当前位置: X-MOL 学术arXiv.cs.SY › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources
arXiv - CS - Systems and Control Pub Date : 2020-04-03 , DOI: arxiv-2004.03369
Mutaz Melhem and Laszlo Kish

This study addresses a new question regarding the security of the Kirchhoff-Law-Johnson-Noise (KLJN) scheme compromised by DC sources at Alice and Bob: What is the impact of these parasitic sources on active attacks, such as the man-in-the-middle (MITM) attack, or the current injection attack? The surprising answer is that the parasitic DC sources actually increase the security of the system because, in the case of the MITM attack, they make easier to uncover the eavesdropping. In some of the cases Eve can fix this deficiency but then the problem gets reduced to the original MITM attack to which the KLJN scheme is immune, it is already as proven earlier

中文翻译:

针对受 DC 源破坏的 KLJN 密钥交换器的中间人和当前注入攻击

本研究解决了一个新问题,即由 Alice 和 Bob 的 DC 源破坏的 Kirchhoff-Law-Johnson-Noise (KLJN) 方案的安全性:这些寄生源对主动攻击的影响是什么,例如 man-in-中间(MITM)攻击,还是当前的注入攻击?令人惊讶的答案是寄生直流源实际上提高了系统的安全性,因为在 MITM 攻击的情况下,它们更容易发现窃听。在某些情况下,Eve 可以修复这个缺陷,但随后问题就归结为 KLJN 方案免疫的原始 MITM 攻击,这已经如早先所证明的那样
更新日期:2020-04-08
down
wechat
bug