{"id":28152,"date":"2014-12-18T09:46:07","date_gmt":"2014-12-18T14:46:07","guid":{"rendered":"http:\/\/www.opensource.im\/?p=28152"},"modified":"2014-12-18T09:46:07","modified_gmt":"2014-12-18T14:46:07","slug":"attack-on-classical-cryptography-system-raises-security-questions","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/attack-on-classical-cryptography-system-raises-security-questions.php","title":{"rendered":"Attack on classical cryptography system raises security questions"},"content":{"rendered":"<p><p>Dec 17, 2014 by Lisa Zyga             In the Kish key distribution (KKD) system, the two resistance  values represent the states of an information bit. A  cryptographic key is transmitted along the wire by randomly  switching between the two resistance values, which can be  detected by the sender and receiver via their thermal noise on  the line. Since no net power flows through the line, the only way  that an eavesdropper can measure the resistance values is by  injecting current into the wire and measuring the voltage and  current changes in each direction, but the extra current would be  quickly noticed. Credit: Gunn, et al. 2014 Nature Scientific  Reports    <\/p>\n<p>    (Phys.org)How secure is completely secure? In the world of    secure communication, a scheme may be completely secure until    it's notthat is, until an attack is proposed that reveals a    weak spot in the scheme. This is what's currently going on for    Kish key distribution (KKD), which claims to derive total and    unconditional security using classical rather than quantum    techniques, thus avoiding the complexity and expense of quantum    cryptographic schemes. But now a new paper has uncovered a    vulnerability in KKD that enables an eavesdropper to correctly    determine more than 99.9% of the transmitted bits. Fortunately,    countermeasures may exist to protect against this attack and    regain the system's security.  <\/p>\n<p>    \"The worthiness of a cryptographic scheme is measured by the    number of papers that try to attack it,\" Derek Abbott,    Professor at The University of Adelaide in Australia and    coauthor of the new paper, told Phys.org. Abbott and    coauthors Lachlan J. Gunn and Andrew Allison have published    their paper in a recent issue of Nature's Scientific    Reports.  <\/p>\n<p>    By Abbott's measure, KKD has proven to be very appealing (as    many people have tried to attack it) since it was first    proposed in 2005. Notably, KKD has stood up to attacks from Amnon Yariv (2009 winner of the    National Medal of Science) from Caltech, as well as Charles H.    Bennett of IBM. Bennett co-developed the first ever quantum    cryptography protocol in 1984 (he is the first \"B\" in the    so-called BB84 protocol).  <\/p>\n<p>    Security from thermal noise  <\/p>\n<p>    In the 2005 paper that first introduced KKD, Laszlo B. Kish,    Professor at Texas A&M University, described a system that    promises unconditional security from the second law of    thermodynamics. The scheme transmits a cryptographic key along    a wire by randomly switching between two resistor values, which    represent the states of an information bit, at the two ends of    the line. The sender and receiver passively detect each other's    resistance values via the thermal noise on the line. Each time    the two parties determine each other's resistance values, they    secretly share one bit of information.  <\/p>\n<p>    Because the second law prohibits net power from flowing from    one resistor to another when the system is at equilibrium, a    potential eavesdropper cannot determine the resistance values.    The only way an eavesdropper could intercept the bits is by    injecting current into the wire and measuring the voltage and    current changes in each direction to determine the resistance    values, but the extra current would be quickly noticed.  <\/p>\n<p>    The design of the KKD system relies on a thorough understanding    of the physics of waves traveling through a transmission line.    One debatable requirement for unconditional security in KKD is    that transmission lines prohibit the propagation of waves that    are below a certain frequency, v\/(2L), where    L is the transmission line length and v the    signal propagation velocity. This restriction is claimed to    arise from the fact that wave modes do not propagate below this    frequency.  <\/p>\n<p>    In the new paper, the researchers show in simulations and    experiments that waves with frequencies below this critical    value do actually propagate along the transmission line. The    reason, they explain, is that at low frequencies a coaxial    cable supports TEM (Transverse Electromagnetic) modes, which    have no low frequency cutoff.  <\/p>\n<p>    The researchers detected the existence of propagating TEM waves    on a coaxial cable by constructing a directional wave    measurement device, which they then used to successfully    eavesdrop. They showed that, merely by measuring the TEM waves    traveling along the transmission line, an eavesdropper can    determine both resistor values, allowing them to correctly    intercept more than 99.9% of the bits without being caught.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continue reading here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/phys.org\/news338015987.html\/RK=0\/RS=sR4hk70xRbK5I1W4f5k7Mcln8k8-\" title=\"Attack on classical cryptography system raises security questions\">Attack on classical cryptography system raises security questions<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Dec 17, 2014 by Lisa Zyga In the Kish key distribution (KKD) system, the two resistance values represent the states of an information bit. A cryptographic key is transmitted along the wire by randomly switching between the two resistance values, which can be detected by the sender and receiver via their thermal noise on the line. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-28152","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28152"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28152"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28152\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}