Given a good key source,
a cryptographic pairing protocol is
needed between the Programmer and IMD.
Two features of H2H
make cryptographic pairing a challenge.
First, when Programmer
and IMD synchronously
sample the key source,
their respective
readings β and α
are noisy: Often β ≈ α,
but exact equality
β = α isn’t obtained.
Cryptographic tools such as password authenticated
key agreement (e.g., [5]) require exact equality, while
error-tolerant ones, e.g., [14,24], sacrifice entropy needlessly in our
setting here.