Presentation 2005-09-27
Unconditionally Secure Key Agreement Using BCH Codes
Kensuke HIRANO, Hidenori KUWAKADO, Masakatu MORII, Hatsukazu TANAKA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Key agreement schemes using noise on the channel have been studied theoretically. Since these schemes require only an error correction circuit, they are suitable to share a key between small devices such as RFID tags. However, there are two practical problems. The first problem is that it is difficult to code information according to channel capacity. The second problem is that the size of a key is small if noise of a receiver strongly correlates with that of an eavesdropper. To solve the problems, we propose two methods. The first method is that a sender intentionally adds noise to signals. The second method is that after a receiver permutes received signals the receiver resends permuted signals to the sender. These methods enable us to share the large-size key by practical BCH codes. Specifically, simulation results show that a 50-bit key per 127-bit transmitted data can be shared using the (127, 120) BCH codes.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) security / RFID / key agreement / unconditional security / BCH codes
Paper # IT2005-58
Date of Issue

Conference Information
Committee IT
Conference Date 2005/9/20(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Theory (IT)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Unconditionally Secure Key Agreement Using BCH Codes
Sub Title (in English)
Keyword(1) security
Keyword(2) RFID
Keyword(3) key agreement
Keyword(4) unconditional security
Keyword(5) BCH codes
1st Author's Name Kensuke HIRANO
1st Author's Affiliation Graduate School of Sience and Technology, Kobe University()
2nd Author's Name Hidenori KUWAKADO
2nd Author's Affiliation Faculty of Engineering, Kobe University
3rd Author's Name Masakatu MORII
3rd Author's Affiliation Faculty of Engineering, Kobe University
4th Author's Name Hatsukazu TANAKA
4th Author's Affiliation Kobe Institute of Computing
Date 2005-09-27
Paper # IT2005-58
Volume (vol) vol.105
Number (no) 311
Page pp.pp.-
#Pages 5
Date of Issue