Show simple item record

dc.contributor.authorStevens, CJ
dc.contributor.authorAllen, B
dc.contributor.authorBrown, AK
dc.date.accessioned2023-11-15T14:21:31Z
dc.date.available2023-09-26
dc.date.available2023-11-15T14:21:31Z
dc.date.issued2023-10
dc.identifier.issn2054-5703
dc.identifier.urihttps://qmro.qmul.ac.uk/xmlui/handle/123456789/91911
dc.description.abstractWe propose a method by which two radio frequency (RF) communication terminals exchange encryption keys or other data securely. This method draws on the approach developed for quantum key distribution (QKD) for detecting eavesdroppers but our method does not use any quantum properties at all. Instead, by exploiting the effects an eavesdropper has on channel stability, we explore a line-of-sight link radio in which data transfer rates are so high as to approach the Shannon limit. With very steep rises in bit error rate accompanying a small degradation of signal-to-noise limits for certain forward error correction codes, it becomes possible to infer the existence of an eavesdropper before they are able to obtain a complete key. We describe our method and analyse one possible implementation using low density parity check codes with quadrature phase shift keying modulation. The proposed technique is in principle far easier to implement than quantum-based approaches for RF and optical wireless links since the required hardware is readily available and the basic principles are well known and well understood. Finally, we show our method to have a higher key rate and spectral efficiency than those of QKD.en_US
dc.format.extent230411 - ?
dc.languageeng
dc.publisherThe Royal Society Publishingen_US
dc.relation.ispartofR Soc Open Sci
dc.rightsPublished by the Royal Society under the terms of the Creative Commons Attribution License http://creativecommons.org/licenses/by/4.0/, which permits unrestricted use, provided the original author and source are credited.
dc.rightsAttribution 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/us/*
dc.subjectcommunication system securityen_US
dc.subjectcryptographyen_US
dc.subjectforward error correction codesen_US
dc.subjectmodulation and codingen_US
dc.subjectwireless cryptographyen_US
dc.titleSecure key distribution exploiting error rate criticality for radio frequency links.en_US
dc.typeArticleen_US
dc.rights.holder© 2023 The Authors.
dc.identifier.doi10.1098/rsos.230411
pubs.author-urlhttps://www.ncbi.nlm.nih.gov/pubmed/37859839en_US
pubs.issue10en_US
pubs.notesNot knownen_US
pubs.publication-statusPublished onlineen_US
pubs.volume10en_US
dcterms.dateAccepted2023-09-26
rioxxterms.funderDefault funderen_US
rioxxterms.identifier.projectDefault projecten_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Published by the Royal Society under the terms of the Creative Commons Attribution License http://creativecommons.org/licenses/by/4.0/, which permits unrestricted use, provided the original author and source are credited.
Except where otherwise noted, this item's license is described as Published by the Royal Society under the terms of the Creative Commons Attribution License http://creativecommons.org/licenses/by/4.0/, which permits unrestricted use, provided the original author and source are credited.