使用无噪声阻抗的密钥分配方案密码分析

IF 1.2 4区 工程技术 Q3 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS
Laszlo B. Kish
{"title":"使用无噪声阻抗的密钥分配方案密码分析","authors":"Laszlo B. Kish","doi":"10.1142/s0219477524500287","DOIUrl":null,"url":null,"abstract":"<p>Known key exchange schemes offering information-theoretic (unconditional) security are complex and costly to implement. Nonetheless, they remain the only known methods for achieving unconditional security in key exchange. Therefore, the explorations for simpler solutions for information-theoretic security are highly justified. Lin <i>et al.</i> [1] proposed an interesting hardware key distribution scheme that utilizes thermal-noise-free resistances and DC voltages. A crypto analysis of this system is presented. It is shown that, if Eve gains access to the initial shared secret at any time in the past or future, she can successfully crack all the generated keys in the past and future, even retroactively, using passively obtained and recorded voltages and currents. Therefore, the scheme is not a secure key exchanger, but it is rather a key expander with no more information entropy than the originally shared secret at the beginning. We also point out that the proposed defense methods against active attacks do not function when the original shared secret is compromised because then the communication cannot be efficiently authenticated. However, they do work when an unconditionally secure key exchanger is applied to enable the authenticated communication protocol.</p>","PeriodicalId":55155,"journal":{"name":"Fluctuation and Noise Letters","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2024-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Crypto Analysis of the Key Distribution Scheme Using Noise-Free Resistances\",\"authors\":\"Laszlo B. Kish\",\"doi\":\"10.1142/s0219477524500287\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Known key exchange schemes offering information-theoretic (unconditional) security are complex and costly to implement. Nonetheless, they remain the only known methods for achieving unconditional security in key exchange. Therefore, the explorations for simpler solutions for information-theoretic security are highly justified. Lin <i>et al.</i> [1] proposed an interesting hardware key distribution scheme that utilizes thermal-noise-free resistances and DC voltages. A crypto analysis of this system is presented. It is shown that, if Eve gains access to the initial shared secret at any time in the past or future, she can successfully crack all the generated keys in the past and future, even retroactively, using passively obtained and recorded voltages and currents. Therefore, the scheme is not a secure key exchanger, but it is rather a key expander with no more information entropy than the originally shared secret at the beginning. We also point out that the proposed defense methods against active attacks do not function when the original shared secret is compromised because then the communication cannot be efficiently authenticated. However, they do work when an unconditionally secure key exchanger is applied to enable the authenticated communication protocol.</p>\",\"PeriodicalId\":55155,\"journal\":{\"name\":\"Fluctuation and Noise Letters\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2024-02-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fluctuation and Noise Letters\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://doi.org/10.1142/s0219477524500287\",\"RegionNum\":4,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"MATHEMATICS, INTERDISCIPLINARY APPLICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fluctuation and Noise Letters","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.1142/s0219477524500287","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"MATHEMATICS, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

提供信息论(无条件)安全性的已知密钥交换方案实施起来既复杂又昂贵。尽管如此,它们仍然是实现密钥交换无条件安全性的唯一已知方法。因此,探索更简单的信息论安全解决方案是非常合理的。Lin 等人[1]提出了一种有趣的硬件密钥分配方案,它利用了无热噪声电阻和直流电压。文中对该系统进行了密码分析。分析表明,如果夏娃在过去或未来的任何时候获得了初始共享秘密,她就可以利用被动获得和记录的电压和电流,成功破解过去和未来生成的所有密钥,甚至可以追溯。因此,该方案不是一个安全的密钥交换器,而是一个密钥扩充器,其信息熵并不比最初共享的秘密大。我们还指出,当原始共享秘密被泄露时,所提出的针对主动攻击的防御方法就不起作用了,因为这样就无法对通信进行有效验证。然而,当应用无条件安全密钥交换器来启用验证通信协议时,这些方法就能发挥作用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Crypto Analysis of the Key Distribution Scheme Using Noise-Free Resistances

Known key exchange schemes offering information-theoretic (unconditional) security are complex and costly to implement. Nonetheless, they remain the only known methods for achieving unconditional security in key exchange. Therefore, the explorations for simpler solutions for information-theoretic security are highly justified. Lin et al. [1] proposed an interesting hardware key distribution scheme that utilizes thermal-noise-free resistances and DC voltages. A crypto analysis of this system is presented. It is shown that, if Eve gains access to the initial shared secret at any time in the past or future, she can successfully crack all the generated keys in the past and future, even retroactively, using passively obtained and recorded voltages and currents. Therefore, the scheme is not a secure key exchanger, but it is rather a key expander with no more information entropy than the originally shared secret at the beginning. We also point out that the proposed defense methods against active attacks do not function when the original shared secret is compromised because then the communication cannot be efficiently authenticated. However, they do work when an unconditionally secure key exchanger is applied to enable the authenticated communication protocol.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Fluctuation and Noise Letters
Fluctuation and Noise Letters 工程技术-数学跨学科应用
CiteScore
2.90
自引率
22.20%
发文量
43
审稿时长
>12 weeks
期刊介绍: Fluctuation and Noise Letters (FNL) is unique. It is the only specialist journal for fluctuations and noise, and it covers that topic throughout the whole of science in a completely interdisciplinary way. High standards of refereeing and editorial judgment are guaranteed by the selection of Editors from among the leading scientists of the field. FNL places equal emphasis on both fundamental and applied science and the name "Letters" is to indicate speed of publication, rather than a limitation on the lengths of papers. The journal uses on-line submission and provides for immediate on-line publication of accepted papers. FNL is interested in interdisciplinary articles on random fluctuations, quite generally. For example: noise enhanced phenomena including stochastic resonance; 1/f noise; shot noise; fluctuation-dissipation; cardiovascular dynamics; ion channels; single molecules; neural systems; quantum fluctuations; quantum computation; classical and quantum information; statistical physics; degradation and aging phenomena; percolation systems; fluctuations in social systems; traffic; the stock market; environment and climate; etc.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信