Method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise
First Claim
1. A method implemented in a first transmit/receive unit for generating a secret stream of data based on received random public noise, the method comprising:
- negotiating a session period with a second transmit/receive unit;
capturing random data from a random public noise stream for the session period, wherein the capturing is performed for a period of time long enough to exceed a storage limit of an eavesdropper;
storing the random data at the first transmit/receive unit in a storage that is larger than a memory capacity of the eavesdropper;
upon completion of the session period, receiving random numbers generated by the second transmit/receive unit from the second transmit/receive unit;
extracting a secret key from the random data by sampling the random data using the random numbers, wherein the second transmit/receive unit extracts the same secret key by sampling the random data using the random numbers during the session period; and
transmitting encrypted data to the second transmit/receive unit using the secret key for encryption.
1 Assignment
0 Petitions
Accused Products
Abstract
A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
-
Citations
24 Claims
-
1. A method implemented in a first transmit/receive unit for generating a secret stream of data based on received random public noise, the method comprising:
-
negotiating a session period with a second transmit/receive unit; capturing random data from a random public noise stream for the session period, wherein the capturing is performed for a period of time long enough to exceed a storage limit of an eavesdropper; storing the random data at the first transmit/receive unit in a storage that is larger than a memory capacity of the eavesdropper; upon completion of the session period, receiving random numbers generated by the second transmit/receive unit from the second transmit/receive unit; extracting a secret key from the random data by sampling the random data using the random numbers, wherein the second transmit/receive unit extracts the same secret key by sampling the random data using the random numbers during the session period; and transmitting encrypted data to the second transmit/receive unit using the secret key for encryption. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A first wireless transmit/receive unit (WTRU) for transmitting and receiving encrypted data using public random noise;
- the WTRU comprising;
a receiver that; receives session period negotiation data from a second WTRU, captures random data from a random public noise stream for a negotiated session period, wherein the capturing is performed for a period of time long enough to exceed the storage limit of an eavesdropper, and upon completion of the negotiated session period, receives random numbers generated by the second WTRU from the second WTRU; a memory that stores random data captured from the random public noise stream, wherein the memory is larger than a memory capacity of the eavesdropper; a processor that executes instructions for; determining the negotiated session period, extracting a secret key from the random data by sampling the random data using the random numbers, wherein the second WTRU extracts the same secret key by sampling the random public noise stream using the random numbers during the negotiated session period, and generating encrypted data using the secret key for encryption; and a transmitter that transmits the encrypted data to the second WTRU. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
- the WTRU comprising;
-
19. A method of generating an encrypted stream of data comprising:
-
negotiating, at a first transmit/receive unit, a session period with a second transmit/receive unit; transmitting a public stream of random noise for the session period from the first transmit/receive unit to the second transmit/receive unit, wherein the transmission is performed for a period of time long enough to exceed the storage limit of an eavesdropper; storing the public stream of random noise on a storage device of the first transmit/receive unit, wherein the storage device of the first transmit/receive unit is larger than a memory capacity of the eavesdropper; receiving random numbers at the first transmit/receive unit generated by the second transmit/receive unit from the second transmit/receive unit upon completion of the session period; generating a secret key at the first transmit/receive unit from the stored public stream of random noise using the random numbers; generating the same secret key at the second transmit/receive unit by sampling the transmitted public noise stream using the random numbers during the session period; and transmitting an encrypted stream of data from the first transmit/receive unit to the second transmit/receive unit using the secret key. - View Dependent Claims (20, 21)
-
-
22. A method of generating an encrypted stream of data comprising:
-
negotiating, at a first transmit/receive unit, a session period with a second transmit/receive unit; receiving, at the first transmit/receive unit, a public stream of random noise for the session period, wherein the receiving is performed for a period of time long enough to exceed the storage limit of an eavesdropper; storing, at the second transmit/receive unit, the public stream of random noise in a storage that is larger than a memory capacity of the eavesdropper; generating, at the first transmit/receive unit, internal random numbers; sampling, at the first transmit/receive unit, the public stream of random noise by selectively storing bits from the public stream of random noise based on the random numbers to create a secret key during the session period; upon completion of the session period, transmitting the internal random numbers from the first transmit/receive unit to the second transmit/receive unit; generating the same secret key at the second transmit/receive unit by sampling the stored public stream of random noise using the received random numbers; and transmitting an encrypted stream of data using the secret key from the first transmit/receive unit to the second transmit/receive unit. - View Dependent Claims (23, 24)
-
Specification