...
首页> 外文期刊>Physics Letters, A >Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange
【24h】

Notes on recent approaches concerning the Kirchhoff-law-Johnson-noise-based secure key exchange

机译:有关基于基尔霍夫定律约翰逊噪声的安全密钥交换的最新方法的说明

获取原文
获取原文并翻译 | 示例
           

摘要

We critically analyze the results and claims in [P.-L. Liu, Phys. Lett. A 373 (2009) 901]. We show that the strong security leak appeared in the simulations is only an artifact and not caused by "multiple reflections". Since no wave modes exist at cable length of 5% of the shortest wavelength of the signal, no wave is present to reflect it. In the high wave impedance limit, the conditions used in the simulations are heavily unphysical (requiring cable diameters up to 28000 times greater than the measured size of the known universe) and the results are modeling artifacts due to the unphysical values. At the low cable impedance limit. the observed artifacts are due to violating the recommended (and tested) conditions by neglecting the cable capacitance restrictions and using about 100 times longer cable than recommended without cable capacitance compensation arrangement. We implement and analyze the general circuitry of Liu's circulator [P.-L. Liu. Phys. Lett. A 373 (2009) 901] and confirm that they are conceptually secure against passive attacks. We introduce an asymmetric, more robust version without feedback loop. Then we crack all these systems by an active attack: a circulator-based man-in-the middle attack. Finally, we analyze the proposed method to increase security by dropping only high-risk bits. We point out the differences between different types of high-risk bits and show the shortage of this strategy for some simple key exchange protocols.
机译:我们对[P.-L.刘,物理。来吧A 373(2009)901]。我们表明,在模拟中出现的强烈安全漏洞仅仅是伪造的,而不是由“多次反射”引起的。由于在信号最短波长的5%的电缆长度上不存在波模式,因此不存在任何波来反射它。在高波阻抗极限中,仿真中使用的条件非常不物理(要求电缆直径最大为已知宇宙的测量大小的28000倍),结果是由于不物理值而造成的伪像建模。在低电缆阻抗极限下。观察到的伪影是由于忽略了电缆电容限制并使用比没有电缆电容补偿装置的建议电缆长约100倍的电缆而违反了建议(和测试)的条件。我们实现并分析了Liu的循环器的一般电路[P.-L.刘物理来吧A 373(2009)901],并确认它们在概念上对被动攻击是安全的。我们介绍了一种不带反馈回路的非对称,更健壮的版本。然后,我们通过主动攻击来破解所有这些系统:基于循环器的中间人攻击。最后,我们分析了通过仅丢弃高风险位来提高安全性的方法。我们指出了不同类型的高风险位之间的差异,并显示了一些简单的密钥交换协议所缺乏的这种策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号