A protocol for secret key infusion from satellite transmissions
In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over a public channel and the key over a secure channel. Quantum key distribution is an alternative method to share a common key without having to transmit the key. However, it is still in the development...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IJCNS
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/14010/ http://irep.iium.edu.my/14010/ http://irep.iium.edu.my/14010/1/WA14010_M.Ridza%2C_A_protocol_for_secret_key_infusion.pdf |
id |
iium-14010 |
---|---|
recordtype |
eprints |
spelling |
iium-140102012-03-06T04:53:36Z http://irep.iium.edu.my/14010/ A protocol for secret key infusion from satellite transmissions Wahiddin, Mohamed Ridza Noor Sham, Noor Shamilla Shanaz Saeb, Magdy M. Mior Hamdan, Mior Hadi QA75 Electronic computers. Computer science In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over a public channel and the key over a secure channel. Quantum key distribution is an alternative method to share a common key without having to transmit the key. However, it is still in the development stage and possibly proves to be expensive and impractical in the foreseen future. It is useful to have a cheaper and simpler protocol to locally generate the secret key at the sender and receiver locations. In this work, we propose the capturing of bits from an external source such as a radio or a satellite digital transmission to locally generate a mutual key. We introduce a synchronization technique and a framework to ensure that both parties will be receiving the same bit string. The protocol stages include a synchronizing bit-pattern, capturing a bit string and then processing it. The resulting pseudo random bit string is then hashed to provide the required key. The nature of the signal, the vast selection of the timeframe, the downloading sequence, the various source stations and other parameters ensure eavesdropping to be exceedingly unmanageable. IJCNS 2010 Article PeerReviewed application/pdf en http://irep.iium.edu.my/14010/1/WA14010_M.Ridza%2C_A_protocol_for_secret_key_infusion.pdf Wahiddin, Mohamed Ridza and Noor Sham, Noor Shamilla Shanaz and Saeb, Magdy M. and Mior Hamdan, Mior Hadi (2010) A protocol for secret key infusion from satellite transmissions. International Journal of Computer and Network Security (IJCNS), 2 (7). pp. 99-101. ISSN 2076-9199 http://www.ijcns.org/index.html |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Wahiddin, Mohamed Ridza Noor Sham, Noor Shamilla Shanaz Saeb, Magdy M. Mior Hamdan, Mior Hadi A protocol for secret key infusion from satellite transmissions |
description |
In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over a public channel and the key over a secure channel. Quantum key distribution is an alternative method to share a common key without having to transmit the key. However, it is still in the development stage and possibly proves to be expensive and impractical in the foreseen future. It is useful to have a cheaper and simpler protocol to locally generate the secret key at the sender and receiver locations. In this work, we propose the capturing of bits from an external source such as a radio or a satellite digital transmission to locally generate a mutual key. We introduce a synchronization technique and a framework to ensure that both parties will be receiving the same bit string. The protocol stages include a synchronizing bit-pattern, capturing a bit string and then processing it. The resulting pseudo random bit string is then hashed to provide the required key. The nature of the signal, the vast selection of the timeframe, the downloading sequence, the various source stations and other parameters ensure eavesdropping to be exceedingly unmanageable. |
format |
Article |
author |
Wahiddin, Mohamed Ridza Noor Sham, Noor Shamilla Shanaz Saeb, Magdy M. Mior Hamdan, Mior Hadi |
author_facet |
Wahiddin, Mohamed Ridza Noor Sham, Noor Shamilla Shanaz Saeb, Magdy M. Mior Hamdan, Mior Hadi |
author_sort |
Wahiddin, Mohamed Ridza |
title |
A protocol for secret key infusion from satellite transmissions |
title_short |
A protocol for secret key infusion from satellite transmissions |
title_full |
A protocol for secret key infusion from satellite transmissions |
title_fullStr |
A protocol for secret key infusion from satellite transmissions |
title_full_unstemmed |
A protocol for secret key infusion from satellite transmissions |
title_sort |
protocol for secret key infusion from satellite transmissions |
publisher |
IJCNS |
publishDate |
2010 |
url |
http://irep.iium.edu.my/14010/ http://irep.iium.edu.my/14010/ http://irep.iium.edu.my/14010/1/WA14010_M.Ridza%2C_A_protocol_for_secret_key_infusion.pdf |
first_indexed |
2023-09-18T20:23:11Z |
last_indexed |
2023-09-18T20:23:11Z |
_version_ |
1777408243641876480 |