Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange

被引:45
作者
Kish, Laszlo B. [1 ]
Horvath, Tamas [2 ,3 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
[2] Univ Bonn, Dept Comp Sci, D-5300 Bonn, Germany
[3] Fraunhofer IAIS, Schloss Birlinghoven, D-53754 St Augustin, Germany
关键词
21;
D O I
10.1016/j.physleta.2009.05.077
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We critically analyze the results and claims in [P.-L. Liu, Phys. Lett. A 373 (2009) 901]. We show that the strong security leak appeared in the simulations is only an artifact and not caused by "multiple reflections". Since no wave modes exist at cable length of 5% of the shortest wavelength of the signal, no wave is present to reflect it. In the high wave impedance limit, the conditions used in the simulations are heavily unphysical (requiring cable diameters up to 28000 times greater than the measured size of the known universe) and the results are modeling artifacts due to the unphysical values. At the low cable impedance limit. the observed artifacts are due to violating the recommended (and tested) conditions by neglecting the cable capacitance restrictions and using about 100 times longer cable than recommended without cable capacitance compensation arrangement. We implement and analyze the general circuitry of Liu's circulator [P.-L. Liu. Phys. Lett. A 373 (2009) 901] and confirm that they are conceptually secure against passive attacks. We introduce an asymmetric, more robust version without feedback loop. Then we crack all these systems by an active attack: a circulator-based man-in-the middle attack. Finally, we analyze the proposed method to increase security by dropping only high-risk bits. We point out the differences between different types of high-risk bits and show the shortage of this strategy for some simple key exchange protocols. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:2858 / 2868
页数:11
相关论文
共 17 条
[1]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[2]  
BRITT RR, 2004, SPACE 0524
[3]  
Cho A, 2005, SCIENCE, V309, P2148
[4]  
Hao F, 2006, IEE P INFORM SECURIT, V153, P141, DOI DOI 10.1049/IP-IFS:20060068
[5]  
Jackson J., 1975, CLASSICAL ELECTRODYN
[6]   Response to Feng Hao's paper "Kish's key exchange scheme is insecure"' [J].
Kish, L. B. .
FLUCTUATION AND NOISE LETTERS, 2006, 6 (04) :C37-C41
[7]   Response to Scheuer-Yariv: "A classical key-distribution system based on Johnson (like) noise - how secure?" [J].
Kish, L. B. .
PHYSICS LETTERS A, 2006, 359 (06) :741-744
[8]   Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise [J].
Kish, Laszlo B. ;
Mingesz, Robert .
FLUCTUATION AND NOISE LETTERS, 2006, 6 (02) :C9-C21
[9]   Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law [J].
Kish, LB .
PHYSICS LETTERS A, 2006, 352 (03) :178-182
[10]   Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security [J].
Kish, LB .
FLUCTUATION AND NOISE LETTERS, 2006, 6 (01) :L57-L63