|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 187 - Issue 71 |
| Published: January 2026 |
| Authors: Kunal Mukherjee |
10.5120/ijca2026926131
|
Kunal Mukherjee . Location-Dependent Cryptosystem: Geographically Bounded Decryption via UWB Timing-Encoded Key Reconstruction. International Journal of Computer Applications. 187, 71 (January 2026), 25-31. DOI=10.5120/ijca2026926131
@article{ 10.5120/ijca2026926131,
author = { Kunal Mukherjee },
title = { Location-Dependent Cryptosystem: Geographically Bounded Decryption via UWB Timing-Encoded Key Reconstruction },
journal = { International Journal of Computer Applications },
year = { 2026 },
volume = { 187 },
number = { 71 },
pages = { 25-31 },
doi = { 10.5120/ijca2026926131 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2026
%A Kunal Mukherjee
%T Location-Dependent Cryptosystem: Geographically Bounded Decryption via UWB Timing-Encoded Key Reconstruction%T
%J International Journal of Computer Applications
%V 187
%N 71
%P 25-31
%R 10.5120/ijca2026926131
%I Foundation of Computer Science (FCS), NY, USA
Digital content distribution and propitiatory research driven industries face persistent risks from intellectual property theft and unauthorized redistribution. Conventional encryption schemes such as AES, TDES, ECC, and ElGamal provide strong cryptographic guarantees, but they remain fundamentally agnostic to where decryption takes place. In practice, this means that once a decryption key is leaked or intercepted, any adversary can misuse the key to decrypt the protected content from any location. This paper presents a location-dependent cryptosystem in which the decryption key is not transmitted as human- or machinereadable data, but implicitly encoded in precise time-of-flight differences of ultra-wideband (UWB) data transmission packets. The system leverages Ciholas DWETH101 hardware and a custom TiCK (Timing-encoded Cryptographic Keying) protocol to map a 32-byte SHA-256–derived AES key onto scheduled transmission timestamps. Only receivers located within a predefined spatial region can observe the packet timings that align with the intended “time slot” pattern, enabling them to reconstruct the key and decrypt the secret. Receivers outside the authorized region observe yield incorrect keys. A complete prototype is implemented that encrypts and transmits audio data using our cryptosystem, and only when the receiver is within the authorized data they are able to decrypt the data. Our evaluation demonstrates that the system (i) removes the need to share decryption passwords electronically or physically, (ii) ensures the decryption key cannot be recovered by the eavesdropper, and (iii) provides a non-trivial spatial tolerance for legitimate users.