Random Number Generator, Zero-Crossing, and Nonlinearity Attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol

12/16/2021
by   Christiana Chamon, et al.
0

This dissertation demonstrates three new types of attacks against the KLJN scheme. The first attack type is based on compromised RNGs. The first RNG attacks are deterministic. First, Eve knows both noises. She can crack the bit via Ohm's Law and one-bit powers within a fraction of the bit exchange period. Second, Eve knows only Bob's noise, so she can learn Bob's resistance value via Ohm's Law and Alice's resistance at the end of the bit exchange period. She can also use a process of elimination. The second RNG attacks are statistical. First, Eve has partial knowledge of Alice's and Bob's noises. She can crack the bit by taking the highest cross-correlation between her noises and the measured noise in the wire, and by taking the highest cross-correlation between her noises and Alice's/Bob's noises. Second, Eve has partial knowledge of only Alice's noise. She can still crack the bit, but after the bit exchange period. The second attack type is based on thermodynamics. Previously, the KLJN scheme required thermal equilibrium. However, Vadai, et al, in (Nature) Science Reports shows a modified scheme, where there is a non-zero thermal noise, yet the system resists all the known attacks. We utilize coincidence events between the line current and voltage and show that there is non-zero information leak. As soon as thermal equilibrium is restored, the system is perfectly secure again. The final attack type is based on the nonlinearity of the noise generators. We explore the effect of distortion at the second and third orders. It is demonstrated that 1 leak. We also show that decreasing the effective temperature results in the KLJN scheme approaching perfect security.

READ FULL TEXT

page 29

page 33

page 39

page 41

research
10/06/2021

Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol

This paper introduces and demonstrates four new statistical attacks agai...
research
05/26/2021

Perspective – On the thermodynamics of perfect unconditional security

A secure key distribution (exchange) scheme is unconditionally secure if...
research
08/20/2021

Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol

This paper introduces a new attack against the Kirchhoff-Law-Johnson-Noi...
research
10/08/2020

Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security

In (Nature) Science Report 5 (2015) 13653, Vadai, Mingesz and Gingl (VMG...
research
12/04/2020

Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol

This paper demonstrates the vulnerability of the Kirchhoff-Law-Johnson-N...
research
10/05/2022

Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input

To date, there has been no systematic investigation of thermal profiles ...
research
05/27/2020

Responses and Degrees of Freedom of PVAR for a Continuous Power-Law PSD

This paper is devoted to the use of the Parabolic Variance (PVAR) to cha...

Please sign up or login with your details

Forgot password? Click here to reset