scholarly journals A Novel Key Distribution Scheme Based on Transmission Delays

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jie Huang ◽  
Xiaowen Wang ◽  
Wei Wang ◽  
Zhenyu Duan

With the development of IoT (Internet of Things), the demand for security is increasing day by day. However, the traditional key distribution scheme is high in cost and complicated in calculation, so a lightweight key distribution scheme is urgently needed. In this paper, a novel key distribution scheme based on transmission delay is proposed. Based on the experimental observation, we find that the statistical characteristics of their transmission delays are about the same if any two terminals transmit the equal-length packets on the Internet and are different for different transmission paths. Accordingly, we propose a method to customize transmission delays. On the Internet, we have deployed 7 forwarding hosts. By randomly determining the forwarding path of packets, we can get customized transmission delay sets. Then, these sets are processed, respectively, by correcting outlier, normalizing, quantizing, encoding, and reconciling so as to be able to realize key distribution between two sides. Next, we design a key distribution protocol and a key distribution system, which consists of a Management Center, a Packet Forwarding Network, and Users. Finally, we reason the security of the key distribution protocol with formal analysis tools.

2019 ◽  
Vol 19 (02) ◽  
pp. 2050012 ◽  
Author(s):  
Pao-Lo Liu

A complete circuit model is developed for modeling the classical key distribution system based on resistors and band-limited noise sources. Theoretical analysis provides component values, including the mutual inductance. Circuit simulations are performed to obtain voltage and current as a function of frequency. Any imbalance between two sides of the communications link is identified. Results indicate that the current, especially, in the bootstrapping circuit, can be a potential security risk unless all signals are band-limited to a low frequency.


Cryptography ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 14
Author(s):  
Xavier Boyen ◽  
Udyani Herath ◽  
Matthew McKague ◽  
Douglas Stebila

The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single points of failure. DPKIT efficiently leverages an existing blockchain to realize an append-only, distributed associative array, which allows anyone (or their browser) to audit and update the history of all publicly issued certificates and revocations for any domain. Our technical contributions include definitions for append-only associative ledgers, a security model for certificate transparency, and a formal analysis of our DPKIT construction with respect to the same. Intended as a client-side browser extension, DPKIT will be effective at fraud detection and prosecution, even under fledgling user adoption, and with better coverage and privacy than federated observatories, such as Google’s or the Electronic Frontier Foundation’s.


Photonics ◽  
2021 ◽  
Vol 8 (6) ◽  
pp. 208
Author(s):  
Xiangqing Wang ◽  
Jie Zhang ◽  
Bo Wang ◽  
Kongni Zhu ◽  
Haokun Song ◽  
...  

With the increase in the popularity of cloud computing and big data applications, the amount of sensitive data transmitted through optical networks has increased dramatically. Furthermore, optical transmission systems face various security risks at the physical level. We propose a novel key distribution scheme based on signal-to-noise ratio (SNR) measurements to extract the fingerprint of the fiber channel and improve the physical level of security. The SNR varies with time because the fiber channel is affected by many physical characteristics, such as dispersion, polarization, scattering, and amplifier noise. The extracted SNR of the optical fiber channel can be used as the basis of key generation. Alice and Bob can obtain channel characteristics by measuring the SNR of the optical fiber channel and generate the consistent key by quantization coding. The security and consistency of the key are guaranteed by the randomness and reciprocity of the channel. The simulation results show that the key generation rate (KGR) can reach 25 kbps, the key consistency rate (KCR) can reach 98% after key post-processing, and the error probability of Eve’s key is ~50%. In the proposed scheme, the equipment used is simple and compatible with existing optic fiber links.


2017 ◽  
Vol 25 (17) ◽  
pp. 20045 ◽  
Author(s):  
Heasin Ko ◽  
Byung-Seok Choi ◽  
Joong-Seon Choe ◽  
Kap-Joong Kim ◽  
Jong-Hoi Kim ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document