuous source key generation technical method, the method of the invention can further improve the randomness of the key and the reliability of the reduction.
Drawings
FIG. 1 is a flow chart of a method of the present invention;
FIG. 2 is a graph of bit error rate for different variance, key bit numbers using the method of the present invention and other methods that do not use zero-leakage auxiliary data;
fig. 3 is a graph of the key agreement rate for recovering different numbers of bits after eavesdropping on the helper data using the method of the present invention.
Detailed Description
A key generation method based on channel fingerprint and auxiliary data, as shown in fig. 1, includes the following steps:
(1) generating a random key;
in specific implementation, the key is generated by the RNG random number generator and is used for encrypting the communication system.
(2) The transmitting end traverses the channel characteristic data and judges whether the data falls into a quantization interval or not;
in this embodiment, the transmitting end sequentially traverses the acquired channel characteristic data; the quantization interval is
Figure BDA0002675199740000031
In the formula, s is the number of key bits,
Figure BDA0002675199740000032
distribution function, p, representing channel characteristic datat=1/t。
(3) The transmitting end quantizes the channel characteristic data by using a zero leakage quantization method;
in a specific implementation, the step (3) specifically includes whether the currently traversed channel feature data falls into a quantization interval represented by the key, and if the currently traversed channel feature data falls into the quantization interval, the currently traversed channel feature data is quantized into a corresponding quantization value, and if the currently traversed channel feature data does not fall into the quantization interval, the currently traversed channel feature data is discarded.
(4) The sending end obtains an auxiliary data generating function, calculates an auxiliary data value and sends the auxiliary data value to the receiving end;
step (4) specifically assumes that the auxiliary data generating function g is in each quantization region AsLi monotonically increasing, g (x)s)=g(xt)=w,xsAnd xtRespectively belong to different quantization regions
Figure BDA0002675199740000033
Figure BDA0002675199740000034
The auxiliary data generating function g is then defined in a simple manner:
Figure BDA0002675199740000035
and the channel characteristic data is sequentially brought into an auxiliary data generating function to obtain auxiliary data, and then the auxiliary data is sent to a receiving end.
(5) The receiving end traverses the auxiliary data and restores the channel characteristic data;
the step (5) specifically includes that the receiving end brings the received auxiliary data value into an inverse function of an auxiliary data generation function to obtain channel characteristic data, and the specific steps are as follows:
x=g-1(w)
(6) the receiving end judges whether the restored channel characteristic data is equal to the self detection data or not, if the restored channel characteristic data is equal to the self detection data, the secret key is restored directly, and if the restored channel characteristic data is not equal to the self detection data, the secret key is restored according to a maximum likelihood algorithm, and finally the generated secret key is obtained;
the step (6) specifically comprises, according to a maximum likelihood algorithm:
Figure BDA0002675199740000036
to simplify the process of recovering the key, a threshold τ is definedsIf τ iss≤y≤τs+1Then reconstruct
Figure BDA0002675199740000041
Knowing tau0Infinity and τNInfinity. According to a defined noise model, symmetrical attenuationWeak noise
Figure BDA0002675199740000042
Is a monotonically decreasing function with point y ═ τsThe probability of being reduced at the boundary of the s and s-1 regions is equal, i.e.
Figure BDA0002675199740000043
Because of the fact that
Figure BDA0002675199740000044
So the threshold τsCan be obtained by the following formula:
Figure BDA0002675199740000045
the attenuation parameter lambda is normally assumed to be 1. For a key s with a bit number of 1, e.g. N-2, zero-leakage assistance data is reduced to calculate a single threshold τ1Calculated threshold τ1No information about the key is revealed. When the continuous source mean is 0, the threshold τ may be assumed1When the channel characteristic measurement value Y is negative, it is quantized to key 0, and when it is positive, it is quantized to key 1, and the restoration process is completed.
FIG. 2 is a graph of bit error rate for different variance, key bit numbers using the method of the present invention and other methods that do not use zero-leakage auxiliary data; fig. 3 is a graph of the key agreement rate for recovering different numbers of bits after eavesdropping on the helper data using the method of the present invention.
By the method, the zero-leakage auxiliary data is used for key agreement, the randomness of the key and the success rate of key restoration can be well improved, and information leakage can be better prevented and controlled to an eavesdropper.
The above disclosure is only illustrative of the preferred embodiments of the present invention, and should not be taken as limiting the scope of the invention, which is defined by the appended claims.

Claims (9)

1. A key generation method based on channel fingerprint and auxiliary data is characterized by comprising the following steps:
(1) generating a random key;
(2) the transmitting end traverses the channel characteristic data and judges whether the data falls into a quantization interval or not;
(3) the transmitting end quantizes the channel characteristic data by using a zero leakage quantization method;
(4) the sending end obtains an auxiliary data generating function, calculates an auxiliary data value and sends the auxiliary data value to the receiving end;
(5) the receiving end traverses the auxiliary data and restores the channel characteristic data;
(6) and the receiving end judges whether the restored channel characteristic data is equal to the channel characteristic data detected by the receiving end, if the restored channel characteristic data is equal to the channel characteristic data detected by the receiving end, the secret key is restored according to the maximum likelihood algorithm if the restored channel characteristic data is not equal to the channel characteristic data, and finally the generated secret key is obtained.
2. The method of claim 1, wherein the channel fingerprint and helper data based key generation method comprises: the random key in step (1) is generated by using an RNG random number generator.
3. The method of claim 1, wherein the channel fingerprint and helper data based key generation method comprises: calculating the quantization interval in the step (2) according to quantiles; the quantization interval is:
Figure FDA0002675199730000011
in the formula, s is the number of key bits,
Figure FDA0002675199730000015
distribution function, p, representing channel characteristic datat=1/t。
4. The method of claim 1, wherein the channel fingerprint and helper data based key generation method comprises: in the zero-leakage quantization method in step (3), the key can be restored after the receiving end receives the auxiliary data, but the key cannot be restored even if the eavesdropper intercepts the auxiliary data.
5. The method of claim 1, wherein the channel fingerprint and helper data based key generation method comprises: in the step (4), the auxiliary data generating function is monotonically increased in each quantization interval, and any output value in each quantization interval has a variable corresponding to the output value, so that the cumulative distribution function of the channel characteristic data is selected as the auxiliary data generating function.
6. The method of claim 5, wherein the channel fingerprint and the helper data are based on: the auxiliary data are obtained as follows: let it be assumed that the auxiliary data generating function g is in each quantization region AsLi monotonically increasing, g (x)s)=g(xt)=w,xsAnd xtRespectively belong to different quantization regions
Figure FDA0002675199730000012
Figure FDA0002675199730000013
The auxiliary data generating function g is then defined in a simple manner:
Figure FDA0002675199730000014
and the channel characteristic data is sequentially brought into an auxiliary data generating function to obtain auxiliary data.
7. The method of claim 1, wherein the channel fingerprint and helper data based key generation method comprises: the channel characteristic data in the step (5) is obtained by the inverse function reduction of the auxiliary data generating function, is an estimated value, and is slightly different from the channel characteristic data measured by the receiving end.
8. The method of claim 1, wherein the channel fingerprint and helper data based key generation method comprises: if the restored channel characteristic data is equal to the channel characteristic data detected by the user, directly restoring the secret key according to the quantization interval where the data is located in the step (6); if not, the key is restored using a maximum likelihood algorithm, i.e. the probability of which quantization interval the helper data falls within is the greatest.
9. The method of claim 8, wherein the channel fingerprint and the helper data are based on: the step (6) specifically comprises, according to a maximum likelihood algorithm:
Figure FDA0002675199730000021
to simplify the process of recovering the key, a threshold τ is definedsIf τ iss≤y≤τs+1Then reconstruct
Figure FDA0002675199730000022
Knowing tau0Infinity and τNInfinity. Symmetrical attenuating noise according to a defined noise model
Figure FDA0002675199730000023
Figure FDA0002675199730000024
Is a monotonically decreasing function with point y ═ τsThe probability of being reduced at the boundary of the s and s-1 regions is equal, i.e.
Figure FDA0002675199730000025
Because of the fact that
Figure FDA0002675199730000026
Therefore, it is not only easy to useThreshold τsCan be obtained by the following formula:
Figure FDA0002675199730000027
the attenuation parameter λ is normally assumed to be 1; for a key s with a bit number of 1, e.g. N-2, zero-leakage assistance data is reduced to calculate a single threshold τ1Calculated threshold τ1Will not reveal any information about the key; when the continuous source mean is 0, the threshold τ may be assumed1When the channel characteristic measurement value Y is negative, it is quantized to key 0, and when it is positive, it is quantized to key 1, and the restoration process is completed.
CN202010945573.7A 2020-09-10 2020-09-10 Key generation method based on channel fingerprint and auxiliary data Active CN112104459B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010945573.7A CN112104459B (en) 2020-09-10 2020-09-10 Key generation method based on channel fingerprint and auxiliary data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010945573.7A CN112104459B (en) 2020-09-10 2020-09-10 Key generation method based on channel fingerprint and auxiliary data

Publications (2)

Publication Number Publication Date
CN112104459A true CN112104459A (en) 2020-12-18
CN112104459B CN112104459B (en) 2023-05-12

Family

ID=73751345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010945573.7A Active CN112104459B (en) 2020-09-10 2020-09-10 Key generation method based on channel fingerprint and auxiliary data

Country Status (1)

Country Link
CN (1) CN112104459B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103583013A (en) * 2011-06-02 2014-02-12 三菱电机株式会社 Key information generation device and key information generation method
CN104704768A (en) * 2012-10-04 2015-06-10 本质Id有限责任公司 System for generating a cryptographic key from a memory used as a physically unclonable function
CN105120453A (en) * 2015-07-15 2015-12-02 中国科学院信息工程研究所 Secret key generation method
WO2015180867A1 (en) * 2014-05-30 2015-12-03 Siemens Aktiengesellschaft Production of a cryptographic key
CN106059758A (en) * 2016-07-08 2016-10-26 大连理工大学 Key generation method capable of ensuring security of wireless communication
CN106102055A (en) * 2016-07-11 2016-11-09 西安电子科技大学 The wireless channel key generation method of feature based distribution transformation
CN106102052A (en) * 2016-03-01 2016-11-09 南京邮电大学 A kind of two dimensional wireless physical layer key generation method of combined channel amplitude and phase place
CN106209355A (en) * 2016-06-29 2016-12-07 北京理工大学 A kind of radio communication key generation method based on channel characteristics parameter
US20170338956A1 (en) * 2016-05-20 2017-11-23 Qatar University Method for generating a secret key for encrypted wireless communications
CN108366370A (en) * 2018-02-02 2018-08-03 东南大学 Quantify the information transferring method of privately owned asymmetric key based on radio channel characteristic
CN109787757A (en) * 2019-01-18 2019-05-21 浙江机电职业技术学院 A kind of non-uniform quantizing method in physical layer key generation process
CN111148099A (en) * 2020-01-02 2020-05-12 燕山大学 Side channel key generation method, device and communication system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103583013A (en) * 2011-06-02 2014-02-12 三菱电机株式会社 Key information generation device and key information generation method
CN104704768A (en) * 2012-10-04 2015-06-10 本质Id有限责任公司 System for generating a cryptographic key from a memory used as a physically unclonable function
WO2015180867A1 (en) * 2014-05-30 2015-12-03 Siemens Aktiengesellschaft Production of a cryptographic key
CN105120453A (en) * 2015-07-15 2015-12-02 中国科学院信息工程研究所 Secret key generation method
CN106102052A (en) * 2016-03-01 2016-11-09 南京邮电大学 A kind of two dimensional wireless physical layer key generation method of combined channel amplitude and phase place
US20170338956A1 (en) * 2016-05-20 2017-11-23 Qatar University Method for generating a secret key for encrypted wireless communications
CN106209355A (en) * 2016-06-29 2016-12-07 北京理工大学 A kind of radio communication key generation method based on channel characteristics parameter
CN106059758A (en) * 2016-07-08 2016-10-26 大连理工大学 Key generation method capable of ensuring security of wireless communication
CN106102055A (en) * 2016-07-11 2016-11-09 西安电子科技大学 The wireless channel key generation method of feature based distribution transformation
CN108366370A (en) * 2018-02-02 2018-08-03 东南大学 Quantify the information transferring method of privately owned asymmetric key based on radio channel characteristic
CN109787757A (en) * 2019-01-18 2019-05-21 浙江机电职业技术学院 A kind of non-uniform quantizing method in physical layer key generation process
CN111148099A (en) * 2020-01-02 2020-05-12 燕山大学 Side channel key generation method, device and communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赖凤麟等: "一种OFDM系统信道密钥生成方法", 《电讯技术》 *

Also Published As

Publication number Publication date
CN112104459B (en) 2023-05-12

Similar Documents

Publication Publication Date Title
Shanmugam et al. Adaptive synchronization of reaction–diffusion neural networks and its application to secure communication
CN113434873A (en) Federal learning privacy protection method based on homomorphic encryption
CN109756893B (en) Chaos mapping-based crowd sensing Internet of things anonymous user authentication method
Zhu et al. Using wireless link dynamics to extract a secret key in vehicular scenarios
CN110493010B (en) Mail receiving and sending method of mail system based on quantum digital signature
CN108599934B (en) Verifiable security and confidentiality enhancement method for quantum key distribution
KR20180129871A (en) Secret key estimation methods and devices
US20170048064A1 (en) Method for generating a secret between users of a network, and users of the network which are configured for this purpose
Sudarsono et al. A reciprocity approach for shared secret key generation extracted from received signal strength in the wireless networks
CN111581648B (en) Method of federal learning to preserve privacy in irregular users
CN113382016A (en) Fault-tolerant safe lightweight data aggregation method under intelligent power grid environment
CN112104459B (en) Key generation method based on channel fingerprint and auxiliary data
CN110753342B (en) Body area network equipment authentication and key agreement method based on channel characteristics
An et al. A tag-based PHY-layer authentication scheme without key distribution
CN108882236B (en) Physical layer signal watermark embedding method based on S transformation
Benamara et al. A new distribution version of Boneh-Goh-Nissim cryptosystem: Security and performance analysis
Zenger et al. On-line entropy estimation for secure information reconciliation
Alvarez et al. Cryptographic requirements for chaotic secure communications
CN114390518A (en) Encryption method, device, equipment and storage medium
Zhang et al. Efficient cloud-based private set intersection protocol with hidden access attribute and integrity verification
Abduljabbar et al. Robust scheme to protect authentication code of message/image documents in cloud computing
CN111698285A (en) Contract storage device and method based on block chain and storage medium
Keming et al. Research on Physical Layer Key Generation Based on Wireless Channel Characteristics in New Power System
Nedjah et al. Computational intelligence in information assurance and security
Sharifian et al. Post-quantum security using channel noise

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant