A protocol for secret key infusion from satellite transmissions

In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over a public channel and the key over a secure channel. Quantum key distribution is an alternative method to share a common key without having to transmit the key. However, it is still in the development...

Full description

Bibliographic Details
Main Authors: Wahiddin, Mohamed Ridza, Noor Sham, Noor Shamilla Shanaz, Saeb, Magdy M., Mior Hamdan, Mior Hadi
Format: Article
Language:English
Published: IJCNS 2010
Subjects:
Online Access:http://irep.iium.edu.my/14010/1/WA14010_M.Ridza%2C_A_protocol_for_secret_key_infusion.pdf
_version_ 1796876122283048960
author Wahiddin, Mohamed Ridza
Noor Sham, Noor Shamilla Shanaz
Saeb, Magdy M.
Mior Hamdan, Mior Hadi
author_facet Wahiddin, Mohamed Ridza
Noor Sham, Noor Shamilla Shanaz
Saeb, Magdy M.
Mior Hamdan, Mior Hadi
author_sort Wahiddin, Mohamed Ridza
collection IIUM
description In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over a public channel and the key over a secure channel. Quantum key distribution is an alternative method to share a common key without having to transmit the key. However, it is still in the development stage and possibly proves to be expensive and impractical in the foreseen future. It is useful to have a cheaper and simpler protocol to locally generate the secret key at the sender and receiver locations. In this work, we propose the capturing of bits from an external source such as a radio or a satellite digital transmission to locally generate a mutual key. We introduce a synchronization technique and a framework to ensure that both parties will be receiving the same bit string. The protocol stages include a synchronizing bit-pattern, capturing a bit string and then processing it. The resulting pseudo random bit string is then hashed to provide the required key. The nature of the signal, the vast selection of the timeframe, the downloading sequence, the various source stations and other parameters ensure eavesdropping to be exceedingly unmanageable.
first_indexed 2024-03-05T22:47:59Z
format Article
id oai:generic.eprints.org:14010
institution International Islamic University Malaysia
language English
last_indexed 2024-03-05T22:47:59Z
publishDate 2010
publisher IJCNS
record_format dspace
spelling oai:generic.eprints.org:140102020-06-30T04:18:18Z http://irep.iium.edu.my/14010/ A protocol for secret key infusion from satellite transmissions Wahiddin, Mohamed Ridza Noor Sham, Noor Shamilla Shanaz Saeb, Magdy M. Mior Hamdan, Mior Hadi QA75 Electronic computers. Computer science In symmetric encryption systems, secure messages are exchanged with the encrypted message sent over a public channel and the key over a secure channel. Quantum key distribution is an alternative method to share a common key without having to transmit the key. However, it is still in the development stage and possibly proves to be expensive and impractical in the foreseen future. It is useful to have a cheaper and simpler protocol to locally generate the secret key at the sender and receiver locations. In this work, we propose the capturing of bits from an external source such as a radio or a satellite digital transmission to locally generate a mutual key. We introduce a synchronization technique and a framework to ensure that both parties will be receiving the same bit string. The protocol stages include a synchronizing bit-pattern, capturing a bit string and then processing it. The resulting pseudo random bit string is then hashed to provide the required key. The nature of the signal, the vast selection of the timeframe, the downloading sequence, the various source stations and other parameters ensure eavesdropping to be exceedingly unmanageable. IJCNS 2010 Article PeerReviewed application/pdf en http://irep.iium.edu.my/14010/1/WA14010_M.Ridza%2C_A_protocol_for_secret_key_infusion.pdf Wahiddin, Mohamed Ridza and Noor Sham, Noor Shamilla Shanaz and Saeb, Magdy M. and Mior Hamdan, Mior Hadi (2010) A protocol for secret key infusion from satellite transmissions. International Journal of Computer and Network Security (IJCNS), 2 (7). pp. 99-101. ISSN 2076-9199 http://www.ijcns.org/index.html
spellingShingle QA75 Electronic computers. Computer science
Wahiddin, Mohamed Ridza
Noor Sham, Noor Shamilla Shanaz
Saeb, Magdy M.
Mior Hamdan, Mior Hadi
A protocol for secret key infusion from satellite transmissions
title A protocol for secret key infusion from satellite transmissions
title_full A protocol for secret key infusion from satellite transmissions
title_fullStr A protocol for secret key infusion from satellite transmissions
title_full_unstemmed A protocol for secret key infusion from satellite transmissions
title_short A protocol for secret key infusion from satellite transmissions
title_sort protocol for secret key infusion from satellite transmissions
topic QA75 Electronic computers. Computer science
url http://irep.iium.edu.my/14010/1/WA14010_M.Ridza%2C_A_protocol_for_secret_key_infusion.pdf
work_keys_str_mv AT wahiddinmohamedridza aprotocolforsecretkeyinfusionfromsatellitetransmissions
AT noorshamnoorshamillashanaz aprotocolforsecretkeyinfusionfromsatellitetransmissions
AT saebmagdym aprotocolforsecretkeyinfusionfromsatellitetransmissions
AT miorhamdanmiorhadi aprotocolforsecretkeyinfusionfromsatellitetransmissions
AT wahiddinmohamedridza protocolforsecretkeyinfusionfromsatellitetransmissions
AT noorshamnoorshamillashanaz protocolforsecretkeyinfusionfromsatellitetransmissions
AT saebmagdym protocolforsecretkeyinfusionfromsatellitetransmissions
AT miorhamdanmiorhadi protocolforsecretkeyinfusionfromsatellitetransmissions