Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Generalized privacy amplification
IEEE Transactions on Information Theory - Part 2
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels-Part II: the simulatability condition
IEEE Transactions on Information Theory
Secret-key agreement over unauthenticated public channels .II. Privacy amplification
IEEE Transactions on Information Theory
Creating shared secrets out of thin air
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Creating secrets out of erasures
Proceedings of the 19th annual international conference on Mobile computing & networking
Hi-index | 0.00 |
This paper introduces a set of low-complexity algorithms that when coupled with link layer retransmission mechanisms, strengthen wireless communication security. Our basic idea is to generate a series of secrets from inevitable transmission errors and other random factors in wireless communications. Because these secrets are constantly extracted from the communication process in realtime, we call them dynamic secrets. Dynamic secrets have interesting security properties. They offer a complementary mechanism to existing security protocols. Even if the adversary exploits a vulnerability and steals the underlying system secret, security can be automatically replenished. In many scenarios, it is also possible to bootstrap a secure communication with the dynamic secrets.