Secret-Message Transmission by Echoing Encrypted Probes - STEEP

Tech ID: 33702 / UC Case 2024-716-0

Full Description

Background

For secure communications between two or more legitimate nodes before there is a shared secret key, the traditional wire tap chanel (WTC) method yields zero secrecy when eavesdropper's channel is stronger than those between the legitimate nodes.

Technology

Prof. Yingbo Hua has developed a round-trip, secure communication scheme - called STEEP, which takes advantage of channel probing for secret-message transmission. The way STEEP works is as follows:

  • During phase 1, Alice transmits random probes to Bob. Eve, the eavesdropper also receives these probes but with non-zero noises, which may or may not be larger than the noises at Bob.
  • During phase 2, Bob encrypts his estimated probes with a secret message. The encrypted echoes are sent back to Alice over any (public or not) channel. Consequently, Eve cannot decipher the secret message from Bob while Alice can. This is because the virtual (not physical) receive channel at Alice (with the exact knowledge of the probes) is always better than at Eve (with noisy estimates of the probes).
Distribution of secrecy capacity

 

Distribution of the secrecy capacity in bits per probing sample over 100,000 random realizations of all channels between Alice, Bob and Eve, with independent and identically distributed Gaussian elements of unit variance and Gaussian noises with unit variance. 

Advantages

  • STEEP enables a quantum leap in physical layer security, i.e., almost always a positive secrecy rate in real-time. This property does not apply to any other physical layer security methods.
  • Applicable to various channel types - both analog and digital.
  • Complements traditional security methods and can be easily integrated.
  • Applicable to various network layers - from the physical layer up to higher layers.
  • Efficient in digital implementation as STEEP is a simple round-trip transmission scheme.
  • STEEP offers a low-latency and practical approach to secure communication. 

Suggested uses

  • Scenarios where eavesdropper might have a channel advantage - especially in cases such as satellite communications.
  • Multi-hop digital networks such as mesh networks where data traverses multiple nodes before reaching the destination.
  • Situations that require frequent refreshing or generation of new secret keys - such as IoT devices and connected vehicles. 

Inventor Information

Related Materials

Patent Status

Patent Pending

Contact

Learn About UC TechAlerts - Save Searches and receive new technology matches

Other Information

Keywords

network security, satellite communications, secret key generation, secret message transmission, secure communication, internet of things, IoT, connected vehicles

Categorized As