Wireless key exchange on the physical layer is a key exchange protocol independent of computational assumptions. It relies only on the physical properties of the wireless channels to generate a common secret key between two parties. Precise conditions, however, for such a key exchange to be secure remain unclear. An argument why unconditional security does not hold for general scenarios is provided. Finally, a novel side-channel attack against such key exchange schemes is described and experimentally validated. © 2011 Springer-Verlag.
CITATION STYLE
Döttling, N., Lazich, D., Müller-Quade, J., & De Almeida, A. S. (2011). Vulnerabilities of wireless key exchange based on channel reciprocity. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6513 LNCS, pp. 206–220). Springer Verlag. https://doi.org/10.1007/978-3-642-17955-6_15
Mendeley helps you to discover research relevant for your work.