Perspective-On the thermodynamics of perfect unconditional security

被引:10
作者
Chamon, Christiana [1 ]
Kish, Laszlo B. [1 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
关键词
LOOP-CURRENT ATTACK; KEY DISTRIBUTION; NOISE; CRYPTOGRAPHY; PROTECTION; NETWORKS; HACKING; SCHEME; MIDDLE; PAPER;
D O I
10.1063/5.0057764
中图分类号
O59 [应用物理学];
学科分类号
摘要
A secure key distribution (exchange) scheme is unconditionally secure if it is unbreakable against arbitrary technological improvements of computing power and/or any development of new algorithms. There are only two families of experimentally realized and tested unconditionally secure key distribution technologies: quantum key distribution (QKD), the base of quantum cryptography, which utilizes quantum physical photonic features, and the Kirchhoff-Law-Johnson-Noise (KLJN) system that is based on classical statistical physics (fluctuation-dissipation theorem). The focus topic of this paper is the thermodynamical situation of the KLJN system. In all the original works, the proposed KLJN schemes required thermal equilibrium between the devices of the communicating parties to achieve perfect security. However, Vadai et al., in (Nature) Sci. Rep. 5, 13653 (2015) show a modified scheme, where there is a non-zero thermal noise energy flow between the parties, yet the system seems to resist all the known attack types. We introduce an attack type against their system. The attack utilizes coincidence events between the line current and voltages. We show that there is a non-zero information leak toward the Eavesdropper, even under idealized conditions. As soon as the thermal equilibrium is restored, the system becomes perfectly secure again. In conclusion, perfect unconditional security requires thermal equilibrium.
引用
收藏
页数:8
相关论文
共 95 条
[1]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[2]   Laser Damage Helps the Eavesdropper in Quantum Cryptography [J].
Bugge, Audun Nystad ;
Sauge, Sebastien ;
Ghazali, Aina Mardhiyah M. ;
Skaar, Johannes ;
Lydersen, Lars ;
Makarov, Vadim .
PHYSICAL REVIEW LETTERS, 2014, 112 (07)
[3]   On KLJN-based Secure Key Distribution in Vehicular Communication Networks [J].
Cao, X. ;
Saez, Y. ;
Pesti, G. ;
Kish, L. B. .
FLUCTUATION AND NOISE LETTERS, 2015, 14 (01)
[4]   Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence [J].
Chaiwongkhot, Poompong ;
Kuntz, Katanya B. ;
Zhang, Yanbao ;
Huang, Anqi ;
Bourgoin, Jean-Philippe ;
Sajeed, Shihan ;
Lutkenhaus, Norbert ;
Jennewein, Thomas ;
Makarov, Vadim .
PHYSICAL REVIEW A, 2019, 99 (06)
[5]   Finite-key-size effect in a commercial plug-and-play QKD system [J].
Chaiwongkhot, Poompong ;
Sajeed, Shihan ;
Lydersen, Lars ;
Makarov, Vadim .
QUANTUM SCIENCE AND TECHNOLOGY, 2017, 2 (04)
[6]  
Chamon C., FLUCTUATION NOISE LE
[7]  
Chamon C., ARXIV200510429
[8]   CURRENT INJECTION ATTACK AGAINST THE KLJN SECURE KEY EXCHANGE [J].
Chen, Hsien-Pu ;
Mohammad, Muneer ;
Kish, Laszlo B. .
METROLOGY AND MEASUREMENT SYSTEMS, 2016, 23 (02) :173-181
[9]   Cable Capacitance Attack against the KLJN Secure Key Exchange [J].
Chen, Hsien-Pu ;
Gonzalez, Elias ;
Saez, Yessica ;
Kish, Laszlo B. .
INFORMATION, 2015, 6 (04) :719-732
[10]   ON THE "CRACKING" SCHEME IN THE PAPER "A DIRECTIONAL COUPLER ATTACK AGAINST THE KISH KEY DISTRIBUTION SYSTEM" BY GUNN, ALLISON AND ABBOTT [J].
Chen, Hsien-Pu ;
Kish, Laszlo B. ;
Granqvist, Claes G. ;
Schmera, G. .
METROLOGY AND MEASUREMENT SYSTEMS, 2014, 21 (03) :389-400