We demonstrate the security vulnerability of the ideal Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger against transient attacks. Transients start when Alice and Bob connect the wire to their chosen resistor at the beginning of each clock cycle. A transient attack takes place during a short duration of time, before the transients reflected from the end of Alice and Bob mix together. The information leak arises from the fact that Eve (the eavesdropper) monitors the cable, and analyzes the transients during this time period. We will demonstrate such a transient attack, and, then we introduce a defense protocol to protect against the attack. Computer simulations demonstrate that after applying the defense method the information leak becomes negligible.
翻译:我们展示了理想的Kirchhoff-Law-Johnson-Noise(KLJN)关键交换器在安全方面对瞬时攻击的脆弱性。 瞬时交易始于爱丽丝和鲍勃在每个时钟周期开始时将电线连接到他们选择的抵抗器上。 瞬时攻击发生在很短的时间内, 从爱丽丝和鲍勃混合的尽头反射到瞬时。 信息泄漏源于Eve( 窃听器) 监视电缆, 并在这段时间里分析瞬时交易。 我们将展示这种瞬时攻击, 然后我们引入防御协议来防范攻击。 计算机模拟显示,在应用防御方法后,信息泄漏变得微不足道。