• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

对贝内特 - 里德尔通过基尔霍夫定律 - 约翰逊噪声方案对安全密码密钥分发的攻击的批判性分析。

Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

作者信息

Kish Laszlo B, Abbott Derek, Granqvist Claes G

机构信息

Department of Electrical and Computer Engineering, Texas A&M University, College Station, Texas, United States of America.

School of Electrical and Electronic Engineering, University of Adelaide, Adelaide, South Australia, Australia.

出版信息

PLoS One. 2013 Dec 16;8(12):e81810. doi: 10.1371/journal.pone.0081810. eCollection 2013.

DOI:10.1371/journal.pone.0081810
PMID:24358129
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC3864860/
Abstract

Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.

摘要

最近,贝内特和里德尔(BR)(http://arxiv.org/abs/1303.7435v1)认为,热力学在基尔霍夫定律 - 约翰逊噪声(KLJN)经典物理加密交换方法中并非必不可少,试图以此来反驳KLJN方案的安全性。他们试图通过引入一种由两个电池和两个开关组成的无耗散确定性密钥交换方法来证明这一点。在本文中,我们首先表明BR的方案不符合物理实际,其假设的某些元素违反了安全通信的基本协议。我们所有的分析都是基于一个技术上无限制的伊芙,她具有无限精确且快速的测量能力,仅受物理和统计规律的限制。对于非理想情况以及主动(侵入性)攻击,测量持续时间和统计误差之间的不确定性原理使得伊芙无论测量精度或速度如何,都无法提取密钥。为了表明热力学和噪声对安全性至关重要,我们通过十种不同的方式以100%的成功率通过被动攻击破解了BR系统,并证明相同的破解方法对采用约翰逊噪声以热力学第二定律为安全基础的KLJN方案不起作用。我们还对BR的其他一些说法进行了批判性分析;例如,我们证明了他们描述零安全性的方程不适用于KLJN方案。最后,我们给出了针对KLJN方案的每次BR攻击的数学安全性证明,并得出结论,KLJN方法的信息理论(无条件)安全性尚未受到成功挑战。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/e456e4de4caf/pone.0081810.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/0ac5d120dd33/pone.0081810.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/be1c5dea6563/pone.0081810.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/a7c0410502b2/pone.0081810.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/be8de4a243fc/pone.0081810.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/95cd469e9be7/pone.0081810.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/9fb1cbfa48ea/pone.0081810.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/e456e4de4caf/pone.0081810.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/0ac5d120dd33/pone.0081810.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/be1c5dea6563/pone.0081810.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/a7c0410502b2/pone.0081810.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/be8de4a243fc/pone.0081810.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/95cd469e9be7/pone.0081810.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/9fb1cbfa48ea/pone.0081810.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6c6/3864860/e456e4de4caf/pone.0081810.g007.jpg

相似文献

1
Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.对贝内特 - 里德尔通过基尔霍夫定律 - 约翰逊噪声方案对安全密码密钥分发的攻击的批判性分析。
PLoS One. 2013 Dec 16;8(12):e81810. doi: 10.1371/journal.pone.0081810. eCollection 2013.
2
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors.采用任意电阻器的广义基尔霍夫定律-约翰逊噪声(KLJN)安全密钥交换系统。
Sci Rep. 2015 Sep 3;5:13653. doi: 10.1038/srep13653.
3
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system.理想基尔霍夫定律-约翰逊噪声安全通信系统中的噪声特性。
PLoS One. 2014 Apr 22;9(4):e96109. doi: 10.1371/journal.pone.0096109. eCollection 2014.
4
Errors and their mitigation at the kirchhoff-law-johnson-noise secure key exchange.基尔霍夫-约翰逊-噪声密钥交换中的误差及其缓解方法。
PLoS One. 2013 Nov 26;8(11):e81103. doi: 10.1371/journal.pone.0081103. eCollection 2013.
5
A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.TMIS 中分层多医疗服务器环境的安全稳健的用户认证密钥协商方案。
J Med Syst. 2015 Sep;39(9):92. doi: 10.1007/s10916-015-0276-5. Epub 2015 Aug 6.
6
Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.针对公钥替换攻击和内部攻击具有安全性的高效基于证书的签密。
ScientificWorldJournal. 2014;2014:295419. doi: 10.1155/2014/295419. Epub 2014 May 12.
7
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.远程医疗信息系统中增强的医患相互认证协议的设计与分析。
J Med Syst. 2015 Nov;39(11):137. doi: 10.1007/s10916-015-0307-2. Epub 2015 Sep 1.
8
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.一种用于连接式医疗保健的安全高效的保持唯一性和匿名性的远程用户认证方案。
J Med Syst. 2013 Jun;37(3):9948. doi: 10.1007/s10916-013-9948-1. Epub 2013 May 10.
9
Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.基于二进制相移键控和混沌的远程医疗多用户通信方案。
Comput Methods Programs Biomed. 2018 Aug;162:165-175. doi: 10.1016/j.cmpb.2018.05.021. Epub 2018 May 17.
10
An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.一种使用混沌哈希函数的带现时值的远程医疗信息系统增强型生物特征认证方案。
J Med Syst. 2014 Jun;38(6):27. doi: 10.1007/s10916-014-0027-z. Epub 2014 Jun 3.

引用本文的文献

1
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors.采用任意电阻器的广义基尔霍夫定律-约翰逊噪声(KLJN)安全密钥交换系统。
Sci Rep. 2015 Sep 3;5:13653. doi: 10.1038/srep13653.
2
A directional wave measurement attack against the Kish key distribution system.针对 Kish 密钥分配系统的定向波测量攻击。
Sci Rep. 2014 Sep 24;4:6461. doi: 10.1038/srep06461.
3
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system.理想基尔霍夫定律-约翰逊噪声安全通信系统中的噪声特性。

本文引用的文献

1
Errors and their mitigation at the kirchhoff-law-johnson-noise secure key exchange.基尔霍夫-约翰逊-噪声密钥交换中的误差及其缓解方法。
PLoS One. 2013 Nov 26;8(11):e81103. doi: 10.1371/journal.pone.0081103. eCollection 2013.
2
Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.基于开关滤波器的智能电网中具有信息理论安全性的增强型约翰逊噪声密钥分发。
PLoS One. 2013 Jul 25;8(7):e70206. doi: 10.1371/journal.pone.0070206. Print 2013.
3
Protocol for direct counterfactual quantum communication.
PLoS One. 2014 Apr 22;9(4):e96109. doi: 10.1371/journal.pone.0096109. eCollection 2014.
4
Errors and their mitigation at the kirchhoff-law-johnson-noise secure key exchange.基尔霍夫-约翰逊-噪声密钥交换中的误差及其缓解方法。
PLoS One. 2013 Nov 26;8(11):e81103. doi: 10.1371/journal.pone.0081103. eCollection 2013.
直接反事实量子通信协议。
Phys Rev Lett. 2013 Apr 26;110(17):170502. doi: 10.1103/PhysRevLett.110.170502. Epub 2013 Apr 23.
4
Controlling an actively-quenched single photon detector with bright light.用强光控制主动猝灭单光子探测器。
Opt Express. 2011 Nov 7;19(23):23590-600. doi: 10.1364/OE.19.023590.
5
Experimentally faking the violation of Bell's inequalities.实验性地伪造违反贝尔不等式。
Phys Rev Lett. 2011 Oct 21;107(17):170404. doi: 10.1103/PhysRevLett.107.170404. Epub 2011 Oct 20.
6
Device calibration impacts security of quantum key distribution.设备校准影响量子密钥分发的安全性。
Phys Rev Lett. 2011 Sep 9;107(11):110501. doi: 10.1103/PhysRevLett.107.110501.
7
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.全场实现量子密码系统的完美窃听者。
Nat Commun. 2011 Jun 14;2:349. doi: 10.1038/ncomms1348.
8
Thermal blinding of gated detectors in quantum cryptography.量子密码术中门控探测器的热致盲
Opt Express. 2010 Dec 20;18(26):27938-54. doi: 10.1364/OE.18.027938.
9
Cryptography. Simple noise may stymie spies without quantum weirdness.密码学。简单的噪声可能会在没有量子怪异现象的情况下阻碍间谍活动。
Science. 2005 Sep 30;309(5744):2148. doi: 10.1126/science.309.5744.2148b.