{"title":"密钥管理和动态安全编码系统","authors":"Thi Huyen Trang Nguyen, J. Barbot","doi":"10.1109/CCE.2014.6916762","DOIUrl":null,"url":null,"abstract":"Digital information transmission systems must satisfy two requirements: reliability and confidentiality. In terms of reliability we tend nowadays to the Shannon's capacity, i.e. the limit of errorless data rate. Concerning the confidentiality of transmissions, a perfect secrecy limit was also defined by Shannon but this aspect of the Shannon's work was less adressed. Nevertheless, in order to enhance the security of transmissions, especially with wireless systems, an encryption is often used. In this contribution, we present an encryption scheme that jointly protect the exchange of information against eavesdropper as well as errors due to the propagation channel. The key controlling the encryption scheme is dynamically generated and propagation measurements will be used to illustrate the importance of the key length.","PeriodicalId":377853,"journal":{"name":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Secret key management and dynamic security coding system\",\"authors\":\"Thi Huyen Trang Nguyen, J. Barbot\",\"doi\":\"10.1109/CCE.2014.6916762\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital information transmission systems must satisfy two requirements: reliability and confidentiality. In terms of reliability we tend nowadays to the Shannon's capacity, i.e. the limit of errorless data rate. Concerning the confidentiality of transmissions, a perfect secrecy limit was also defined by Shannon but this aspect of the Shannon's work was less adressed. Nevertheless, in order to enhance the security of transmissions, especially with wireless systems, an encryption is often used. In this contribution, we present an encryption scheme that jointly protect the exchange of information against eavesdropper as well as errors due to the propagation channel. The key controlling the encryption scheme is dynamically generated and propagation measurements will be used to illustrate the importance of the key length.\",\"PeriodicalId\":377853,\"journal\":{\"name\":\"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCE.2014.6916762\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCE.2014.6916762","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secret key management and dynamic security coding system
Digital information transmission systems must satisfy two requirements: reliability and confidentiality. In terms of reliability we tend nowadays to the Shannon's capacity, i.e. the limit of errorless data rate. Concerning the confidentiality of transmissions, a perfect secrecy limit was also defined by Shannon but this aspect of the Shannon's work was less adressed. Nevertheless, in order to enhance the security of transmissions, especially with wireless systems, an encryption is often used. In this contribution, we present an encryption scheme that jointly protect the exchange of information against eavesdropper as well as errors due to the propagation channel. The key controlling the encryption scheme is dynamically generated and propagation measurements will be used to illustrate the importance of the key length.