Change search
ReferencesLink to record
Permanent link

Direct link
Engineering device pairing with fuzzy cryptography
Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, Department of Telematics.
2014 (English)MasteroppgaveStudent thesis
Abstract [en]

Device pairing protocols are a subset of secure communication protocols used to bootstrap a secure channel over an insecure communication link between two or more devices. Example protocols use technologies such as Bluetooth or infrared light and are mostly based on user-entered secret keys or secrets directly verified and authenticated manually by users. However, in this thesis we focus on four different areas that complement the existing protocols. Firstly, we overview protocols that are based on fuzzy secrets and that utilize contextual information to pair device. Secondly, we analyze a particular method that uses contextual information, synchronized drawing with two fingers of the same hand on two touch screens or surfaces, to derive a shared secret by applying various metrics and conducting measurements and comparisons. The main results from this parts are new, improved metrics for comparing fuzzy secrets that consist of a drawing or movement path Thirdly, we overview the mathematical constructions that support fuzzy cryptography schemes and describe our own system architecture based on these. Fourthly, we develop a secure device pairing protocol based on synchronized drawing that uses fuzzy cryptography and error-correction codes in order to derive a shared secret between devices that share similar, but not exactly the same, secret noisy inputs. While the protocol is based on an information-theoretically secure construction, we find that the security of the practical implementations is harder to prove because of uncertainty about the amounts of entropy in the shared noisy inputs. The protocol nevertheless has the characteristics of practical security. Additionally, we describe information-theoretically secure alternatives derived from available theorems in the literature.

Place, publisher, year, edition, pages
Institutt for telematikk , 2014. , 94 p.
URN: urn:nbn:no:ntnu:diva-25892Local ID: ntnudaim:11051OAI: diva2:742063
Available from: 2014-08-29 Created: 2014-08-29 Last updated: 2014-08-29Bibliographically approved

Open Access in DiVA

fulltext(11676 kB)519 downloads
File information
File name FULLTEXT01.pdfFile size 11676 kBChecksum SHA-512
Type fulltextMimetype application/pdf
cover(184 kB)11 downloads
File information
File name COVER01.pdfFile size 184 kBChecksum SHA-512
Type coverMimetype application/pdf

By organisation
Department of Telematics

Search outside of DiVA

GoogleGoogle Scholar
Total: 519 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 19 hits
ReferencesLink to record
Permanent link

Direct link