WO2006081122A2 - Method and system for deriving an encryption key using joint randomness not shared by others - Google Patents
Method and system for deriving an encryption key using joint randomness not shared by others Download PDFInfo
- Publication number
- WO2006081122A2 WO2006081122A2 PCT/US2006/001839 US2006001839W WO2006081122A2 WO 2006081122 A2 WO2006081122 A2 WO 2006081122A2 US 2006001839 W US2006001839 W US 2006001839W WO 2006081122 A2 WO2006081122 A2 WO 2006081122A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- wtru
- node
- secret
- bits
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0875—Generation of secret information including derivation or calculation of cryptographic keys or passwords based on channel impulse response [CIR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MX2007009063A MX2007009063A (en) | 2005-01-27 | 2006-01-19 | Method and system for deriving an encryption key using joint randomness not shared by others. |
EP06718847A EP1847060A4 (en) | 2005-01-27 | 2006-01-19 | Method and system for deriving an encryption key using joint randomness not shared by others |
CA2596067A CA2596067C (en) | 2005-01-27 | 2006-01-19 | Method and system for deriving an encryption key using joint randomness not shared by others |
KR1020077018514A KR101253370B1 (en) | 2005-01-27 | 2006-01-19 | Method and system for deriving an encryption key using joint randomness not shared by others |
JP2007553138A JP4734344B2 (en) | 2005-01-27 | 2006-01-19 | Method and system for deriving encryption key using joint randomness (JRNSO) not shared with others |
NO20074210A NO20074210L (en) | 2005-01-27 | 2007-08-16 | Method and system for deriving an encryption key using common randomness not shared with others |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US64748205P | 2005-01-27 | 2005-01-27 | |
US60/647,482 | 2005-01-27 | ||
US71617705P | 2005-09-12 | 2005-09-12 | |
US60/716,177 | 2005-09-12 | ||
US73433105P | 2005-11-07 | 2005-11-07 | |
US60/734,331 | 2005-11-07 | ||
US11/318,381 US8280046B2 (en) | 2005-09-12 | 2005-12-23 | Method and system for deriving an encryption key using joint randomness not shared by others |
US11/318,381 | 2005-12-23 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006081122A2 true WO2006081122A2 (en) | 2006-08-03 |
WO2006081122A3 WO2006081122A3 (en) | 2007-11-22 |
Family
ID=36740955
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/001839 WO2006081122A2 (en) | 2005-01-27 | 2006-01-19 | Method and system for deriving an encryption key using joint randomness not shared by others |
Country Status (9)
Country | Link |
---|---|
EP (1) | EP1847060A4 (en) |
JP (1) | JP4734344B2 (en) |
KR (3) | KR101011470B1 (en) |
CN (1) | CN101951383B (en) |
CA (1) | CA2596067C (en) |
MX (1) | MX2007009063A (en) |
NO (1) | NO20074210L (en) |
TW (2) | TWI404393B (en) |
WO (1) | WO2006081122A2 (en) |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007124054A3 (en) * | 2006-04-18 | 2007-12-27 | Interdigital Tech Corp | Method and system for securing wireless communications |
GB2447674A (en) * | 2007-03-21 | 2008-09-24 | Lancaster University | Using environmental data to generate a cryptographic key |
WO2009014063A1 (en) * | 2007-07-20 | 2009-01-29 | Nec Corporation | Encrypted communication method and encrypted communication system |
WO2009061962A2 (en) | 2007-11-06 | 2009-05-14 | Interdigital Patent Holdings, Inc. | Method and apparatus for enabling physical layer secret key generation |
WO2010006035A2 (en) * | 2008-07-08 | 2010-01-14 | Interdigital Patent Holdings, Inc. | Support of physical layer security in wireless local area networks |
JP2010504695A (en) * | 2006-09-21 | 2010-02-12 | インターデイジタル テクノロジー コーポレーション | Generation of private key for group |
JP2010507276A (en) * | 2006-10-12 | 2010-03-04 | インターデイジタル テクノロジー コーポレーション | Method and system for improving encryption capability of wireless devices using broadcast random noise |
JP2010525764A (en) * | 2007-04-26 | 2010-07-22 | クゥアルコム・インコーポレイテッド | Method and apparatus for derivation of a new key during handoff in a wireless network |
JP2011520405A (en) * | 2008-05-12 | 2011-07-14 | インターデイジタル パテント ホールディングス インコーポレイテッド | Generation of information-theoretically secure confidentiality |
EP2533458A1 (en) * | 2011-06-07 | 2012-12-12 | Commissariat à l'Énergie Atomique et aux Énergies Alternatives | Method of generating a secret key for a wireless communication system |
KR101269026B1 (en) * | 2011-12-21 | 2013-05-29 | 한국전자통신연구원 | Apparatus and method for group key generation using wireless channel status |
DE102014208975A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | A method for generating a key in a network and subscribers to a network and network |
DE102014209046A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | A method for generating a secret, cryptographic key in a mobile terminal |
DE102014208964A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Method for generating a key in a network as well as network subscribers established for this purpose |
DE102014208965A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Method for authenticating a network participant and network participant, network and computer program for this purpose |
DE102014208974A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Method for determining information about the distance between two devices and devices and computer programs set up for this purpose |
DE102014217320A1 (en) | 2014-08-29 | 2016-03-03 | Robert Bosch Gmbh | Method for generating a cryptographic key in a device and device set up for this purpose |
DE102014217330A1 (en) | 2014-08-29 | 2016-03-03 | Robert Bosch Gmbh | Method for comparing information between devices and device set up for this purpose |
DE102015215569A1 (en) | 2015-08-14 | 2017-02-16 | Robert Bosch Gmbh | Method for generating a secret between subscribers of a network and subscribers of the network established for this purpose |
WO2017063716A1 (en) * | 2015-10-16 | 2017-04-20 | Huawei Technologies Co., Ltd. | Secure paring method for mimo systems |
DE102015225222A1 (en) | 2015-12-15 | 2017-06-22 | Robert Bosch Gmbh | Method for generating a secret sequence of values in a device depending on measured physical properties of a transmission channel |
DE102015225220A1 (en) | 2015-12-15 | 2017-06-22 | Robert Bosch Gmbh | Method for generating a secret sequence of values in a device depending on measured physical properties of a transmission channel |
FR3046315A1 (en) * | 2015-12-29 | 2017-06-30 | Thales Sa | METHOD OF UNIVALENT AND UNIVERSAL EXTRACTION OF KEYS FROM THE PROPAGATION CHANNEL |
WO2019173779A1 (en) * | 2018-03-08 | 2019-09-12 | FHOOSH, Inc. | Systems and methods for secure storage and transmission of a data stream |
EP3103241B1 (en) * | 2014-02-07 | 2020-01-08 | The Boeing Company | Method and system for securely establishing cryptographic keys for aircraft-to-aircraft communications |
US10572682B2 (en) | 2014-09-23 | 2020-02-25 | Ubiq Security, Inc. | Secure high speed data storage, access, recovery, and transmission of an obfuscated data locator |
US10579823B2 (en) | 2014-09-23 | 2020-03-03 | Ubiq Security, Inc. | Systems and methods for secure high speed data generation and access |
US10614099B2 (en) | 2012-10-30 | 2020-04-07 | Ubiq Security, Inc. | Human interactions for populating user information on electronic forms |
WO2020079284A1 (en) * | 2018-10-19 | 2020-04-23 | National University Of Ireland, Maynooth | Encryption method |
EP3697052A1 (en) * | 2019-02-14 | 2020-08-19 | Siemens Aktiengesellschaft | Method and system for transfer of data in a network |
WO2023287537A1 (en) * | 2021-07-16 | 2023-01-19 | Qualcomm Incorporated | Secret key verification in wireless communication |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9198033B2 (en) * | 2007-09-27 | 2015-11-24 | Alcatel Lucent | Method and apparatus for authenticating nodes in a wireless network |
US20140269362A1 (en) * | 2013-03-15 | 2014-09-18 | Shahrnaz Azizi | Techniques to Update a Wireless Communication Channel Estimation |
KR20180097903A (en) | 2017-02-24 | 2018-09-03 | 삼성전자주식회사 | Apparatus and method for generating secure key in wireless communication system |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0301282A1 (en) * | 1987-07-31 | 1989-02-01 | BBC Brown Boveri AG | Signal transmission method |
US5450456A (en) * | 1993-11-12 | 1995-09-12 | Daimler Benz Ag | Method and arrangement for measuring the carrier frequency deviation in a multi-channel transmission system |
EP0767543A3 (en) * | 1995-10-06 | 2000-07-26 | Siemens Aktiengesellschaft | Code division multiplex communication with interference suppression |
US5745578A (en) * | 1996-06-17 | 1998-04-28 | Ericsson Inc. | Apparatus and method for secure communication based on channel characteristics |
JP2006180549A (en) * | 2002-02-28 | 2006-07-06 | Matsushita Electric Ind Co Ltd | Communication apparatus and communication method |
JP2004032679A (en) * | 2002-02-28 | 2004-01-29 | Matsushita Electric Ind Co Ltd | Communication apparatus and communication system |
JP2003273856A (en) * | 2002-03-14 | 2003-09-26 | Communication Research Laboratory | Communication apparatus and communication method |
JP4245972B2 (en) * | 2002-05-29 | 2009-04-02 | Nttエレクトロニクス株式会社 | Wireless communication method, wireless communication device, communication control program, communication control device, key management program, wireless LAN system, and recording medium |
US7587598B2 (en) * | 2002-11-19 | 2009-09-08 | Toshiba America Research, Inc. | Interlayer fast authentication or re-authentication for network communication |
JP2004187197A (en) * | 2002-12-06 | 2004-07-02 | Doshisha | Radio communication system, radio communication method and radio station |
JP2004208073A (en) * | 2002-12-25 | 2004-07-22 | Sony Corp | Radio communication system |
JP2005130127A (en) * | 2003-10-22 | 2005-05-19 | Sumitomo Electric Ind Ltd | Confidential communication method and communication terminal |
US7505596B2 (en) * | 2003-12-05 | 2009-03-17 | Microsoft Corporation | Automatic detection of wireless network type |
WO2006011345A1 (en) * | 2004-07-29 | 2006-02-02 | Matsushita Electric Industrial Co., Ltd. | Wireless communication apparatus and wireless communication method |
JPWO2006013699A1 (en) * | 2004-08-04 | 2008-05-01 | 松下電器産業株式会社 | Wireless communication apparatus, wireless communication system, and wireless communication method |
EP1764946A1 (en) * | 2004-08-04 | 2007-03-21 | Matsushita Electric Industrial Co., Ltd. | Radio communication method, radio communication system, and radio communication device |
-
2006
- 2006-01-19 KR KR1020077018125A patent/KR101011470B1/en not_active IP Right Cessation
- 2006-01-19 CA CA2596067A patent/CA2596067C/en not_active Expired - Fee Related
- 2006-01-19 JP JP2007553138A patent/JP4734344B2/en not_active Expired - Fee Related
- 2006-01-19 EP EP06718847A patent/EP1847060A4/en not_active Withdrawn
- 2006-01-19 MX MX2007009063A patent/MX2007009063A/en not_active Application Discontinuation
- 2006-01-19 WO PCT/US2006/001839 patent/WO2006081122A2/en active Application Filing
- 2006-01-19 KR KR1020077018514A patent/KR101253370B1/en not_active IP Right Cessation
- 2006-01-19 CN CN2010102981704A patent/CN101951383B/en not_active Expired - Fee Related
- 2006-01-19 KR KR1020117010823A patent/KR20110076992A/en not_active Application Discontinuation
- 2006-01-20 TW TW095128389A patent/TWI404393B/en not_active IP Right Cessation
- 2006-01-20 TW TW095102241A patent/TWI378701B/en not_active IP Right Cessation
-
2007
- 2007-08-16 NO NO20074210A patent/NO20074210L/en not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
See references of EP1847060A4 * |
Cited By (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007124054A3 (en) * | 2006-04-18 | 2007-12-27 | Interdigital Tech Corp | Method and system for securing wireless communications |
US7991160B2 (en) | 2006-04-18 | 2011-08-02 | Interdigital Technology Corporation | Method and system for securing wireless communications |
JP2010504695A (en) * | 2006-09-21 | 2010-02-12 | インターデイジタル テクノロジー コーポレーション | Generation of private key for group |
US9036821B2 (en) | 2006-10-12 | 2015-05-19 | Interdigital Technology Corporation | Method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise |
US8634558B2 (en) | 2006-10-12 | 2014-01-21 | Interdigital Technology Corporation | Method and system for enhancing crytographic capabilities of a wireless device using broadcasted random noise |
US8254574B2 (en) | 2006-10-12 | 2012-08-28 | Interdigital Technology Corporation | Method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise |
JP2010507276A (en) * | 2006-10-12 | 2010-03-04 | インターデイジタル テクノロジー コーポレーション | Method and system for improving encryption capability of wireless devices using broadcast random noise |
GB2447674B (en) * | 2007-03-21 | 2011-08-03 | Lancaster University | Generation of a cryptographic key from device motion |
GB2447674A (en) * | 2007-03-21 | 2008-09-24 | Lancaster University | Using environmental data to generate a cryptographic key |
US10412583B2 (en) | 2007-04-26 | 2019-09-10 | Qualcomm Incorporated | Method and apparatus for new key derivation upon handoff in wireless networks |
JP2010525764A (en) * | 2007-04-26 | 2010-07-22 | クゥアルコム・インコーポレイテッド | Method and apparatus for derivation of a new key during handoff in a wireless network |
US10085148B2 (en) | 2007-04-26 | 2018-09-25 | Qualcomm Incorporate | Method and apparatus for new key derivation upon handoff in wireless networks |
US10091648B2 (en) | 2007-04-26 | 2018-10-02 | Qualcomm Incorporated | Method and apparatus for new key derivation upon handoff in wireless networks |
WO2009014063A1 (en) * | 2007-07-20 | 2009-01-29 | Nec Corporation | Encrypted communication method and encrypted communication system |
JP2011504014A (en) * | 2007-11-06 | 2011-01-27 | インターデイジタル パテント ホールディングス インコーポレイテッド | Method and apparatus enabling physical layer secret key generation |
US9490977B2 (en) | 2007-11-06 | 2016-11-08 | Interdigital Patent Holdings, Inc. | Method and apparatus for enabling physical layer secret key generation |
WO2009061962A3 (en) * | 2007-11-06 | 2009-06-25 | Interdigital Patent Holdings | Method and apparatus for enabling physical layer secret key generation |
WO2009061962A2 (en) | 2007-11-06 | 2009-05-14 | Interdigital Patent Holdings, Inc. | Method and apparatus for enabling physical layer secret key generation |
CN101933285B (en) * | 2007-11-06 | 2013-01-02 | 交互数字专利控股公司 | Method and apparatus for enabling physical layer secret key generation |
JP2011520405A (en) * | 2008-05-12 | 2011-07-14 | インターデイジタル パテント ホールディングス インコーポレイテッド | Generation of information-theoretically secure confidentiality |
US9807606B2 (en) | 2008-05-12 | 2017-10-31 | Interdigital Patent Holdings, Inc. | Information-theoretically secure secrecy generation |
US8842826B2 (en) | 2008-05-12 | 2014-09-23 | Interdigital Patent Holdings, Inc. | Information-theoretically secure secrecy generation |
WO2010006035A3 (en) * | 2008-07-08 | 2010-03-04 | Interdigital Patent Holdings, Inc. | Support of physical layer security in wireless local area networks |
WO2010006035A2 (en) * | 2008-07-08 | 2010-01-14 | Interdigital Patent Holdings, Inc. | Support of physical layer security in wireless local area networks |
US8433894B2 (en) | 2008-07-08 | 2013-04-30 | Interdigital Patent Holdings, Inc. | Support of physical layer security in wireless local area networks |
US8862884B2 (en) | 2011-06-07 | 2014-10-14 | Commissariat à l'énergie atomique et aux énergies alternatives | Method of generation of a secret key for a wireless communication system |
FR2976431A1 (en) * | 2011-06-07 | 2012-12-14 | Commissariat Energie Atomique | SECRET KEY GENERATION METHOD FOR WIRELESS COMMUNICATION SYSTEM |
EP2533458A1 (en) * | 2011-06-07 | 2012-12-12 | Commissariat à l'Énergie Atomique et aux Énergies Alternatives | Method of generating a secret key for a wireless communication system |
US8976962B2 (en) | 2011-12-21 | 2015-03-10 | Electronics And Telecommunications Research Institute | Apparatus and method for generating group key using status of wireless channel |
KR101269026B1 (en) * | 2011-12-21 | 2013-05-29 | 한국전자통신연구원 | Apparatus and method for group key generation using wireless channel status |
US10635692B2 (en) | 2012-10-30 | 2020-04-28 | Ubiq Security, Inc. | Systems and methods for tracking, reporting, submitting and completing information forms and reports |
US10614099B2 (en) | 2012-10-30 | 2020-04-07 | Ubiq Security, Inc. | Human interactions for populating user information on electronic forms |
EP3103241B1 (en) * | 2014-02-07 | 2020-01-08 | The Boeing Company | Method and system for securely establishing cryptographic keys for aircraft-to-aircraft communications |
DE102014208965A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Method for authenticating a network participant and network participant, network and computer program for this purpose |
US9571277B2 (en) | 2014-05-13 | 2017-02-14 | Robert Bosch Gmbh | Method for generating a key in a network and user on a network and network |
DE102014208964A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Method for generating a key in a network as well as network subscribers established for this purpose |
DE102014208975A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | A method for generating a key in a network and subscribers to a network and network |
DE102014209046A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | A method for generating a secret, cryptographic key in a mobile terminal |
DE102014208974A1 (en) | 2014-05-13 | 2015-11-19 | Robert Bosch Gmbh | Method for determining information about the distance between two devices and devices and computer programs set up for this purpose |
US9716588B2 (en) | 2014-05-13 | 2017-07-25 | Robert Bosch Gmbh | Method for generating a key in a network and users configured for this purpose |
DE102014217320A1 (en) | 2014-08-29 | 2016-03-03 | Robert Bosch Gmbh | Method for generating a cryptographic key in a device and device set up for this purpose |
DE102014217330A1 (en) | 2014-08-29 | 2016-03-03 | Robert Bosch Gmbh | Method for comparing information between devices and device set up for this purpose |
US10657283B2 (en) | 2014-09-23 | 2020-05-19 | Ubiq Security, Inc. | Secure high speed data storage, access, recovery, transmission, and retrieval from one or more of a plurality of physical storage locations |
US10572682B2 (en) | 2014-09-23 | 2020-02-25 | Ubiq Security, Inc. | Secure high speed data storage, access, recovery, and transmission of an obfuscated data locator |
US10657284B2 (en) | 2014-09-23 | 2020-05-19 | Ubiq Security, Inc. | Secure high speed data storage, access, recovery, and transmission |
US10579823B2 (en) | 2014-09-23 | 2020-03-03 | Ubiq Security, Inc. | Systems and methods for secure high speed data generation and access |
DE102015215569A1 (en) | 2015-08-14 | 2017-02-16 | Robert Bosch Gmbh | Method for generating a secret between subscribers of a network and subscribers of the network established for this purpose |
US10396986B2 (en) | 2015-08-14 | 2019-08-27 | Robert Bosch Gmbh | Method for generating a secret between users of a network, and users of the network which are configured for this purpose |
WO2017063716A1 (en) * | 2015-10-16 | 2017-04-20 | Huawei Technologies Co., Ltd. | Secure paring method for mimo systems |
US10111091B2 (en) | 2015-12-15 | 2018-10-23 | Robert Bosch Gmbh | Method for generating a secret sequence of values in a device as a function of measured physical properties of a transmission channel |
US10075294B2 (en) | 2015-12-15 | 2018-09-11 | Robert Bosch Gmbh | Method for generating a secret sequence of values in a device as a function of measured physical properties of a transmission channel |
DE102015225220A1 (en) | 2015-12-15 | 2017-06-22 | Robert Bosch Gmbh | Method for generating a secret sequence of values in a device depending on measured physical properties of a transmission channel |
DE102015225222A1 (en) | 2015-12-15 | 2017-06-22 | Robert Bosch Gmbh | Method for generating a secret sequence of values in a device depending on measured physical properties of a transmission channel |
FR3046315A1 (en) * | 2015-12-29 | 2017-06-30 | Thales Sa | METHOD OF UNIVALENT AND UNIVERSAL EXTRACTION OF KEYS FROM THE PROPAGATION CHANNEL |
WO2017114920A1 (en) * | 2015-12-29 | 2017-07-06 | Thales | Process for monovalent one-to-one extraction of keys from the propagation channel |
WO2019173779A1 (en) * | 2018-03-08 | 2019-09-12 | FHOOSH, Inc. | Systems and methods for secure storage and transmission of a data stream |
US11349656B2 (en) | 2018-03-08 | 2022-05-31 | Ubiq Security, Inc. | Systems and methods for secure storage and transmission of a data stream |
WO2020079284A1 (en) * | 2018-10-19 | 2020-04-23 | National University Of Ireland, Maynooth | Encryption method |
US11799646B2 (en) | 2018-10-19 | 2023-10-24 | National University Of Ireland, Maynooth | Encryption method |
WO2020164927A1 (en) | 2019-02-14 | 2020-08-20 | Siemens Aktiengesellschaft | Method and system for transmitting data in a network |
CN113383530A (en) * | 2019-02-14 | 2021-09-10 | 西门子股份公司 | Method and system for transmitting data in a network |
EP3697052A1 (en) * | 2019-02-14 | 2020-08-19 | Siemens Aktiengesellschaft | Method and system for transfer of data in a network |
CN113383530B (en) * | 2019-02-14 | 2022-10-14 | 西门子股份公司 | Method, computer-readable storage medium, and system for transmitting data in a network |
WO2023287537A1 (en) * | 2021-07-16 | 2023-01-19 | Qualcomm Incorporated | Secret key verification in wireless communication |
Also Published As
Publication number | Publication date |
---|---|
EP1847060A4 (en) | 2011-09-14 |
MX2007009063A (en) | 2007-10-02 |
TW200633460A (en) | 2006-09-16 |
TWI378701B (en) | 2012-12-01 |
CN101951383B (en) | 2013-06-19 |
CN101951383A (en) | 2011-01-19 |
JP4734344B2 (en) | 2011-07-27 |
WO2006081122A3 (en) | 2007-11-22 |
CA2596067C (en) | 2013-09-17 |
KR101253370B1 (en) | 2013-04-11 |
EP1847060A2 (en) | 2007-10-24 |
CA2596067A1 (en) | 2006-08-03 |
TW200723818A (en) | 2007-06-16 |
NO20074210L (en) | 2007-10-24 |
KR20110076992A (en) | 2011-07-06 |
KR101011470B1 (en) | 2011-01-28 |
JP2008529413A (en) | 2008-07-31 |
KR20070096008A (en) | 2007-10-01 |
TWI404393B (en) | 2013-08-01 |
KR20070088821A (en) | 2007-08-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2596067C (en) | Method and system for deriving an encryption key using joint randomness not shared by others | |
US8280046B2 (en) | Method and system for deriving an encryption key using joint randomness not shared by others | |
Zhang et al. | Design of an OFDM physical layer encryption scheme | |
US8238551B2 (en) | Generation of perfectly secret keys in wireless communication networks | |
US20070036353A1 (en) | Authentication and encryption methods using shared secret randomness in a joint channel | |
Toorani et al. | An elliptic curve-based signcryption scheme with forward secrecy | |
KR20110117169A (en) | Identity based authenticated key agreement protocol | |
JP2014509094A (en) | System and method for securing wireless communication | |
Sun et al. | A high bit-rate shared key generator with time-frequency features of wireless channels | |
Yao et al. | Post Quantum KEM authentication in SPDM for secure session establishment | |
Hwang et al. | A Key management for wireless communications | |
Aizan et al. | Implementation of BB84 Protocol on 802.11 i | |
Mulkey et al. | Towards an efficient protocol for privacy and authentication in wireless networks | |
de Ree et al. | Grain-128PLE: generic physical-layer encryption for IoT networks | |
Wan et al. | Access control protocols with two-layer architecture for wireless networks | |
Lavanya et al. | Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks | |
Xu et al. | Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT devices | |
Lim et al. | Secure deniable authenticated key establishment for internet protocols | |
Patrick | Wireless LAN Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200680002891.8 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref document number: 2596067 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/a/2007/009063 Country of ref document: MX Ref document number: 2007553138 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020077018125 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020077018514 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006718847 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020117010823 Country of ref document: KR |