Abstract
Key distribution is a growing concern for symmetric cryptography. Most of the current key-distribution mechanisms assume the use of the Internet and WAN networks, which are exposed to security hazards. To overcome them, the use of comprehensive and robust cryptographic mechanisms such as Diffie–Hellman (DH) and RSA (Rivest–Shamir–Adleman) algorithms are proposed. These solutions are limited. DH and RSA have been under threat since the introduction of quantum computing. Hence, new ideas are required. This paper introduces a new security approach for a safe key transmission using undetected high-speed optical camera communication (OCC), which is based on the rolling shutter effect of modern smart cameras. The key transfer is done by blinking light-emitting diode (LED) lights in a specific sequence and frequency, following an encoding pattern. The receiver decodes the received blinks to a bit string using a corresponding image processing application. This optical media ensures secure transfer without the ability to quote it. We demonstrate in an experiment the feasibility of using basic wireless optical communication for key transmission, eliminating the need for a permanent, long, and costly setup. It is mobile, available everywhere anytime, and requires only simple connections to operate. The results show that this method is feasible, robust, efficient, and implementable.
Highlights
Extra efforts are required for protecting the processing of sensitive data
The main risk of this approach is the possibility of discovering the secret key while it is exchanged between the two communicating parties
One of the technics is based on under-sampled differential phase shift on–off keying that can encode binary data
Summary
Extra efforts are required for protecting the processing of sensitive data These security efforts should follow the entire life cycle of a given data element, such as records, files, and databases. With the growing accessibility of quantum computing, these solutions are losing pace over time Another approach is by establishing a reliable third party who generates certificates and encryption keys and simultaneously distributes them to the two parties who intend to exchange data. These parties use alternate distribution channels that are different from the channels the two parties use to transfer the data.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have