A Key Set Cipher for Wireless Sensor Networks

Similar documents
Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

CHAPTER 2 LITERATURE STUDY

Algorithms for Memory Hierarchies Lecture 14

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

Convolutional Networks. Lecture slides for Chapter 9 of Deep Learning Ian Goodfellow

Example. Check that the Jacobian of the transformation to spherical coordinates is

Understanding Basic Analog Ideal Op Amps

Domination and Independence on Square Chessboard

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties

A Development of Earthing-Resistance-Estimation Instrument

MATH 118 PROBLEM SET 6

Application of Wavelet De-noising in Vibration Torque Measurement

(CATALYST GROUP) B"sic Electric"l Engineering

First Round Solutions Grades 4, 5, and 6

Synchronous Machine Parameter Measurement

ECE 274 Digital Logic. Digital Design. Datapath Components Shifters, Comparators, Counters, Multipliers Digital Design

Multi-beam antennas in a broadband wireless access system

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Development and application of a patent-based design around. process

The Discussion of this exercise covers the following points:

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator)

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks

Rek Molva, Alain Pannetrat. Institut Eurecom, Sophia-Antipolis, France. cryptographic keying material.

Synchronous Machine Parameter Measurement

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter

Synchronous Generator Line Synchronization

Adaptive Network Coding for Wireless Access Networks

EQ: What are the similarities and differences between matrices and real numbers?

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week

Student Book SERIES. Patterns and Algebra. Name

EE Controls Lab #2: Implementing State-Transition Logic on a PLC

MEASURE THE CHARACTERISTIC CURVES RELEVANT TO AN NPN TRANSISTOR

Study on SLT calibration method of 2-port waveguide DUT

Address for Correspondence

Design And Implementation Of Luo Converter For Electric Vehicle Applications

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

Application Note. Differential Amplifier

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17.

Application of AHP in the Analysis of Flexible Manufacturing System

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Math Circles Finite Automata Question Sheet 3 (Solutions)

Geometric quantities for polar curves

Make Your Math Super Powered

Experiment 3: Non-Ideal Operational Amplifiers

Three-Phase NPC Inverter Using Three-Phase Coupled Inductor

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

Engineer-to-Engineer Note

Experiment 3: Non-Ideal Operational Amplifiers

Abacaba-Dabacaba! by Michael Naylor Western Washington University

Congruences for Stirling Numbers of the Second Kind Modulo 5

April 9, 2000 DIS chapter 10 CHAPTER 3 : INTEGRATED PROCESSOR-LEVEL ARCHITECTURES FOR REAL-TIME DIGITAL SIGNAL PROCESSING

Triangles and parallelograms of equal area in an ellipse

& Y Connected resistors, Light emitting diode.

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Topic 20: Huffman Coding

Spiral Tilings with C-curves

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

Joanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office

A Simple Approach to Control the Time-constant of Microwave Integrators

Robustness Analysis of Pulse Width Modulation Control of Motor Speed

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

EET 438a Automatic Control Systems Technology Laboratory 5 Control of a Separately Excited DC Machine

ECE 274 Digital Logic

10.4 AREAS AND LENGTHS IN POLAR COORDINATES

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type)

Engineer-to-Engineer Note

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

NUMBER THEORY Amin Witno

Design of FPGA-Based Rapid Prototype Spectral Subtraction for Hands-free Speech Applications

Polar Coordinates. July 30, 2014

To provide data transmission in indoor

Kyushu Institute of Technology

Compared to generators DC MOTORS. Back e.m.f. Back e.m.f. Example. Example. The construction of a d.c. motor is the same as a d.c. generator.

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

Modeling of Inverter Fed Five Phase Induction Motor using V/f Control Technique

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Outcome Matrix based Phrase Selection

Genetic Representations for Evolutionary Minimization of Network Coding Resources

Exponential-Hyperbolic Model for Actual Operating Conditions of Three Phase Arc Furnaces

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion

Mixed CMOS PTL Adders

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units

9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations

Electrically Large Zero-Phase-Shift Metamaterial-based Grid Array Antenna for UHF Near-Field RFID Readers

Keywords Semi-Fragile, Digital watermarking, Toeplitz matrix, Image Authentication, Content based watermarking.

Theme: Don t get mad. Learn mod.

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009

Solutions to exercise 1 in ETS052 Computer Communication

Analog computation of wavelet transform coefficients in real-time Moreira-Tamayo, O.; Pineda de Gyvez, J.

Transcription:

A Key Set Cipher for Wireless Sensor etworks Subhsh Kk Abstrct This pper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks (WS) nd similr computing resource-constrined pplictions. Such system, with ech user ssigned bunch of privte key vectors with corresponding public identifiers to generte session keys, is hrder to brek thn where single key is used. The set of keys nd identifiers re generted by suitble mthemticl opertion by the trusted prty nd ssigned to users. A specific cryptogrphic system described in the pper is bsed on the use of fmily of self-inverting mtrices derived from the number theoretic Hilbert trnsform (HT) in conjunction with the Blom s scheme. In rndomized version of this scheme, the users chnge their published IDs t will but the prties cn still rech greement on the key by using their individul scling fctors. The rndom protocol increses the security of the system. Keywords: Key sets, number theoretic Hilbert trnsform, cryptogrphy, Blom s scheme, key distribution Introduction Wireless sensor networks (WSs) help to connect vriety of power-constrined devices to the Internet. To ensure security in the communictions with these devices vriety of key mngement schemes (KMS) re used of which the principl ones use key pooling, mthemticl lgorithms, or public key cryptogrphy. The fctors in deciding which scheme to use re bsed on memory requirements, communiction overhed, processing speed, network bootstrpping, connectivity, sclbility, extensibility, nd energy requirement []. Of the mthemticl lgorithms used, the mtrix-bsed Blom scheme hs found mny pplictions such s in Highbndwidth Digitl Content Protection (HDCPv). Ech HDCP-cpble device hs unique set of -bit keys. For ech set of vlues, specil -bit public key clled KSV (Key Selection Vector) is creted. During uthentiction, the prties exchnge their KSVs using Blom's scheme leding to shred -bit number, which is lso used to encrypt dt. The HDCP method is used in DVD, HD DVD, Blu-ry Disc plyers, computer video crds, TVs nd digitl projectors. In the bsic Blom s scheme [], the trusted uthority gives ech user secret key nd corresponding public identifier to enble ny two prticipnts to independently crete shred key for secure communiction. The Blom scheme is different from either key pooling or public key techniques in tht ny two users discover unique key between the two of them. In contrst, there cn be different wys two users cn communicte in network using key pooling, nd in public key cryptogrphy, the users cn chnge their privte nd public keys, if only in principle.

Therefore nother wy to distinguish between KMS schemes is whether they involve use of single keys or multiple keys between ny pir of users. The use of multiple keys is of specil dvntge in mking the tsk of the evesdropper more difficult. Such use cn lso be of vlue in forensics. The prdigm of multiple keys for ech user hs ntecedents tht go bck in history in socil systems (in the mny wys personhood is defined) [] nd there exist prllels in the biologicl relm. This ide is of philosophicl vlidity to problems tht go beyond sfegurding wireless sensor networks. In digitl networks, mny individuls mintin different identifiers rnging from two (one t work nd nother t home) to severl. Some of these identities re motivted by the need for nonymity. In this pper we look t wys of enhncing Blom s mtrix bsed scheme so tht it cn support key sets for the users. Such n enhncement poses greter chllenge to the evesdropper s compred to simply incresing the size of the key. The Blom scheme [] is bsed on two different non-squre mtrices X (n m) nd Y (m n) whose product mod p (p is suitbly lrge prime) is the symmetric mtrix K (n n). The mtrix X is used to generte the users keys nd the mtrix Y is used to generte the corresponding public identifiers. An obvious wy to hve lrge key set is to use set of indexed X nd Y mtrices. There exist vriety of wys to determine X nd Y []. We cn ssume tht these indexed mtrices re obtined by mens of suitble liner trnsformtions on n initil member. For this propose the use of HT-circulnt mtrices which re orthogonl in the sme Z p s Blom s mtrix. Given tht the key pirs re bsed on different mtrices, the tsk of breking the system hs been mde more difficult. Since the question of security of the Blom scheme is well nlyzed [],[],[], here we only describe the construction ssocited with the genertion of the key set nd the corresponding system identifiers. We lso present rndomized scheme in which ech user publishes subset of the identifiers nd chnges them with time. This requires scheme to normlize the keys generted by the use of different identifiers. Mtrix Bsed Keys In the Blom scheme, the row i of X represents the secret key of User i (X i, X i,, X im ) nd the column i of Y represents the public identifier of the User i (Y i, Y i,, Y mi ). Let Alice be User i nd Bob be User j. The size of the key nd the public identifier is m. Alice finds the key by multiplying her privte key vector with the identifier (public key) of Bob thus getting K ij. Likewise, Bob multiplies his privte key with the identifier of Alice thus getting K ji. Since the mtrix K is symmetric, Alice nd Bob obtin the sme number which cn be used s the rw key: K ij = X Y () α iα αj

Definition. The vlue of K ii will be clled the scle of the key of User i. It will lso be represented by S. We will see lter tht the key scle plys criticl role in the determintion of the common key in the rndomized version of the lgorithm. Exmple. Let X= K= mod, nd Y= mod mod () If Alice is User nd Bob is User, then Alice s secret key: (,, ) Alice s public identifier: (,, ) () Bob s secret key: (,, ) Bob s public identifier: (,, ). () Their shred key is found by computing the inner product of the secret key nd public identifier vectors. The shred key: As computed by Alice: + + = mod = As computed by Bob: + + = mod = The key scles of Alice nd Bob re nd, respectively, nd they will be clled S Alice nd S Bob. Modified Scheme to Generte Key Sets The Trusted Authority cn generte lrge number of equivlent keys by using pproprite mtrix trnsformtions on known solution (Figure ). Given the constrint of fixed m (size of the key), the mtrix trnsformtion cn either be n outer trnsformtion (n n) or n inner trnsformtion (m m).

Key Key Key Key Key m Alice ID ID ID ID IDm ID ID ID ID IDm Bob Key Key Key Key Key m The keys of User i re defined s follows: Figure. A mtrix-bsed key-set scheme Tble. User i s Key nd Identifier Set User i: Index Secret Key X(row i) Public Identifier Y(column i) X() Y() X() Y() X() Y()... M X(m) Y(m) Outer trnsformtion: Form new X nd Y by the following trnsformtions: nd X new = UX nd Y new = YV () K new = UXYV = UKV () There re different wys to choose U nd V (ech of which will be n n mtrix) but one esy method would be to pick them s symmetric mtrices. Inner trnsformtion: Form new X nd Y by the following trnsformtions: X new = XR nd Y new = SY () so tht the product below remins symmetric mtrix: K new = XRSY () Specificlly, we will consider the following inner trnsformtions:

X new = XR where Y new = R T Y, nd RR T = wi mod p () This will chnge the scles of the keys by the fctor w. The mtrix R in () represents set whose trnspose is its inverse (up to constnt). It is relted to the number theoretic Hilbert trnsform (HT) [], which is derived from the stndrd discrete Hilbert trnsform []-[]. The HT is circulnt mtrix with lternting entries of ech row being zero nd non-zero numbers nd trnspose modulo prime is its inverse. The discrete Hilbert trnsform hs pplictions is vriety of res of signl processing such s spectrl nlysis in -D reconstruction []-[], multilyered computtions [],[], nd cryptogrphy []-[]. A circulnt mtrix is used in the mix columns of the Advnced Encryption Stndrd. Periodic sequences tht re orthogonl for ll shifts nd their potentil pplictions were recently presented [],[]. Some further properties of circulnt mtrices relevnt to our pper re given in []. Exmple Contd. For Alice s User i nd Bob s User j, let us ssume tht Alice decided to use Bob s th identifier. She sends this informtion to Bob in the pre-communiction hndshke so tht Bob will use the corresponding secret key. The key found by Alice nd Bob would now be: K = Alice (secret key ) Bob (identifier ) = Bob (secret key ) Alice (identifier ) If the set of mtrices R is so chosen tht w in eqution () equls, then the key obtined will be sme irrespective of wht row in Tble is chosen. The Mtrix R nd the Key Set Consider the relted mtrix R, which is identicl to HT mtrix with the exception tht its s hve been purged. R =..... mod p () The sequence,,,..., my be considered rndom sequence. For considertion s sequence, we ssume tht the genertor is periodic, i.e. + i = i. If we don t insist on normliztion, it will stisfy the following properties under the condition: i= i mod p = w ()

C( k) = i+ k i= i mod p = for ll k () Property mens tht the sequence A =,,,..., my be considered truly rndom sequence with utocorreltion function, C(k), tht is zero everywhere excepting t k=. It is lso cler tht w A would be nother rndom sequence for which the utocorreltion function t the origin will be w mod p nd its vlue everywhere else will be. The pek vlue of the utocorreltion is obtined from the sequence for which w mod p = p-. Let us go bck to Exmple. The mtrix required there is. The generl R mtrix for which b c RR T =wi my be tken to be c b, but since we wnt flexibility regrding w, this could be b c replced by R= b b b () This leds to the conditions: w = + + b mod p () nd + b + b = mod p () Eqution () my be esily solved. We hve b( + ) = mod p. This my be rewritten s p b = mod p () + Since our exmple ws concerning p =, we cn solve () for different choices of nd b s given in Tble below: Tble. Solutions to eqution () for the mtrix b w

Suppose we pick = nd b=. For this choice the vlue of w is nd therefore the new key will be the old key multiplied by. The new X nd Y mtrices would now be: X new = mod = () Likewise, the new Y mtrix will be: Y new =R T Y old () In other words, Y new = mod = () The new K mtrix is: K new = () Clerly K new = K s expected. It so turns out tht the choices for the R mtrix for this exmple (Tble ) belong to two groups: Group :

Group : In the modified scheme, the secret key nd public identifier will be indexed s follows: Alice s Secret Key nd Public Identifier Tble (User ): Tble. Alice s key, identifier vectors, nd scles Index(,b, c) Secret Key Public Identifier K =S Alice (originl),,,, (,, ),,,, (,, ),,,, (,, ),,,, (,, ),,,, (,, ),,,, Bob s Secret Key nd Public Identifier Tble (User ): Tble. Bob s key nd identifier vectors Index(, b, c) Secret Key Public Identifier K =S Bob (originl),,,, (,, ),,,, (,, ),,,, (,, ),,,, (,, ),,,, (,, ),,,, Mny vrints of this system my be proposed. This includes the cses where the size of the key itself cn vry mking the tsk of the evesdropper even more complex.

Use of Rndom Subset of the Key Set We now describe rndom vrint of the scheme outlined in the previous section where ech user rndomly publishes different subset of the public identifier set t different times. This is chieved by the user publishing the rndom subset nd lso nnouncing the time durtion for which it is effective. The chllenge is tht severl mtrices re in ply in the different public identifiers vilble to the users nd the two prties my not shre the sme identifier index. This necessittes the use of the scling fctors by the two prties nd prior greement tht the scling be done with respect to specific index. This greement cn be negotiting in the set-up nd it cretes n dditionl prmeter dding to the security. Here, in our exmple, it will be ssumed tht the scling will be done with respect to index. The key genertion will hve two steps: in the first one, ech user discovers rw key which my be different for different users; in the second, the rw key is chnged using the personl scling fctor by ech prty. In our running exmple, let Alice rndomly pick the identifiers nd, nd let Bob rndomly pick the identifier nd (Figure ). In other words, Alice publishes Index, Public ID,, Index, Public ID,, Bob publishes Index, Public ID,, Index, Public ID,, Alice ID ID ID ID Bob Figure. Rndomized key-set scheme (ech user publishes subset of the IDs) Alice computes her scle K for Bob s Index nd Index nd likewise Bob computes his scle K for Alice s Index nd Index. These scle vlues re: For Alice: Scles for Indices nd re: nd, respectively For Bob, Scles for Indices nd re: nd, respectively In order to initite the discovery of the common key, Alice picks, sy Index ID of Bob, with its sequence,,. Likewise, Bob picks one of the vilble IDs of Alice, sy Index, with the sequence,,.

Genertion of Rw Key Alice computes the product (Alice Secret Key Bob s Identifier ) = (,, ) (,, ) = mod. This is Alice s rw key. Bob computes the product (Bob s Secret Key Alice s Identifier ) = (,, ) (,, ) = mod. This Bob s rw key. Genertion of Finl Key The finl key is computed by normlizing the rw key with respect to the common greed identifier index vlue for the communicting prties tht hs been tken to be. Alice s finl key = Alice s rw key S S Alice ( CommonIndex) ( CurrentIndex) Alice () Bob s finl key = Bob s rw key S Bob ( CommonIndex) () S ( CurrentIndex) Bob From Tble, S Alice (CommonIndex=) = nd S Alice (CurrentIndex=)=, nd from Tble, S Bob (CommonIndex=) = nd S Bob (CurrentIndex=) =. Therefore, Alice s finl key= / mod = Bob s finl key = / mod = = mod = () Suppose the common index chosen ws, then the vlues of S Alice (CommonIndex=) = nd S Bob (CommonIndex=) = (both from Tble ), nd plugging these in, the finl key for both the prties turns out to be. The security of the rndom protocol would depend not only on the size of the key nd p, but lso on the number of keys in the key set nd the mnner in which the subsets re chosen nd chnged in the rndom version of the scheme. Conclusions The dvntge of the proposed enhncement (both the complete nd the rndomized versions) to the Blom s scheme is tht it increses the cost of breking the cipher for the evesdropper. The correct common key cn be generted only upon the use of the scling keys s in equtions () nd () nd these re not vilble to the evesdropper. The common index used for the normliztion of the scling need not be published by ny of the prties nd this resides s secret fctor within the node. A description of the use of the cipher

proposed in this pper s forml protocol would require severl choices relted to the detils of the system tht will depend on the ppliction in hnd. The Blom-scheme bsed HDCPv ws hcked lthough its use hs continued bsed on legl protections [] nd HDCPv is bsed on different scheme []. The strengthening of the mtrix-bsed Blom s scheme is importnt nd the methods presented in this pper cn be n ttrctive option for resource-limited nodes of sensor network nd in specilized highbndwidth digitl content security. The Blom scheme is relted to threshold secret shring schemes [],[] in the sense tht the system is secure unless certin number of users hve been compromised. It will be interesting to explore nlogs of spce-efficient secret shring schemes [],[] for mtrix-bsed WS key distribution. References. C. Alcrz, J. Lopez, R. Romn, nd H. - H. Chen, Selecting key mngement schemes for WS pplictions. Computers & Security : - (). R. Blom, An optiml clss of symmetric key genertion systems, Advnces in Cryptology: Eurocrypt (T. Beth,. Cot nd I. Ingemrsson, eds.) LCS, - (). S. Kk, Ritul, msks, nd scrifice. Studies in Humnities nd Socil Sciences, Indin Institute of Advnced Study, Shiml (). A. Prkh nd S. Kk, Mtrix bsed key greement lgorithms for sensor networks. Proceedings of IEEE Advnced etworks nd Telecommunictions Conference (ATS ), Bnglore ( ). H. Chn, A. Perrig nd D. Song, Rndom key predistribution schemes for sensor networks, IEEE Sumposium on Reserch in Security nd Privcy, - (). C. J. Colbourn nd J.H. Dinitz, The CRC Hndbook of Combintoril Designs, CRC Press, ). W. Du, J. Deng, Y. S. Hn nd P. K. Vrshney, A pirwise key pre-distribution scheme for wireless sensor networks, Proc. of the th ACM conf. on Computer nd communictions Security, - (). S. Kk, The number theoretic Hilbert trnsform. rxiv:.. S. Kk, The discrete Hilbert trnsform. Proc. IEEE, - (). S. Kk, Hilbert trnsformtion for discrete dt. Interntionl Journl of Electronics, - (). S. Kk, The discrete finite Hilbert trnsform. Indin Journl Pure nd Applied Mthemtics, - (). S.K. Pdl nd K.M.M. Prbhu, Systolic rrys for the discrete Hilbert trnsform. Circuits, Devices nd Systems, IEE Proceedings, - (). F. W. King, Hilbert Trnsforms. Cmbridge University Press (). I.G. Roy, On robust estimtion of discrete Hilbert trnsform of noisy dt. Geophysics, (). S. Kk nd.s. Jynt, Speech encryption using wveform scrmbling. Bell System Technicl Journl, - ()

..S. Jynt nd S. Kk, Uniform permuttion privcy system, US Ptent o.,,, July (). S. Kk, Multilyered rry computing. Informtion Sciences, - (). S. Kk, A two-lyered mesh rry for mtrix multipliction. Prllel Computing, - (). R. Kndregul, The bsic discrete Hilbert trnsform with n informtion hiding ppliction.. rxiv:.. V.K. Kotgiri, The -point nd -point number theoretic Hilbert trnsform. rxiv:.. V.K. Kotgiri, ew results on the number theoretic Hilbert trnsform. rxiv:.. S. Kk, A clss of orthogonl sequences. rxiv:.. V.K. Kotgiri, Rndom residue sequences nd the number theoretic Hilbert trnsform. rxiv:.. S. Kk, Properties of HT-circulnt mtrices. http://www.cs.okstte.edu/~subhshk/nhtcirculnt_properties.pdf. D. Krvets, Intel thretens to sue nyone who uses HDCP crck. Wired (). J. Zho, D. Gu, Y. Li, W. Cheng, On weknesses of the HDCP uthentiction nd key exchnge protocol nd its repir. Mthemticl nd Computer Modelling : - (). G.R. Blkley, Sfegurding cryptogrphic keys. Proceedings of the tionl Computer Conference : (). A. Shmir, How to shre secret". Communictions of the ACM (): (). A. Prkh nd S. Kk, Online dt storge using implicit security. Informtion Sciences : - (). A. Prkh nd S. Kk, Spce efficient secret shring for implicit dt security. Informtion Sciences : - ()