A protocol for secret key infusion from satellite transmissions

In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over a public channel and the key over a secure channel. Quantum key distribution is an alternative method to share a common key without having to transmit the key. However, it is still in the development...

Full description

Bibliographic Details
Main Authors: Wahiddin, Mohamed Ridza, Noor Sham, Noor Shamilla Shanaz, Saeb, Magdy M., Mior Hamdan, Mior Hadi
Format: Article
Language:English
Published: IJCNS 2010
Subjects:
Online Access:http://irep.iium.edu.my/14010/
http://irep.iium.edu.my/14010/
http://irep.iium.edu.my/14010/1/WA14010_M.Ridza%2C_A_protocol_for_secret_key_infusion.pdf
id iium-14010
recordtype eprints
spelling iium-140102012-03-06T04:53:36Z http://irep.iium.edu.my/14010/ A protocol for secret key infusion from satellite transmissions Wahiddin, Mohamed Ridza Noor Sham, Noor Shamilla Shanaz Saeb, Magdy M. Mior Hamdan, Mior Hadi QA75 Electronic computers. Computer science In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over a public channel and the key over a secure channel. Quantum key distribution is an alternative method to share a common key without having to transmit the key. However, it is still in the development stage and possibly proves to be expensive and impractical in the foreseen future. It is useful to have a cheaper and simpler protocol to locally generate the secret key at the sender and receiver locations. In this work, we propose the capturing of bits from an external source such as a radio or a satellite digital transmission to locally generate a mutual key. We introduce a synchronization technique and a framework to ensure that both parties will be receiving the same bit string. The protocol stages include a synchronizing bit-pattern, capturing a bit string and then processing it. The resulting pseudo random bit string is then hashed to provide the required key. The nature of the signal, the vast selection of the timeframe, the downloading sequence, the various source stations and other parameters ensure eavesdropping to be exceedingly unmanageable. IJCNS 2010 Article PeerReviewed application/pdf en http://irep.iium.edu.my/14010/1/WA14010_M.Ridza%2C_A_protocol_for_secret_key_infusion.pdf Wahiddin, Mohamed Ridza and Noor Sham, Noor Shamilla Shanaz and Saeb, Magdy M. and Mior Hamdan, Mior Hadi (2010) A protocol for secret key infusion from satellite transmissions. International Journal of Computer and Network Security (IJCNS), 2 (7). pp. 99-101. ISSN 2076-9199 http://www.ijcns.org/index.html
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Wahiddin, Mohamed Ridza
Noor Sham, Noor Shamilla Shanaz
Saeb, Magdy M.
Mior Hamdan, Mior Hadi
A protocol for secret key infusion from satellite transmissions
description In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over a public channel and the key over a secure channel. Quantum key distribution is an alternative method to share a common key without having to transmit the key. However, it is still in the development stage and possibly proves to be expensive and impractical in the foreseen future. It is useful to have a cheaper and simpler protocol to locally generate the secret key at the sender and receiver locations. In this work, we propose the capturing of bits from an external source such as a radio or a satellite digital transmission to locally generate a mutual key. We introduce a synchronization technique and a framework to ensure that both parties will be receiving the same bit string. The protocol stages include a synchronizing bit-pattern, capturing a bit string and then processing it. The resulting pseudo random bit string is then hashed to provide the required key. The nature of the signal, the vast selection of the timeframe, the downloading sequence, the various source stations and other parameters ensure eavesdropping to be exceedingly unmanageable.
format Article
author Wahiddin, Mohamed Ridza
Noor Sham, Noor Shamilla Shanaz
Saeb, Magdy M.
Mior Hamdan, Mior Hadi
author_facet Wahiddin, Mohamed Ridza
Noor Sham, Noor Shamilla Shanaz
Saeb, Magdy M.
Mior Hamdan, Mior Hadi
author_sort Wahiddin, Mohamed Ridza
title A protocol for secret key infusion from satellite transmissions
title_short A protocol for secret key infusion from satellite transmissions
title_full A protocol for secret key infusion from satellite transmissions
title_fullStr A protocol for secret key infusion from satellite transmissions
title_full_unstemmed A protocol for secret key infusion from satellite transmissions
title_sort protocol for secret key infusion from satellite transmissions
publisher IJCNS
publishDate 2010
url http://irep.iium.edu.my/14010/
http://irep.iium.edu.my/14010/
http://irep.iium.edu.my/14010/1/WA14010_M.Ridza%2C_A_protocol_for_secret_key_infusion.pdf
first_indexed 2023-09-18T20:23:11Z
last_indexed 2023-09-18T20:23:11Z
_version_ 1777408243641876480