当前位置: X-MOL 学术Fluct. Noise Lett. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Man in the Middle and Current Injection Attacks Against the KLJN Key Exchanger Compromised by DC Sources
Fluctuation and Noise Letters ( IF 1.8 ) Pub Date : 2020-10-05 , DOI: 10.1142/s0219477521500115
M. Y. Melhem 1 , L. B. Kish 1
Affiliation  

This study addresses a new question regarding the security of the Kirchhoff-Law-Johnson-Noise (KLJN) scheme compromised by DC sources at Alice and Bob: What is the impact of these parasitic sources on active attacks, such as the man-in-the-middle (MITM) attack, or the current injection attack if Alice and Bod did not eliminate these sources? The surprising answer is that the parasitic DC sources actually increase the security of the system because, in the case of the MITM attack, they make easier to uncover the eavesdropping than the ideal situation. In some of the cases, Eve can fix this deficiency but then the problem gets reduced to the original MITM attack to which the KLJN scheme is immune, it is already proven earlier.

中文翻译:

中间人和电流注入攻击 KLJN 密钥交换器受到 DC 源的攻击

这项研究解决了一个关于由 Alice 和 Bob 的 DC 源破坏的 Kirchhoff-Law-Johnson-Noise (KLJN) 方案的安全性的新问题:这些寄生源对主动攻击的影响是什么?中间(MITM)攻击,或者如果 Alice 和 Bod 没有消除这些来源,则当前的注入攻击?令人惊讶的答案是,寄生 DC 源实际上提高了系统的安全性,因为在 MITM 攻击的情况下,它们比理想情况更容易发现窃听。在某些情况下,Eve 可以修复此缺陷,但随后问题会减少到 KLJN 方案免疫的原始 MITM 攻击,这已在较早的时候得到证明。
更新日期:2020-10-05
down
wechat
bug