Authentication and encryption methods using shared secret randomness in a joint channel
First Claim
1. A wireless communication system for securing wireless communications, the system comprising:
- a wireless transmit/receive unit (WTRU);
a first access point (AP) for transmitting a first portion of a bit stream to the WTRU; and
a second AP for transmitting a second portion of the bit stream to the WTRU, wherein the WTRU is located in an area where a transmission pattern radiated from each of the first and second APs intersect, and the WTRU reassembles the first and second portions into the bit stream.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user'"'"'s arm movements inflected to the user device.
-
Citations
89 Claims
-
1. A wireless communication system for securing wireless communications, the system comprising:
-
a wireless transmit/receive unit (WTRU);
a first access point (AP) for transmitting a first portion of a bit stream to the WTRU; and
a second AP for transmitting a second portion of the bit stream to the WTRU, wherein the WTRU is located in an area where a transmission pattern radiated from each of the first and second APs intersect, and the WTRU reassembles the first and second portions into the bit stream. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A wireless communication system for securing wireless communications, the system comprising:
-
a wireless transmit/receive unit (WTRU);
a first access point (AP) for transmitting a first packet data unit (PDU) to the WTRU; and
a second AP for transmitting a second PDU to the WTRU, wherein the WTRU is located in an area where a transmission pattern radiated from each of the first and second APs intersect, and the WTRU performs a function on the first and second PDUs to derive a service data unit (SDU). - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for encryption of a high data rate communication data stream, comprising:
-
generating a truly random key using a channel impulse response of a joint channel;
generating a pseudo random bit stream of equal bit rate as the data stream, the pseudo random bit stream generated using a pseudo-random function; and
applying the pseudo random bit stream to the data stream using a bit-wise XOR function. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for encoding a communication data stream, comprising:
-
selecting an interleaving function from among a set of interleaving functions according to a joint randomness not shared by others (JRNSO) shared string of bits; and
encoding the communication data stream using the interleaving function. - View Dependent Claims (22, 23, 24)
-
-
25. A method for encoding a communication data stream, comprising:
-
generating truly random bits using a JRNSO procedure;
using a maximum length shift register (MLSR) sequence generator with n-bit states to generate non-zero elements for a given Galois Field GS(2n);
defining an interleaving function by a mapping from a predefined indexing of the non-zero Galois Field elements to the order in which they are generated; and
encoding the communication data stream using the interleaving function. - View Dependent Claims (26, 27, 28)
-
-
29. A wireless transmit/receive unit (WTRU) configured for encryption of a high data rate communication data stream, comprising:
-
a truly secret key generator configured to generate a truly random key using a channel impulse response of a joint channel;
a pseudo-random function processor configured to generate a pseudo random bit stream of equal bit rate as the data stream, the pseudo random bit stream generated according to a pseudo-random function; and
a one time pad unit configured to apply the pseudo random bit stream to the data stream using a bit-wise XOR function. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36)
-
-
37. A WTRU configured for encoding a communication data stream, comprising:
a processor configured to select an interleaving function from among a set of interleaving functions according to a joint randomness not shared by others (JRNSO) shared string of bits and to encode the communication data stream using the interleaving function. - View Dependent Claims (38, 39, 40)
-
41. A WTRU for encoding a communication data stream, comprising:
-
a JRNSO generator configured to generate truly random bits using a JRNSO procedure;
a maximum length shift register (MLSR) sequence generator with n-bit states configured to generate non-zero elements for a given Galois Field GS(2n);
an interleaving processor configured to define an interleaving function by a mapping from a predefined indexing of the non-zero Galois Field elements to the order in which they are generated to encode the communication data stream using the interleaving function. - View Dependent Claims (42, 43, 44)
-
-
45. A method for amplifying channel randomness for enhancement of a message encryption, comprising:
-
employing a symmetric block cipher in which one secret key is used to both encrypt and decrypt the message; and
applying a joint randomness not shared by others (JRNSO) shared bit string for a secret key update on a block of plaintext data input using a bitwise XOR operation. - View Dependent Claims (46, 47)
-
-
48. A method for amplifying channel randomness for enhancement of a message encryption, comprising:
-
applying a public key cryptosystem encryption according to a key having public and private elements; and
applying available JRNSO secret bit strings to encrypt the public elements using an XOR operation. - View Dependent Claims (49, 50, 51)
-
-
52. A method for authenticating a first party to a second party, comprising the steps of:
-
sharing a JRNSO secret bit sequence between the first party and the second party;
computing a value of a first function by the first party using a portion of the secret bit sequence and a secret underlying value;
exchanging the value of the first function between the first party and the second party;
computing a value of a second function by the second party using the portion of the secret bit sequence and the value of the first function; and
computing a value of a third function by the second party using the value of the second function, whereby the third function is used to verify the secret underlying value. - View Dependent Claims (53, 54, 55)
-
-
56. In a database system that includes a management system and an implementation of a JRNSO mechanism whereby random information is extracted from a layered communication system, a method for secure protection of database stream information, comprising:
-
generating a secret key from a joint channel characteristics by the JRNSO mechanism;
supplying every with the secret key generated between a remote client and a server; and
extracting the secret key by the database management system. - View Dependent Claims (57)
-
-
58. In a database system that includes a database management system (DBMS) and an implementation of a JRNSO mechanism whereby random information is extracted from an Operating System and used to establish and continuously update the keying mechanism applied, a method for database information secure protection, comprising:
-
locally accessing the database server by an application;
using a random electrical characteristic associated with an internal communication bus to generate a JRNSO secret key between the application and database;
using the secret key to authenticate the application and grant it access to the database server. - View Dependent Claims (59, 60, 61)
-
-
62. In a sensor network that exchanges streaming data between network nodes, a method for protection of the streaming data comprising:
-
every node sending data continuously to a central server;
extracting random information from the user data;
generating a JRNSO secret key based on the random information; and
encrypting the transmitted data from each node using the secret key. - View Dependent Claims (63)
-
-
64. In a wireless communication system of at least two MIMO stations, a method for creating subchannels using eigen-decomposition for increased randomization of a wireless channel between the stations, comprising:
-
using singular value decomposition (SVD) of a channel matrix H, where H represents the channel taps of antenna elements of the MIMO channel, as a function of unitary eigenvectors U, V, and a diagonal matrix of real values;
decomposing the wireless channel into eigen-modes, each eigen-mode represented by a corresponding eigen-value;
observing for each eigen mode, a distribution of eigen-values across channel frequency with respect to SNR and frequency dispersiveness; and
selecting a dominant eigen-mode having highest SNR for data communication and one or more weaker eigen-modes having highest variability in frequency dispersion for increased generation of randomness for a JRSNO secret key. - View Dependent Claims (65, 66, 67, 68, 69, 70, 71, 72, 73)
-
-
74. A method for enhancing randomness in a joint channel between a first transceiver and a second transceiver such that a secret key for encryption of a communication between the first and the second transceivers can be generated, comprising:
-
altering the path of the communication channel at either or both of the first and the second transceiver such that a channel impulse response (CIR) is affected;
generating a random set of bits based on the CIR to form a JRNSO based secret key, whereby the secret key bits are independently generated at each of the transceivers; and
encrypting the communication between the first and the second transceivers using the secret key. - View Dependent Claims (75, 76, 77, 78, 79, 80, 81, 82, 83)
-
-
84. A method for enhancing shared randomness in a joint channel for authentication and encryption of a wireless communication signal between a mobile communication device used by a human user and a second communication device, comprising:
-
gesturing by the human user such that the mobile device is moved to an extent that a change in distance to the second communication device is about half of a signal wavelength;
measuring a CIR of the channel to generate a set of random bits;
using the random set of bits to generate a JRNSO secret key; and
encrypting the communication channel using the secret key. - View Dependent Claims (85, 86, 87, 88, 89)
-
Specification