Critical analysis of the Bennett–Riedel attack on the secure cryptographic key distributions via the Kirchhoff-law–Johnson-noise scheme
نویسندگان
چکیده
2 Introduction 2 1.1 Is the security of quantum encryption indeed robust? 3 1.2 The KLJN secure key exchange system 4 1.1.1 The idealized KLJN scheme and its security 4 1.1.2 The security of the KLJN scheme is based on the Second Law of Thermodynamics 6 1.1.3 On active (invasive) attacks and attacks utilizing non-idealities 8 1.1.4 Foundations of the information theoretic security in practical KLJN schemes 9 1.1.5 Mathematical proof of the unconditional security of the exchanged key 11 1.1.6 Optional security addition: cap imposed on q by Alice and Bob 13 1.2 Summary of Bennett–Riedel’s arguments regarding the KLJN scheme 13 1.2.1 Bennett–Riedel’s claim concerning no information transfer in a wire in the no-wave (quasi static) limit 14 1.2.2 Bennett–Riedel’s claim that the KLJN system does not offer security 14 1.2.3 Bennett–Riedel’s claim regarding a “thermodynamics-free” key exchange scheme 15 1.2.4 Bennett–Riedel’s wave-transient based attack before the steady state is reached 17 1.2.5 Bennett–Riedel’s passive time-correlation attack in the no-wave limit 17 1.2.6 Current extraction/injection based active (invasive) attack 17 Discussion and Results 18 2.1 Physics facts: information, propagation, and wave couplers in the quasi static limit 19 2.1.1 The mathematical definition of a wave in physics 19 2.1.2 The quasi-static limit of electrodynamics, and electrical circuitry symbols with lumped elements 20 2.1.3 Signal propagation in the no-wave (quasi-static) limit 20 2.1.4 Further implications of the quasi-static (no-wave) limit: Directional couplers, etc. 20 2.2 Refutation of Bennett–Riedel’s claim about no information transfer in the no-wave limit 21 2.3 Invalidity of Bennett–Riedel’s equations and the correct equations 21 2.3.1 The wave limit and the Pao-Lo Liu key exchange system 21 2.3.2 Bennett–Riedel’s equations for the KLJN scheme in the no-wave (quasi static) limit 22 2.4 Proof that Bennett–Riedel’s key exchanger is unphysical 23 2.5 Ten ways to crack Bennett–Riedel’s key exchanger by passive attacks 23 2.5.1 Six universal, energy/current-flow-analysis attacks 24 2.5.2 Three transient-damping resistor attacks 25 2.5.3 Wire-resistance Johnson noise attack 26 2.5.4 The above attacks are inefficient against the KLJN system as a result of thermodynamics 26 2.6 On transient attacks against the KLJN scheme 27 2.7 Why Bennett–Riedel’s passive correlation attack does not work against KLJN 28 2.8 Why the current extraction/injection active attack does not work against KLJN 29 2.9 Remarks about potential hacking attacks 30 Conclusions 31 Acknowledgements 31 submitted for publication on June 20, 2013; this revision October 14, 2013. http://arxiv.org/abs/1306.6531 http://vixra.org/abs/1306.0058
منابع مشابه
Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme
Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switc...
متن کاملCracking the Bennett-Riedel secure scheme and a critical analysis of their claims about the Kirchhoff-law-Johnson-noise system
Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) claimed that, in the Kirchhoff-law-Johnson-noise (KLJN) classical statistical physical key exchange method, thermodynamics (statistical physics) is not essential and that the KLJN scheme provides no security. They attempt to prove the no-thermodynamics view by proposing a dissipation-free deterministic key exchange method with...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملElimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System
We introduce the so far most efficient attack against the Kirchhoff-law-Johnsonnoise (KLJN) secure key exchange system. This attack utilizes the lack of exact thermal equilibrium in practical applications and is based on cable resistance losses and the fact that the Second Law of Thermodynamics cannot provide full security when such losses are present. The new attack does not challenge the unco...
متن کاملAnalysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system
A recent paper by Gunn–Allison–Abbott (GAA) [L.J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoffloop int...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013