Secret Key Generation from Common Randomness
From Secrecy Capacity to Secret Keys
In the wiretap channel, secrecy is achieved "for free" — the noise protects the message without any pre-shared secret. But what if Alice and Bob want to generate a shared secret key that they can later use for encryption? It turns out that correlated observations — such as those provided by a common communication channel — can be distilled into a secret key, even when Eve has partial information.
This is the secret key agreement problem, and its solution connects information theory to cryptography in a fundamental way.
Definition: Secret Key Generation Model
Secret Key Generation Model
Alice observes , Bob observes , and Eve observes , where are drawn i.i.d. from a joint distribution . Alice and Bob can communicate over a public, noiseless, authenticated channel that Eve can observe but not modify.
A secret key agreement protocol consists of:
- Alice's key function: where is the public communication
- Bob's key function:
- Public communication: (or interactive: multiple rounds between Alice and Bob)
The protocol must satisfy:
- Agreement:
- Uniformity: (the key rate)
- Secrecy: (Eve learns nothing from her observations and the public discussion)
The secret key capacity is the supremum of achievable key rates .
Secret key capacity
The maximum rate at which Alice and Bob can generate a shared secret key from their correlated observations, using public discussion that Eve can overhear. Denoted .
Theorem: Secret Key Capacity (Maurer–Ahlswede–Csiszár)
When Alice observes , Bob observes , and Eve observes , drawn from , the secret key capacity with one-way public communication from Alice to Bob is: when forms a chain (degraded eavesdropper).
More generally, with unlimited interactive public discussion: where is the secret key rate (conditional mutual information in some models, but the general expression involves auxiliary random variables).
For the special case where Eve has no observations ():
The secret key capacity with one-way communication matches the wiretap channel secrecy capacity — this is not a coincidence. Secret key generation and wiretap coding are dual problems: in the wiretap channel, Alice uses her "channel advantage" to hide the message; in secret key generation, Alice and Bob use their "correlation advantage" to extract a key that Eve cannot reconstruct.
The public discussion is essential: it allows Alice and Bob to reconcile their observations (which differ due to noise) without giving Eve useful information. The discussion is public — Eve hears everything — but the key remains secret because Eve's observations are insufficiently correlated with .
Achievability (one-way, degraded)
Alice uses Slepian–Wolf compression to describe to Bob at rate , transmitted over the public channel. Bob, using his observation as side information, decodes .
Now both Alice and Bob know . They apply a universal hash function to extract the key: .
The public communication (the Slepian–Wolf compressed message) leaks at most bits to Eve. The total correlation between Eve's information and is at most .
The extractable key rate is .
Converse sketch
The key rate is bounded by the mutual information between Alice's and Bob's observations minus the information available to Eve. The converse uses the secrecy constraint and the public nature of to show that .
The key step is: .
And: .
Combining these bounds with the degradedness yields .
Historical Note: The Birth of Information-Theoretic Key Agreement
1993The problem of generating secret keys from correlated observations was independently formulated by Ueli Maurer (1993) and Rudolf Ahlswede and Imre Csiszár (1993). Maurer's approach was motivated by practical cryptographic applications: he showed that the physical layer of a communication system could be used to generate encryption keys without relying on computational hardness assumptions.
Ahlswede and Csiszár provided the complete information-theoretic characterization, establishing the secret key capacity as a function of the joint distribution of the parties' observations. Their work revealed a deep connection between secret key generation and the wiretap channel: the secret key capacity with one-way communication equals the wiretap secrecy capacity.
This result has had profound practical impact: modern key generation protocols in wireless systems (exploiting channel reciprocity in TDD systems) are direct descendants of Maurer's original proposal.
Example: Secret Key from Wireless Channel Reciprocity
In a TDD wireless system, Alice and Bob observe channel estimates and where is the common channel (reciprocal in TDD) and are independent estimation noise with variance . Eve observes where is Eve's channel (independent of due to spatial decorrelation) and has variance .
Compute the secret key capacity.
Key observation
Since is independent of , Eve's observation is independent of given the channel model. Therefore and
Compute $\ntn{mi}(X; Y)$
is jointly Gaussian with and .
The correlation coefficient is .
At high channel SNR (): and , which grows logarithmically with the estimation SNR.
Practical interpretation
In a TDD system with good channel estimation (high SNR), Alice and Bob can generate secret bits per channel observation. With a channel coherence time of seconds and Hz of bandwidth, the key generation rate is approximately bits per second.
For typical 5G parameters ( MHz, ms, dB): the key rate is on the order of bits/second — sufficient for AES-256 key refresh every few milliseconds.
Practical Key Generation in TDD Systems
Real-world key generation from channel reciprocity faces several practical challenges:
- Imperfect reciprocity: Even in TDD, the RF front-ends at Alice and Bob are not identical, creating a mismatch that must be calibrated.
- Eve's partial correlation: In practice, Eve is not perfectly decorrelated from Alice and Bob, especially in line-of-sight channels or with nearby eavesdroppers. The key rate must account for Eve's residual correlation.
- Quantization mismatch: Both parties must independently quantize their continuous channel estimates to bits, and these bits may disagree at some positions. An information reconciliation step (using LDPC codes over the public channel) corrects mismatches at the cost of key rate.
- Privacy amplification: Universal hashing compresses the reconciled bits to remove any information that may have leaked to Eve during reconciliation.
Reported experimental key rates: 10–100 kbps for indoor Wi-Fi, 1–10 kbps for outdoor cellular, up to 1 Mbps for mmWave systems with wide bandwidth.
- •
TDD systems only — FDD lacks channel reciprocity
- •
Key rate limited by channel coherence bandwidth and time
- •
Requires authenticated public channel (prevents man-in-the-middle attacks)
Information reconciliation
The step in a key agreement protocol where Alice and Bob use public communication (e.g., syndrome-based error correction) to ensure they agree on the same bit string, correcting mismatches due to noise in their channel observations.
Related: Secret key capacity
Privacy amplification
The step in a key agreement protocol where Alice and Bob apply a universal hash function to their reconciled bit string to remove any information that Eve may have gained from the public reconciliation communication. The output is a shorter but fully secret key.
Quick Check
In secret key generation, Alice and Bob communicate over a public channel that Eve can overhear. How can they still generate a secret key?
The correlation between their observations exceeds Eve's correlation, and hashing extracts the secret part
The public channel is encrypted
Eve cannot hear the public channel
Alice and Bob share more mutual information about their observations than Eve has about either. The public communication helps them reconcile their observations (agree on the same bits), and privacy amplification (hashing) removes any information Eve gained from the public discussion. The net key rate is the gap between the Alice–Bob correlation and Eve's information.
Key Takeaway
Secret key generation from common randomness is the dual of wiretap coding: instead of sending a secret message directly, Alice and Bob extract a shared key from their correlated observations. The secret key capacity with one-way communication is , matching the wiretap secrecy capacity. In wireless systems, channel reciprocity in TDD provides the common randomness, and the key rate scales with the estimation SNR and channel variability.