Transient Attacks Against the VMG-KLJN Secure Key Exchanger

被引:0
作者
Ferdous, Shahriar [1 ]
Kish, Laszlo B. [1 ,2 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77841 USA
[2] Obuda Univ, Budapest Becs ut 96-B, H-1034 Budapest, Hungary
来源
FLUCTUATION AND NOISE LETTERS | 2024年 / 23卷 / 01期
关键词
Information theoretic (unconditional) security; VMG-KLJN scheme; transient attack; NOISE; CRYPTOGRAPHY; NETWORKS; HACKING; SCHEME; PAPER;
D O I
10.1142/S0219477524500081
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The security vulnerability of the Vadai, Mingesz, and Gingl (VMG) Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger, as presented in the publication "Nature, Science Report 5 (2015) 13653", has been exposed to transient attacks. Recently an effective defense protocol was introduced (Appl. Phys. Lett. 122 (2023) 143503) to counteract mean-square voltage-based (or mean-square current-based) transient attacks targeted at the ideal KLJN framework.In this study, this same mitigation methodology has been employed to fortify the security of the VMG-KLJN key exchanger. It is worth noting that the protective measures need to be separately implemented for the HL and LH scenarios. This conceptual framework is corroborated through computer simulations, demonstrating that the application of this defensive technique substantially mitigates information leakage to a point of insignificance.
引用
收藏
页数:14
相关论文
共 100 条
[1]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[2]   Laser Damage Helps the Eavesdropper in Quantum Cryptography [J].
Bugge, Audun Nystad ;
Sauge, Sebastien ;
Ghazali, Aina Mardhiyah M. ;
Skaar, Johannes ;
Lydersen, Lars ;
Makarov, Vadim .
PHYSICAL REVIEW LETTERS, 2014, 112 (07)
[3]   On KLJN-based Secure Key Distribution in Vehicular Communication Networks [J].
Cao, X. ;
Saez, Y. ;
Pesti, G. ;
Kish, L. B. .
FLUCTUATION AND NOISE LETTERS, 2015, 14 (01)
[4]   Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence [J].
Chaiwongkhot, Poompong ;
Kuntz, Katanya B. ;
Zhang, Yanbao ;
Huang, Anqi ;
Bourgoin, Jean-Philippe ;
Sajeed, Shihan ;
Lutkenhaus, Norbert ;
Jennewein, Thomas ;
Makarov, Vadim .
PHYSICAL REVIEW A, 2019, 99 (06)
[5]   Finite-key-size effect in a commercial plug-and-play QKD system [J].
Chaiwongkhot, Poompong ;
Sajeed, Shihan ;
Lydersen, Lars ;
Makarov, Vadim .
QUANTUM SCIENCE AND TECHNOLOGY, 2017, 2 (04)
[6]   Statistical Random Number Generator Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol [J].
Chamon, Christiana ;
Ferdous, Shahriar ;
Kish, Laszlo B. .
FLUCTUATION AND NOISE LETTERS, 2022, 21 (03)
[7]   Deterministic Random Number Generator Attack Against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol [J].
Chamon, Christiana ;
Ferdous, Shahriar ;
Kish, Laszlo B. .
FLUCTUATION AND NOISE LETTERS, 2021, 20 (05)
[8]   Perspective-On the thermodynamics of perfect unconditional security [J].
Chamon, Christiana ;
Kish, Laszlo B. .
APPLIED PHYSICS LETTERS, 2021, 119 (01)
[9]   CURRENT INJECTION ATTACK AGAINST THE KLJN SECURE KEY EXCHANGE [J].
Chen, Hsien-Pu ;
Mohammad, Muneer ;
Kish, Laszlo B. .
METROLOGY AND MEASUREMENT SYSTEMS, 2016, 23 (02) :173-181
[10]   Cable Capacitance Attack against the KLJN Secure Key Exchange [J].
Chen, Hsien-Pu ;
Gonzalez, Elias ;
Saez, Yessica ;
Kish, Laszlo B. .
INFORMATION, 2015, 6 (04) :719-732