Secret Key Generation from Common Randomness

From Secrecy Capacity to Secret Keys

In the wiretap channel, secrecy is achieved "for free" — the noise protects the message without any pre-shared secret. But what if Alice and Bob want to generate a shared secret key that they can later use for encryption? It turns out that correlated observations — such as those provided by a common communication channel — can be distilled into a secret key, even when Eve has partial information.

This is the secret key agreement problem, and its solution connects information theory to cryptography in a fundamental way.

Definition:

Secret Key Generation Model

Alice observes XnX^n, Bob observes YnY^n, and Eve observes ZnZ^n, where (Xi,Yi,Zi)(X_i, Y_i, Z_i) are drawn i.i.d. from a joint distribution PXYZP_{XYZ}. Alice and Bob can communicate over a public, noiseless, authenticated channel that Eve can observe but not modify.

A secret key agreement protocol consists of:

  • Alice's key function: KA=fA(Xn,F)K_A = f_A(X^n, F) where FF is the public communication
  • Bob's key function: KB=fB(Yn,F)K_B = f_B(Y^n, F)
  • Public communication: F=ϕ(Xn)F = \phi(X^n) (or interactive: multiple rounds between Alice and Bob)

The protocol must satisfy:

  1. Agreement: Pr[KAKB]0\Pr[K_A \neq K_B] \to 0
  2. Uniformity: 1nH(KA)RK\frac{1}{n}H(K_A) \to R_K (the key rate)
  3. Secrecy: I(KA;Zn,F)0I(K_A; Z^n, F) \to 0 (Eve learns nothing from her observations and the public discussion)

The secret key capacity CKC_K is the supremum of achievable key rates RKR_K.

Secret key capacity

The maximum rate at which Alice and Bob can generate a shared secret key from their correlated observations, using public discussion that Eve can overhear. Denoted CKC_K.

Theorem: Secret Key Capacity (Maurer–Ahlswede–Csiszár)

When Alice observes XX, Bob observes YY, and Eve observes ZZ, drawn from PXYZP_{XYZ}, the secret key capacity with one-way public communication from Alice to Bob is: CK=I(X;Y)I(X;Z)C_K^{\to} = I(X; Y) - I(X; Z) when XYZX \to Y \to Z forms a XYZX \multimap Y \multimap Z chain (degraded eavesdropper).

More generally, with unlimited interactive public discussion: CK=I(X;YZ)I(X;YZ)+(correction terms)C_K = I(X; Y \| Z) \triangleq I(X; Y | Z) + \text{(correction terms)} where I(X;YZ)I(X; Y \| Z) is the secret key rate (conditional mutual information in some models, but the general expression involves auxiliary random variables).

For the special case where Eve has no observations (Z=constZ = \text{const}): CK=I(X;Y).C_K = I(X; Y).

The secret key capacity with one-way communication matches the wiretap channel secrecy capacity — this is not a coincidence. Secret key generation and wiretap coding are dual problems: in the wiretap channel, Alice uses her "channel advantage" to hide the message; in secret key generation, Alice and Bob use their "correlation advantage" to extract a key that Eve cannot reconstruct.

The public discussion is essential: it allows Alice and Bob to reconcile their observations (which differ due to noise) without giving Eve useful information. The discussion is public — Eve hears everything — but the key remains secret because Eve's observations ZnZ^n are insufficiently correlated with (Xn,Yn)(X^n, Y^n).

,

Historical Note: The Birth of Information-Theoretic Key Agreement

1993

The problem of generating secret keys from correlated observations was independently formulated by Ueli Maurer (1993) and Rudolf Ahlswede and Imre Csiszár (1993). Maurer's approach was motivated by practical cryptographic applications: he showed that the physical layer of a communication system could be used to generate encryption keys without relying on computational hardness assumptions.

Ahlswede and Csiszár provided the complete information-theoretic characterization, establishing the secret key capacity as a function of the joint distribution of the parties' observations. Their work revealed a deep connection between secret key generation and the wiretap channel: the secret key capacity with one-way communication equals the wiretap secrecy capacity.

This result has had profound practical impact: modern key generation protocols in wireless systems (exploiting channel reciprocity in TDD systems) are direct descendants of Maurer's original proposal.

Example: Secret Key from Wireless Channel Reciprocity

In a TDD wireless system, Alice and Bob observe channel estimates X=H+NAX = H + N_A and Y=H+NBY = H + N_B where HCN(0,σH2)H \sim \mathcal{CN}(0, \sigma_H^2) is the common channel (reciprocal in TDD) and NA,NBN_A, N_B are independent estimation noise with variance σ2\sigma^2. Eve observes Z=HE+NEZ = H_E + N_E where HEH_E is Eve's channel (independent of HH due to spatial decorrelation) and NEN_E has variance σ2\sigma^2.

Compute the secret key capacity.

⚠️Engineering Note

Practical Key Generation in TDD Systems

Real-world key generation from channel reciprocity faces several practical challenges:

  1. Imperfect reciprocity: Even in TDD, the RF front-ends at Alice and Bob are not identical, creating a mismatch that must be calibrated.
  2. Eve's partial correlation: In practice, Eve is not perfectly decorrelated from Alice and Bob, especially in line-of-sight channels or with nearby eavesdroppers. The key rate must account for Eve's residual correlation.
  3. Quantization mismatch: Both parties must independently quantize their continuous channel estimates to bits, and these bits may disagree at some positions. An information reconciliation step (using LDPC codes over the public channel) corrects mismatches at the cost of key rate.
  4. Privacy amplification: Universal hashing compresses the reconciled bits to remove any information that may have leaked to Eve during reconciliation.

Reported experimental key rates: 10–100 kbps for indoor Wi-Fi, 1–10 kbps for outdoor cellular, up to 1 Mbps for mmWave systems with wide bandwidth.

Practical Constraints
  • TDD systems only — FDD lacks channel reciprocity

  • Key rate limited by channel coherence bandwidth and time

  • Requires authenticated public channel (prevents man-in-the-middle attacks)

Information reconciliation

The step in a key agreement protocol where Alice and Bob use public communication (e.g., syndrome-based error correction) to ensure they agree on the same bit string, correcting mismatches due to noise in their channel observations.

Related: Secret key capacity

Privacy amplification

The step in a key agreement protocol where Alice and Bob apply a universal hash function to their reconciled bit string to remove any information that Eve may have gained from the public reconciliation communication. The output is a shorter but fully secret key.

Quick Check

In secret key generation, Alice and Bob communicate over a public channel that Eve can overhear. How can they still generate a secret key?

The correlation between their observations exceeds Eve's correlation, and hashing extracts the secret part

The public channel is encrypted

Eve cannot hear the public channel

Key Takeaway

Secret key generation from common randomness is the dual of wiretap coding: instead of sending a secret message directly, Alice and Bob extract a shared key from their correlated observations. The secret key capacity with one-way communication is CK=I(X;Y)I(X;Z)C_K = I(X;Y) - I(X;Z), matching the wiretap secrecy capacity. In wireless systems, channel reciprocity in TDD provides the common randomness, and the key rate scales with the estimation SNR and channel variability.

Secret Key Generation from Channel Reciprocity

Walks through the four steps of key generation from wireless channel reciprocity: channel probing, quantization, information reconciliation, and privacy amplification.