- Tytuł:
- Enhanced secure key exchange systems based on the Johnson - Noise scheme
- Autorzy:
- Kish, L. B.
- Powiązania:
- https://bibliotekanauki.pl/articles/221578.pdf
- Data publikacji:
- 2013
- Wydawca:
- Polska Akademia Nauk. Czytelnia Czasopism PAN
- Tematy:
-
information theoretic security
unconditional security
practically perfect security
secure key distribution via wire
secure smart power grid - Opis:
- We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically-perfect security. While these practical improvements offer progressively enhanced security and/or speed for non-ideal conditions, the fundamental physical laws providing the security remain the same. In the “intelligent” KLJN (iKLJN) scheme, Alice and Bob utilize the fact that they exactly know not only their own resistor value but also the stochastic time function of their own noise, which they generate before feeding it into the loop. By using this extra information, they can reduce the duration of exchanging a single bit and in this way they achieve not only higher speed but also an enhanced security because Eve's information will significantly be reduced due to smaller statistics. In the “multiple” KLJN (MKLJN) system, Alice and Bob have publicly known identical sets of different resistors with a proper, publicly known truth table about the bit-interpretation of their combination. In this new situation, for Eve to succeed, it is not enough to find out which end has the higher resistor. Eve must exactly identify the actual resistor values at both sides. In the “keyed” KLJN (KKLJN) system, by using secure communication with a formerly shared key, Alice and Bob share a proper time-dependent truth table for the bit-interpretation of the resistor situation for each secure bit exchange step during generating the next key. In this new situation, for Eve to succeed, it is not enough to find out the resistor values at the two ends. Eve must also know the former key. The remaining four KLJN schemes are the combinations of the above protocols to synergically enhance the security properties. These are: the “intelligent-multiple” (iMKLJN), the “intelligent-keyed” (iKKLJN), the “keyed-multiple” (KMKLJN) and the “intelligent-keyed-multiple” (iKMKLJN) KLJN key exchange systems. Finally, we introduce a new transient-protocol offering practically-perfect security without privacy amplification, which is not needed in practical applications but it is shown for the sake of ongoing discussions.
- Źródło:
-
Metrology and Measurement Systems; 2013, 20, 2; 191-204
0860-8229 - Pojawia się w:
- Metrology and Measurement Systems
- Dostawca treści:
- Biblioteka Nauki