Cracking the Bennett-Riedel secure scheme and a critical analysis of their claims about the Kirchhoff-law-Johnson-noise system

نویسندگان

  • Laszlo B. Kish
  • Derek Abbott
  • Claes-Göran Granqvist
چکیده

Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) claimed that, in the Kirchhoff-law-Johnson-noise (KLJN) classical statistical physical key exchange method, thermodynamics (statistical physics) is not essential and that the KLJN scheme provides no security. They attempt to prove the no-thermodynamics view by proposing a dissipation-free deterministic key exchange method with two batteries and two switches. After showing that the BR scheme is unphysical and that some elements of the assumptions violate basic protocols of secure communications, we crack their system by passive attacks in nine different ways, with 100% success, and show that the same cracking methods do not work against the KLJN scheme due to Johnson noise and the Second Law of Thermodynamics. We critically analyze the other claims of BR; among others, we prove that their equations (1-3) describing zero security are incorrect for the KLJN scheme. We give mathematical security proofs for each BR attack type and conclude that the information theoretic (unconditional) security of the KLJN method has not successfully been challenged.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme

Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switc...

متن کامل

Critical analysis of the Bennett–Riedel attack on the secure cryptographic key distributions via the Kirchhoff-law–Johnson-noise scheme

2 Introduction 2 1.1 Is the security of quantum encryption indeed robust? 3 1.2 The KLJN secure key exchange system 4 1.1.1 The idealized KLJN scheme and its security 4 1.1.2 The security of the KLJN scheme is based on the Second Law of Thermodynamics 6 1.1.3 On active (invasive) attacks and attacks utilizing non-idealities 8 1.1.4 Foundations of the information theoretic security in practical ...

متن کامل

1 on the " Cracking " Experiments in Gunn , Allison , Abbott , " a Directional Coupler Attack against the Kish Key Distribution System

Recently Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf] proposed a new scheme to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law–Johnson-noise (KLJN) secure key distribution. In a former paper [http://vixra.org/pdf/1403.0964v4.pdf], we proved that CAA's wave-based attack is unphysical. Here we address their experimental results regarding this attack. ...

متن کامل

Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System

In this paper we determine the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis. It has already been shown using physical laws that resistors and Johnson-like noise sources provide unconditional security. However real implementations use artificial noise generators, therefore it i...

متن کامل

Enhanced Secure Key Exchange Schemes Based on the Johnson - Noise Scheme

We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme. While these practical improvements offer progressively enhanced security and/or speed for the non-ideal conditions, the fundamental physical laws providing the security remain the same.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013