Deterministic Random Number Generator Attack Against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
نویسندگان
چکیده
This paper demonstrates the vulnerability of Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchanger to compromised random number generator(s) even if these numbers are used solely generate noises emulating Johnson noise Alice's and Bob's resistors. The attacks shown deterministic in sense that Eve's knowledge and/or is basically deterministic. Moreover, no statistical evaluation needed, except for rarely occurring events negligible, waiting time verification time. We explore two situations. In first case, Eve knows both noises. show that, this situation, can quickly crack bit by using Ohm's Law. other only noise. Then learn resistance value Therefore, she will have same as Bob, thus at end exchange period, know bit.
منابع مشابه
Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange
A method to quantify the error probability at the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange is introduced. The types of errors due to statistical inaccuracies in noise voltage measurements are classified and the error probability is calculated. The most interesting finding is that the error probability decays exponentially with the duration of the time window of single bit exchange...
متن کاملRandom-resistor-random-temperature Kirchhoff-law-johnson-noise (rrrt-kljn) Key Exchange
We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob c...
متن کاملNotes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange
We critically analyze the results and claims in [Physics Letters A 373 (2009) 901–904]. We show that the strong security leak appeared in the simulations is only an artifact and not caused by "multiple reflections". Since no wave modes exist at cable length of 5% of the shortest wavelength of the signal, no wave is present to reflect it. In the high wave impedance limit, the conditions used in ...
متن کاملGeneralized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors
The Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system has been introduced as a simple, very low cost and efficient classical physical alternative to quantum key distribution systems. The ideal system uses only a few electronic components-identical resistor pairs, switches and interconnecting wires-in order to guarantee perfectly protected data transmission. We show that a generalize...
متن کاملCritical analysis of the Bennett–Riedel attack on the secure cryptographic key distributions via the Kirchhoff-law–Johnson-noise scheme
2 Introduction 2 1.1 Is the security of quantum encryption indeed robust? 3 1.2 The KLJN secure key exchange system 4 1.1.1 The idealized KLJN scheme and its security 4 1.1.2 The security of the KLJN scheme is based on the Second Law of Thermodynamics 6 1.1.3 On active (invasive) attacks and attacks utilizing non-idealities 8 1.1.4 Foundations of the information theoretic security in practical ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Fluctuation and Noise Letters
سال: 2021
ISSN: ['0219-4775', '1793-6780']
DOI: https://doi.org/10.1142/s0219477521500462