IEEE Consumer Electronics Magazine - October 2015 - 59

Message
UTF-8 in Hex
Original Message
Alice's Key
Encrypt for Bob
Bob's Key
Encrypt to Alice
Decrypt by Alice
Resent to Bob
Decrypt by Bob
Final Message
Final Message UTF-8
Recovered Message

i
79
10011110
11011011
01000101
00110000
01110101
11011011
10101110
00110000
10011110
79
i

P
50
00001010
01010010
01011000
11110100
10101100
01010010
11111110
11110100
00001010
50
P

a
61
10000110
10001010
00001100
00011100
00010000
10001010
10011010
00011100
10000110
61
a

d
64
00100110
11100111
11000001
01101001
10101000
11100111
01001111
01101001
00100110
64
d

Printable "iPad"
Little Endian
0xDB4A51E7
Bit-by-Bit XOR
0x0C2F8396
Bit-by-Bit XOR
0xDB4A51E7
Bit-by-Bit XOR
0x0C2F8396
Bit-by-Bit XOR
"iPad"

FIGURE 4. An example of using digital keys to encrypt and decrypt data.

Is access to my devices secure from unauthorized agents?
(Key generation)
▼ Is my data safe from eavesdropping? (Encryption)
▼ Is my data believed by the receiver? (Authentication)
▼ Can I be followed? (Privacy.)
Any communication can be intercepted. This is true for
wired or wireless connections. A lot of work has been done in
the past few decades to invent and extend methods to make
communications secure enough for end users.
▼

KEY GENERATION
A crucial early advance was to find a way for communicators
to create and exchange secrets that were carried over a media
that could be intercepted. The most widely used method is
based on public key cryptography by Diffie, Hellman, and
Merkel [53]. Methods derived from this are used to generate
encryption keys and authentication keys for a variety of systems, including point-to-point radios (like 802.11, 802.15.4,
and Bluetooth) and system-to-system communications over
the Internet.
Let us illustrate public key cryptography with a physical
analogy: assume a postal system that can be intercepted. Suppose that an agent (Alice) has a box with room for two padlocks. She composes a secret, inserts it into the box, padlocks
it with her lock, and ships the box to a second agent (Bob).
Interceptors can get their hands on the box, but we assume
that they are not capable of breaking Alice's padlock. Bob
cannot open the box either, but he can put his own second
padlock on the box. He can then send it back to Alice. She
can remove her own padlock and send it back to Bob-with
his padlock still attached. He can unlock the second padlock
with his own key and recover the secret (Figure 3).

ENCRYPTION
In digital communications, the keys are long strings of bits that
are used to make Exclusive OR (XOR) combinations with the
original plain text data, on a bit-by-bit basis. If the receiving
device has the same keys, reapplying XOR operation on a

bit-by-bit basis recovers the original plain text. In modern systems, these keys are 128 bits long.
Figure 4 shows how a digital key might be used to encrypt
and decrypt a message. The keys are shortened and this illustration only uses 32 bits. Each character is shown printable
and represented in a two-digit hexadecimal notation, in bigendian order per character. The two public keys for Bob and
Alice are randomly generated, but used twice, analogous to
their use in Figure 3.
The methods must also be careful to avoid exposing
known plain text, because if they do then hackers can simply
apply an XOR with known plain text and recover the keys.
Modern key generation methods go to a lot of effort to avoid
exposing known plain text. In these methods, a final step is
for each agent to independently derive the keys, and then
encrypt some exchanged data so that each agent can confirm
that the other agent has a matching key.

Open Mobile Alliance has
standardized a method for
encoding these applications
over CoAP.

AUTHENTICATION
These methods also combine plain text with the primary keys
through one-way mathematical functions to generate shorter
authentication keys. In the above connectivity examples,
octets were added for authentication, so that the receivers can
trust the sources of the data.
These security methods can and should be used in two places:
1) device-to-device to secure each connection
2) end-to-end to secure each relationship.
october 2015

^

IEEE ConsumEr ElECtronICs magazInE

59



Table of Contents for the Digital Edition of IEEE Consumer Electronics Magazine - October 2015

IEEE Consumer Electronics Magazine - October 2015 - Cover1
IEEE Consumer Electronics Magazine - October 2015 - Cover2
IEEE Consumer Electronics Magazine - October 2015 - 1
IEEE Consumer Electronics Magazine - October 2015 - 2
IEEE Consumer Electronics Magazine - October 2015 - 3
IEEE Consumer Electronics Magazine - October 2015 - 4
IEEE Consumer Electronics Magazine - October 2015 - 5
IEEE Consumer Electronics Magazine - October 2015 - 6
IEEE Consumer Electronics Magazine - October 2015 - 7
IEEE Consumer Electronics Magazine - October 2015 - 8
IEEE Consumer Electronics Magazine - October 2015 - 9
IEEE Consumer Electronics Magazine - October 2015 - 10
IEEE Consumer Electronics Magazine - October 2015 - 11
IEEE Consumer Electronics Magazine - October 2015 - 12
IEEE Consumer Electronics Magazine - October 2015 - 13
IEEE Consumer Electronics Magazine - October 2015 - 14
IEEE Consumer Electronics Magazine - October 2015 - 15
IEEE Consumer Electronics Magazine - October 2015 - 16
IEEE Consumer Electronics Magazine - October 2015 - 17
IEEE Consumer Electronics Magazine - October 2015 - 18
IEEE Consumer Electronics Magazine - October 2015 - 19
IEEE Consumer Electronics Magazine - October 2015 - 20
IEEE Consumer Electronics Magazine - October 2015 - 21
IEEE Consumer Electronics Magazine - October 2015 - 22
IEEE Consumer Electronics Magazine - October 2015 - 23
IEEE Consumer Electronics Magazine - October 2015 - 24
IEEE Consumer Electronics Magazine - October 2015 - 25
IEEE Consumer Electronics Magazine - October 2015 - 26
IEEE Consumer Electronics Magazine - October 2015 - 27
IEEE Consumer Electronics Magazine - October 2015 - 28
IEEE Consumer Electronics Magazine - October 2015 - 29
IEEE Consumer Electronics Magazine - October 2015 - 30
IEEE Consumer Electronics Magazine - October 2015 - 31
IEEE Consumer Electronics Magazine - October 2015 - 32
IEEE Consumer Electronics Magazine - October 2015 - 33
IEEE Consumer Electronics Magazine - October 2015 - 34
IEEE Consumer Electronics Magazine - October 2015 - 35
IEEE Consumer Electronics Magazine - October 2015 - 36
IEEE Consumer Electronics Magazine - October 2015 - 37
IEEE Consumer Electronics Magazine - October 2015 - 38
IEEE Consumer Electronics Magazine - October 2015 - 39
IEEE Consumer Electronics Magazine - October 2015 - 40
IEEE Consumer Electronics Magazine - October 2015 - 41
IEEE Consumer Electronics Magazine - October 2015 - 42
IEEE Consumer Electronics Magazine - October 2015 - 43
IEEE Consumer Electronics Magazine - October 2015 - 44
IEEE Consumer Electronics Magazine - October 2015 - 45
IEEE Consumer Electronics Magazine - October 2015 - 46
IEEE Consumer Electronics Magazine - October 2015 - 47
IEEE Consumer Electronics Magazine - October 2015 - 48
IEEE Consumer Electronics Magazine - October 2015 - 49
IEEE Consumer Electronics Magazine - October 2015 - 50
IEEE Consumer Electronics Magazine - October 2015 - 51
IEEE Consumer Electronics Magazine - October 2015 - 52
IEEE Consumer Electronics Magazine - October 2015 - 53
IEEE Consumer Electronics Magazine - October 2015 - 54
IEEE Consumer Electronics Magazine - October 2015 - 55
IEEE Consumer Electronics Magazine - October 2015 - 56
IEEE Consumer Electronics Magazine - October 2015 - 57
IEEE Consumer Electronics Magazine - October 2015 - 58
IEEE Consumer Electronics Magazine - October 2015 - 59
IEEE Consumer Electronics Magazine - October 2015 - 60
IEEE Consumer Electronics Magazine - October 2015 - 61
IEEE Consumer Electronics Magazine - October 2015 - 62
IEEE Consumer Electronics Magazine - October 2015 - 63
IEEE Consumer Electronics Magazine - October 2015 - 64
IEEE Consumer Electronics Magazine - October 2015 - 65
IEEE Consumer Electronics Magazine - October 2015 - 66
IEEE Consumer Electronics Magazine - October 2015 - 67
IEEE Consumer Electronics Magazine - October 2015 - 68
IEEE Consumer Electronics Magazine - October 2015 - 69
IEEE Consumer Electronics Magazine - October 2015 - 70
IEEE Consumer Electronics Magazine - October 2015 - 71
IEEE Consumer Electronics Magazine - October 2015 - 72
IEEE Consumer Electronics Magazine - October 2015 - 73
IEEE Consumer Electronics Magazine - October 2015 - 74
IEEE Consumer Electronics Magazine - October 2015 - 75
IEEE Consumer Electronics Magazine - October 2015 - 76
IEEE Consumer Electronics Magazine - October 2015 - 77
IEEE Consumer Electronics Magazine - October 2015 - 78
IEEE Consumer Electronics Magazine - October 2015 - 79
IEEE Consumer Electronics Magazine - October 2015 - 80
IEEE Consumer Electronics Magazine - October 2015 - 81
IEEE Consumer Electronics Magazine - October 2015 - 82
IEEE Consumer Electronics Magazine - October 2015 - 83
IEEE Consumer Electronics Magazine - October 2015 - 84
IEEE Consumer Electronics Magazine - October 2015 - 85
IEEE Consumer Electronics Magazine - October 2015 - 86
IEEE Consumer Electronics Magazine - October 2015 - 87
IEEE Consumer Electronics Magazine - October 2015 - 88
IEEE Consumer Electronics Magazine - October 2015 - 89
IEEE Consumer Electronics Magazine - October 2015 - 90
IEEE Consumer Electronics Magazine - October 2015 - 91
IEEE Consumer Electronics Magazine - October 2015 - 92
IEEE Consumer Electronics Magazine - October 2015 - 93
IEEE Consumer Electronics Magazine - October 2015 - 94
IEEE Consumer Electronics Magazine - October 2015 - 95
IEEE Consumer Electronics Magazine - October 2015 - 96
IEEE Consumer Electronics Magazine - October 2015 - 97
IEEE Consumer Electronics Magazine - October 2015 - 98
IEEE Consumer Electronics Magazine - October 2015 - 99
IEEE Consumer Electronics Magazine - October 2015 - 100
IEEE Consumer Electronics Magazine - October 2015 - 101
IEEE Consumer Electronics Magazine - October 2015 - 102
IEEE Consumer Electronics Magazine - October 2015 - 103
IEEE Consumer Electronics Magazine - October 2015 - 104
IEEE Consumer Electronics Magazine - October 2015 - 105
IEEE Consumer Electronics Magazine - October 2015 - 106
IEEE Consumer Electronics Magazine - October 2015 - 107
IEEE Consumer Electronics Magazine - October 2015 - 108
IEEE Consumer Electronics Magazine - October 2015 - 109
IEEE Consumer Electronics Magazine - October 2015 - 110
IEEE Consumer Electronics Magazine - October 2015 - 111
IEEE Consumer Electronics Magazine - October 2015 - 112
IEEE Consumer Electronics Magazine - October 2015 - 113
IEEE Consumer Electronics Magazine - October 2015 - 114
IEEE Consumer Electronics Magazine - October 2015 - 115
IEEE Consumer Electronics Magazine - October 2015 - 116
IEEE Consumer Electronics Magazine - October 2015 - 117
IEEE Consumer Electronics Magazine - October 2015 - 118
IEEE Consumer Electronics Magazine - October 2015 - 119
IEEE Consumer Electronics Magazine - October 2015 - 120
IEEE Consumer Electronics Magazine - October 2015 - 121
IEEE Consumer Electronics Magazine - October 2015 - 122
IEEE Consumer Electronics Magazine - October 2015 - 123
IEEE Consumer Electronics Magazine - October 2015 - 124
IEEE Consumer Electronics Magazine - October 2015 - 125
IEEE Consumer Electronics Magazine - October 2015 - 126
IEEE Consumer Electronics Magazine - October 2015 - 127
IEEE Consumer Electronics Magazine - October 2015 - 128
IEEE Consumer Electronics Magazine - October 2015 - 129
IEEE Consumer Electronics Magazine - October 2015 - 130
IEEE Consumer Electronics Magazine - October 2015 - 131
IEEE Consumer Electronics Magazine - October 2015 - 132
IEEE Consumer Electronics Magazine - October 2015 - 133
IEEE Consumer Electronics Magazine - October 2015 - 134
IEEE Consumer Electronics Magazine - October 2015 - 135
IEEE Consumer Electronics Magazine - October 2015 - 136
IEEE Consumer Electronics Magazine - October 2015 - 137
IEEE Consumer Electronics Magazine - October 2015 - 138
IEEE Consumer Electronics Magazine - October 2015 - 139
IEEE Consumer Electronics Magazine - October 2015 - 140
IEEE Consumer Electronics Magazine - October 2015 - 141
IEEE Consumer Electronics Magazine - October 2015 - 142
IEEE Consumer Electronics Magazine - October 2015 - 143
IEEE Consumer Electronics Magazine - October 2015 - 144
IEEE Consumer Electronics Magazine - October 2015 - Cover3
IEEE Consumer Electronics Magazine - October 2015 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20240102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20231112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20221112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20211112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202010
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202009
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202007
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202004
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202003
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202001
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201909
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201907
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201905
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201903
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201901
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201811
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201809
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201807
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201805
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201803
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2015
https://www.nxtbookmedia.com