A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Vulnerabilities of wireless key exchange based on channel reciprocity
WISA'10 Proceedings of the 11th international conference on Information security applications
Hi-index | 0.00 |
This paper describes the comparison of the error-correcting codes that is adopted by the key disagreement correction process about wireless key agreement system called ESPARSKEY that is expected to achieve information-theoretic security. This system consists of AP with a variable directional antenna, that is, an ESPAR antenna, and UT with an omni-directional antenna. We employ conditional mutual information as the evaluation index. From experimental evaluation results, we clarified that the best way is adopting BCH(31,16,7) with table-aided soft-decision decoding as the key disagreement process where one eavesdropper exists more than 40cm from UT. After adopting this errorcorrecting code, we should transact 200 wireless packets between the nodes to share a 128-bit unguessable key against an eavesdropper.