Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange

L. Kish, C. Granqvist
{"title":"Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange","authors":"L. Kish, C. Granqvist","doi":"10.1515/mms-2016-0007","DOIUrl":null,"url":null,"abstract":"We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random-Resistor-Random-Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.","PeriodicalId":124480,"journal":{"name":"arXiv: Emerging Technologies","volume":"101 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv: Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/mms-2016-0007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26

Abstract

We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random-Resistor-Random-Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.
随机电阻-随机温度Kirchhoff-law-Johnson-noise (RRRT-KLJN)密钥交换
提出了两个新的Kirchhoff-law-Johnson-noise (KLJN)安全密钥分发方案,它们是对原KLJN方案的推广。其中第一种,随机电阻(RR-) KLJN方案,使用随机电阻,其值从准连续统集中选择。众所周知,自从KLJN概念的创建以来,这样的系统可以在密码学中工作,因为Alice和Bob可以从测量中计算未知的电阻值,但是RR-KLJN系统在以前的出版物中没有得到解决,因为它被认为是不切实际的。现在讨论它的原因是第二种方案,随机电阻随机温度(RRRT-) KLJN密钥交换,灵感来自Vadai, Mingesz和Gingl最近的一篇论文,其中安全性被证明在非零功率流下保持。在RRRT-KLJN安全密钥交换方案中,电阻和它们的温度都是连续随机变量。证明了RRRT-KLJN方案在非零潮流下的安全性是占优的,因此保证安全性的物理定律不是热力学第二定律,而是涨落耗散定理。Alice和Bob知道他们自己的电阻和温度,并且可以根据电线中测量的电压、电流和功率流数据计算通信通道另一端的电阻和温度值。然而,Eve无法确定这些值,因为对她来说,有四个未知量,而她只能建立三个方程。RRRT-KLJN方案有几个优点,使得以前针对KLJN方案的攻击都是无效或不完整的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信