密钥管理和动态安全编码系统

Thi Huyen Trang Nguyen, J. Barbot
{"title":"密钥管理和动态安全编码系统","authors":"Thi Huyen Trang Nguyen, J. Barbot","doi":"10.1109/CCE.2014.6916762","DOIUrl":null,"url":null,"abstract":"Digital information transmission systems must satisfy two requirements: reliability and confidentiality. In terms of reliability we tend nowadays to the Shannon's capacity, i.e. the limit of errorless data rate. Concerning the confidentiality of transmissions, a perfect secrecy limit was also defined by Shannon but this aspect of the Shannon's work was less adressed. Nevertheless, in order to enhance the security of transmissions, especially with wireless systems, an encryption is often used. In this contribution, we present an encryption scheme that jointly protect the exchange of information against eavesdropper as well as errors due to the propagation channel. The key controlling the encryption scheme is dynamically generated and propagation measurements will be used to illustrate the importance of the key length.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Secret key management and dynamic security coding system\",\"authors\":\"Thi Huyen Trang Nguyen, J. Barbot\",\"doi\":\"10.1109/CCE.2014.6916762\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital information transmission systems must satisfy two requirements: reliability and confidentiality. In terms of reliability we tend nowadays to the Shannon's capacity, i.e. the limit of errorless data rate. Concerning the confidentiality of transmissions, a perfect secrecy limit was also defined by Shannon but this aspect of the Shannon's work was less adressed. Nevertheless, in order to enhance the security of transmissions, especially with wireless systems, an encryption is often used. In this contribution, we present an encryption scheme that jointly protect the exchange of information against eavesdropper as well as errors due to the propagation channel. The key controlling the encryption scheme is dynamically generated and propagation measurements will be used to illustrate the importance of the key length.\",\"PeriodicalId\":377853,\"journal\":{\"name\":\"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCE.2014.6916762\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCE.2014.6916762","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

数字信息传输系统必须满足可靠性和保密性两个要求。在可靠性方面,我们现在倾向于香农的容量,即无差错数据率的极限。关于传输的机密性,香农也定义了一个完美的保密限制,但香农的工作在这方面较少提及。然而,为了提高传输的安全性,特别是无线系统,通常使用加密技术。在这篇贡献中,我们提出了一种联合保护信息交换免受窃听者以及由于传播通道引起的错误的加密方案。控制加密方案的密钥是动态生成的,并且将使用传播度量来说明密钥长度的重要性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secret key management and dynamic security coding system
Digital information transmission systems must satisfy two requirements: reliability and confidentiality. In terms of reliability we tend nowadays to the Shannon's capacity, i.e. the limit of errorless data rate. Concerning the confidentiality of transmissions, a perfect secrecy limit was also defined by Shannon but this aspect of the Shannon's work was less adressed. Nevertheless, in order to enhance the security of transmissions, especially with wireless systems, an encryption is often used. In this contribution, we present an encryption scheme that jointly protect the exchange of information against eavesdropper as well as errors due to the propagation channel. The key controlling the encryption scheme is dynamically generated and propagation measurements will be used to illustrate the importance of the key length.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信