From Bilateral Key Agreement to Single-Device Randomness
Daniel Mo Houshmand QDaria Quantum Research, Oslo, Norway
Every prior system that extracts randomness from WiFi Channel State Information (CSI) requires two cooperating endpoints exploiting channel reciprocity for bilateral key agreement. We present the first system, measurement, and NIST SP 800-90B validation of WiFi CSI as a unilateral entropy source: a single device passively measuring ambient CSI to harvest genuine physical randomness with no cooperating partner.
Using the public Gi-z/CSI-Data corpus (TU Darmstadt Nexmon captures, Broadcom BCM4339), we extract phase least-significant bits from 343 frames across 256 OFDM subcarriers, apply Von Neumann debiasing, and obtain 2,690 bytes of entropy at a 24.5% extraction ratio. The NIST SP 800-90B ea_non_iid assessment yields a final min-entropy of 5.50 bits/byte (MCV estimator, 99% confidence).
We introduce the Physical Unclonable Environment Key (PUEK), which derives location-locked cryptographic keys from the SVD eigenstructure of CSI measurements, with security profiles from tau = 0.75 (office) to tau = 0.98 (military).
| # | Contribution | Evidence |
|---|---|---|
| 1 | First unilateral CSI entropy extraction | No cooperating partner, no reconciliation |
| 2 | First NIST SP 800-90B validation of WiFi CSI | 5.50 bits/byte final min-entropy |
| 3 | Physical Unclonable Environment Key (PUEK) | Location-locked keys from CSI eigenstructure |
| 4 | $5 ESP32-S3 reference implementation | 45-90 MB/month at zero marginal cost |
| 5 | Formal indistinguishability game for PUEK | Proof sketch under spatial decorrelation |
| 6 | Cost analysis vs. QRNG and HRNG | Table 8, 4+ orders of magnitude cheaper |
All 9 figures available in
figures/(TikZ source) andimages/(PNG).
| Section | Title | Content |
|---|---|---|
| 1 | Introduction | HNDL threat, bilateral limitation, unilateral paradigm |
| 2 | Background | CSI physics, OFDM subcarriers, channel reciprocity |
| 3 | Unilateral Extraction | Pipeline, Von Neumann debiasing, extraction ratio |
| 4 | PUEK Construction | SVD eigenstructure, security profiles, formal game |
| 5 | NIST SP 800-90B Assessment | ea_non_iid results, min-entropy bounds |
| 6 | Experimental Setup | Gi-z/CSI-Data corpus, Nexmon captures |
| 7 | Results | Min-entropy comparison, cost analysis, throughput |
| 8 | Comparison | vs. bilateral CSI (Jana'09, Liu'13, Xi'16, etc.) |
| 9 | Discussion | Static environment degradation, deployment, future work |
pdflatex main.tex
bibtex main
pdflatex main.tex
pdflatex main.texThe pre-compiled PDF is available at main.pdf.
CSI captures from the public Gi-z/CSI-Data corpus (TU Darmstadt / University of Brescia, Nexmon on Broadcom BCM4339).
pip install zipminator[all]from zipminator.entropy import CsiPoolProvider
csi = CsiPoolProvider(interface="wlan0")
entropy = csi.extract(num_bytes=1024)Source: QDaria/zipminator | PyPI: zipminator
This paper is part of a three-paper series on post-quantum entropy infrastructure:
- Quantum-Certified Anonymization - Physics-guaranteed irreversibility via Born rule
- This paper - Unilateral CSI Entropy + PUEK
- Certified Heterogeneous Entropy with Algebraic Randomness Extraction - Multi-source entropy composition + ARE
Norwegian Patent Application filed April 2026 (Patentstyret). 14 claims covering the unilateral CSI entropy extraction method and PUEK construction.
@misc{houshmand2026csi,
author = {Houshmand, Daniel Mo},
title = {Unilateral {WiFi} {CSI} as a {NIST}-Validated Entropy Source: From Bilateral Key Agreement to Single-Device Randomness},
year = {2026},
doi = {10.5281/zenodo.19437012},
url = {https://doi.org/10.5281/zenodo.19437012},
}




