The present application claims the benefit under 35 U.S.C. § 119 of German Patent Application No. DE 102016220734.2 filed on Oct. 21, 2016, which is expressly incorporated herein by reference in its entirety.
The present invention relates to a method for generating a cryptographic key. The present invention also relates to a corresponding device, a corresponding computer program and a corresponding memory medium.
A symmetrical cryptosystem is a cryptosystem, in which, unlike an asymmetrical cryptosystem, all involved (legitimate) users use the same key. The use of one and the same key for encrypting and decrypting data, for calculating and checking message authentication codes, etc., means that prior to each encrypted exchange, the key itself must initially be distributed. However, since the security of the entire procedure depends on the secrecy of the key, conventional approaches mostly the key exchange over a secure channel. This may take place, in particular, by manually introducing the keys into the respective user, for example, by inputting a password, from which the actual key may then be derived.
In contrast, the key exchange over unsecure channels still presents a challenge to those skilled in the art, which is known in cryptography as “key distribution problem.” To solve this problem, the related art offers approaches, such as the conventional Diffie-Hellman key exchange or so-called hybrid encryption methods, which enable the exchange of symmetrical keys by incorporating asymmetrical protocols.
In the recent past, however, cryptosystems have been increasingly discussed, which shift the problem of key establishment from the application layer of the OSI reference model to its bit transfer layer (physical layer, PHY). Such approaches are used in the nascent technical field of cyber-physical systems, which are distinguished by the use primarily of wireless and, therefore, inherently less secure communication channels.
German Patent Application No. DE 10 2014 208975 describes a method for generating a key in a network. In this method, the network includes at least one first user and one second user having a secured communication link to one another, as well as a third user, to which a secured communication link is to be established. The first user and the third user each generate a first partial value sequence based on properties of the transmission channel between the first user and the third user. The second user and the third user each generate a second partial value sequence based on properties of the transmission channel between the second user and the third user. In a secured part of the network, which includes at least the first and the second user, but not the third user, the key is then ascertained based at least on the first partial value sequence of the first user and on the second partial value sequence of the second user. The key is also generated in the third user based at least on the first partial value sequence and on the second partial value sequence.
In German Patent Application No. DE 10 2014 208974, a method is described for ascertaining a piece of information about the distance of a first device to at least one second device. The information about the distance in this case is ascertained as a function of a correlation between first values, which have been ascertained by the first device based on physical properties of a wireless transmission channel between the first device and a third device, and second values, which are ascertained by the second device based on physical properties of a wireless transmission channel between the second device and the third device.
The present invention provides a method for generating a cryptographic key, a corresponding device, a corresponding computer program as well as a corresponding memory medium.
The method provided in this case is based on the following approach: two legitimate parties A and B transmit a training sequence to a relay. This relay emits the weighted sum of the received signals and subsequently transmits a training sequence itself, with which A and B are able to measure their channel to the relay. Non-participants receive only the sum of the channel measurement and are unable to deduce from this the individual summands. Based on the sum, however, A and B are each able to determine the other channel, because they measured their channel to the relay. The individual channels are used as starting material for generating a key.
In one first specific embodiment, after a synchronization phase, A and B transmit simultaneously the same training sequence for channel estimation. The relay receives the superposition of both signals and is therefore only able to estimate the sum of both channel impulse responses without, however, knowing the summands.
In a second specific embodiment, A and B transmit their training sequences in succession and the relay forms a weighted sum of the individual measuring results and emits this sum. Since the relay is able to differentiate the channels to A and B, it is able to superpose this sum weighted in such a way that A and B are each able to determine the reciprocal channel with the best possible signal-to-noise ratio.
One advantage of the method provided is its particular suitability for simple relays, which emit a received high-frequency signal again merely time delayed and amplified, without generating keys as a result. This approach allows, in particular, a key generation by two legitimate parties in static scenarios.
The method allows for the fact that neither A nor B are required to be moved for generating a key, i.e., for example, they may already be fixedly mounted. If the relay is moved, keys may therefore also be generated in the case of a completely static channel between A and B.
In the case of a non-static channel between A and B, the key generation rate may be increased by the method, so that a key of a fixed length is generated in a shorter period of time. Alternatively, the key quality may be enhanced as a result compared to conventional methods without relays. A method according to the present invention results in less complexity compared to conventional relay methods, because no key generation logic is required to be provided in the relay, but rather the high-frequency signal (HF signal) is processed directly. Thus, the relay may be manufactured smaller and more cost-efficiently and developed more cost-efficiently.
With the method, group keys, in addition to point-to-point keys, may also be established between A, B and the relay.
The method functions regardless of whether A and B are situated within the reciprocal radio range and are therefore able to communicate directly with one another or are able to communicate with one another only via the relay.
Furthermore, the relay in the first specific embodiment receives no information about the key, which it could reveal to an attacker (intended or unintended), in case this relay uses only one receiving antenna. In addition, the method in this specific embodiment is robust against attacks, in which a compromised relay re-emits its received signal modulated with a time-variant sequence.
A second specific embodiment has the additional advantage that the relay, by selecting the weights, may positively influence the measured signal-to-noise ratio of the sum signal in the case of A and B, and thus may also optimize the key generation rate or the residual error rate. This specific embodiment has the advantage over the first specific embodiment that it requires no exact synchronization of the transmission points in time and that at the same time it protects against attacks, in which the attacker knows the ratio of the reception power of both channels to the relay. Moreover, none of the aforementioned devices needs to be capable of duplex transmission (full duplex communication).
One variant of the two specific embodiments allows the sum signal to be transmitted from the relay to A and B with practically no further interference.
In another specific embodiment, the derived key remains unknown to the relay. As a result, the relay should be reliable only in that it does not use multiple antennas (simultaneously). This specific embodiment also offers protection against attacks of an active attacker, who uses a relay which re-emits a received signal modulated with a time-variant sequence.
Advantageous refinements of and improvements on the present invention are possible as a result of the measures described herein.
Exemplary embodiments of the present invention are shown in the figures and described in greater detail below.
To illustrate a first specific embodiment,
One problematic situation arises in a conventional key generation if third channel (hAB) does not change (i.e., is static), since then the channel virtually “contains” only the randomness of one single measuring result, on the basis of which a key could be generated. Any additional measurement in this case does not represent an event stochastically independent of the first measurement, so that the entropy of additional measuring results is unable to contribute to the cryptographic strength of the obtained key.
One method (10) suitable for overcoming this problem may—deviating from the depiction according to
Method (10) in the first specific embodiment begins with an initially conventional synchronization phase, in which first node (A) and second node (B) are precisely synchronized to approximately one signal sampling period (of the receivers)—this corresponds to an accuracy of approximately 25 ns at 40 MHz bandwidth in the case of a WLAN according to IEEE 802.11n—and during which a shared transmission point in time is established. If the differences in transit time between first channel (hAR) and second channel (hBR) differ significantly, then this effect is also taken into consideration for the transmission point in time. Both parties then transmit an identical training sequence, with which relay (R) is able to measure the channels to them: both signals arrive at relay (R) simultaneously and are superposed there at the antenna. If, as assumed below, each channel is equated for the benefit of a simplified representation with its own channel coefficient, then relay (R) therefore measures the sum hAR+hBR. Relay (R) then re-transmits the received signal potentially amplified and subsequently (the order may be arbitrary) also transmits within the channel coherency time of the first measurement a training sequence, which need not be identical to that of first node (A) and of second node (B). Since first node (A) and second node (B) measure first channel (hAR), and second channel (hBR) with the training sequence transmitted by relay (R), they are each able to calculate the other channel based on the sum signal, whereas an attacker is unable to deduce the summands from the sum signal.
The model of transmission is designed for the variants mentioned under No. b above, in which all participants need only be capable of an alternating operation (half duplex communication), as well as for the second specific embodiment described below, as follows: Based on undetermined carrier phases, first node (A) receives as a sum signal:
hA,1=((
and
hA,2=(
based on the training sequence transmitted by relay (R). Similarly, second node (B) receives
hB,1=((
and
hB,2=(
based on the training sequence transmitted by relay (R).
All channel coefficients are assumed to be complex-valued with arbitrary distribution due to in-phase and quadrature transmission, the receiver noise in each case being ignored for the sake of simplicity in conjunction with the present explanations. In this case
In the following
σAR2{hAR·hAR*}
and
σBR2{hBR·hBR*}
are the variances of the channels, IE referring to the expected value operator. All measuring signals have certain phase indeterminacies ϕ* due to the lack of phase reference. In addition, relay (R) and corresponding receiving hardware in any device may weight the signals with a factor γA or γB. In the present exemplary embodiment, a reference carrier mis-tuned by a few kilohertz, which is used as a phase reference for all measurements, is transmitted simultaneously with the training sequence, so that phase indeterminacies ϕ*=0 for the measurements become ineffective via correction by the reference. Without loss of generality, the frequency flatness of the channels is assumed in this case. For frequency-selective channels, the above described multiplication would have to be replaced by a convolution and to be considered in the frequency range, potentially via Fourier transformation. In this case, a subcarrier may be used as a phase reference in the conventional manner, for example, in an orthogonal frequency multiplex method (orthogonal frequency-division multiplexing, OFDM), so that ϕ*=0 again applies with regard to this reference for the remaining subcarriers.
In order to obtain an estimated value for ĥBR from the received signal, first node (A) estimates via several measurements the mean values
as well as the variances
{circumflex over (σ)}A,22={(hA,2−BA,2)2≈|γA2|σAR2}
and
Thus, each of the estimated values for the relay channel values may be determined separately of one another to yield
and
Second node (B) proceeds similarly.
Now, ĥA and ĥB may be used as input measured values for a shared key generation method or for key generation methods operating separately from one another.
This method (10) is particularly robust against erroneous behavior of relay (R). Thus, an active attacker could compromise relay (R) to such an extent that it adds a time-variant term to the received signal (chronologically constant terms do not contribute to key generation and are therefore not relevant) or multiplies it with a time-variant factor (time-variant factors are equally irrelevant). In this case, however, first node (A) and second node (B) would ascertain different measured values ĥA and ĥB. These, in turn, would result in keys differing from one another, which would be discovered in later steps of the key generation. Thus, relay (R) cannot adversely impact the signal without being noticed and method (10) is robust against active attacks on relay (R).
In the second specific embodiment according to
In this specific embodiment, after a rough synchronization phase, in which first node (A) and node (B) coordinate their transmission points in time and negotiate method parameters, both parties transmit successively but within the channel coherency time, a training sequence, with which relay (R) is able to measure the channels to them: relay (R) measures hAR,1 and hBR,1, and transmits the superposition αhAR,1+βhBR,1 of the high-frequency signals again within the channel coherency time and channel coherency bandwidth of the first measurements. In addition, it overtly discloses α and β in the event α≠β has been selected. Because first node (A) and second node (B) do not have to transmit simultaneously, no synchronization of the transmission points in time as exact as in the case of the first specific embodiment is necessary. Subsequently (the order may be arbitrary), relay (R) transmits a training sequence within the channel coherency time and channel coherency bandwidth of the first measurements. Since first node (A) and second node (B) with the training sequence transmitted by relay (R) measure the channel coefficients hAR,2=hAR,1=hAR and hBR,2=hBR,1=hBR, due to the reciprocity, they are each able to calculate the other channel based on the received sum signal with the aid of the disclosed factors α and β, whereas an attacker is unable to deduce the summands from the sum signal.
The model of transmission is designed with the same assumptions as in the case of the first specific embodiment as follows: Due to undetermined carrier phases, first node (A) receives as the sum signal
hA,1=(α(
and
hA,2=(
based on the sequence transmitted by relay (R).
Similarly, second node (B) receives
hB,1=(α(
and
hB,2=(
based on the training sequence transmitted by relay (R).
First node (A) obtains ĥB by calculation based on the relation
ĥA being determined exactly as in the case of the first specific embodiment. Determined estimated values ĥA and ĥB are then used as input values for a shared key generation method or for two key generation methods operating separately from one another.
In one advantageous embodiment, relay (R) selects factors α and β in such a way that both channels possess the same (long-term) variance. This neutralizes the advantage of a hypothetical attacker, who knows the ratio of the reception power of first channel (hAR) to that of second channel (hBR). As an explanatory example, the extreme case is noted, in which the training sequence of first node (A) would be received with a much greater reception power than the training sequence of second node (B), for example, because first node (A) is positioned much closer to relay (R) than second node (B). Without compensating factors, the sum hAR+hBR would then be dominated by first summand hAR, and the attacker could use this sum as a suitable estimated value for determining hAR in order to attack method (10).
Furthermore, if first node (A) and second node (B) are located in direct radio range, second node (B) can estimate third channel (hAB), if first node (A) transmits its training sequence. First node (A) proceeds similarly if second node (B) transmits so that if first channel (hAR) is not static and, therefore, not useable for a key generation, third channel (hAB) can also be used for key generation. With this measure, it is possible to again increase the key generation rate.
Alternatively, a shared group key for these parties may be generated in all variants of this second specific embodiment based on first channel (hAR), second channel (hBR) or third channel (hAB), which are known to first node (A), second node (B) and relay (R).
In a modification suitable for both specific embodiments, relay (R) digitizes at least one of the received signals, superposes it in the manner described above and transmits the training sequence. Subsequently, relay (R) uses a known standard data transmission method, in order to transmit the digitized sum signal as well as values α and β to first node (A) and to second node (B) with practically zero energy loss. The transmitted training sequence may form a part of this data transmission. Alternatively, the transmission may take place significantly outside the channel coherence time and channel coherency bandwidth. In this way, first node (A) and second node (B) obtain the values hA,2 and hB,2 via measurement, as well as the now undistorted sum signal via practically error-free data transmission and are able to proceed as described above. In this case, first node (A) and second node (B) receive identical digitized values as the sum:
h1=(
for which reason under the assumption made above, first node (A) and second node (B) obtain the reciprocal channel by simply subtracting their own measurement from the sum.
In another specific embodiment, the relay may also estimate the (sum) channel based on the received signal and proceed with this channel instead of the received signal as described above.
Number | Date | Country | Kind |
---|---|---|---|
10 2016 220 734 | Oct 2016 | DE | national |
Number | Name | Date | Kind |
---|---|---|---|
8094823 | Sun | Jan 2012 | B1 |
8566247 | Nagel | Oct 2013 | B1 |
20050060547 | Saito | Mar 2005 | A1 |
20080130900 | Hsieh | Jun 2008 | A1 |
20110211700 | Park | Sep 2011 | A1 |
20140208113 | Nakano | Jul 2014 | A1 |
Number | Date | Country |
---|---|---|
102014208974 | Nov 2015 | DE |
102014208975 | Nov 2015 | DE |
Number | Date | Country | |
---|---|---|---|
20180115420 A1 | Apr 2018 | US |