This paper introduces and demonstrates four new statistical attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks utilize compromised random number generators at Alice's/Bob's site(s). The case of partial correlations between Alice's/Bob's and Eve's probing noises is explored, that is, Eve's knowledge of Alice's and Bob's noises is limited but not zero. We explore the bilateral situation where Eve has partial knowledge of Alice's and Bob's random number generators. It is shown that in this situation Eve can crack the secure key bit by taking the highest cross-correlation between her probing noises and the measured voltage noise in the wire. She can also crack the secure key bit by taking the highest cross-correlation between her noise voltages and her evaluation of Alice's/Bob's noise voltages. We then explore the unilateral situation in which Eve has partial knowledge of only Alice's random number generator thus only those noises (of Alice and Eve) are correlated. In this situation Eve can still crack the secure key bit, but for sufficiently low error probability, she needs to use the whole bit exchange period for the attack. The security of the KLJN key exchange scheme, similarly to other protocols, necessitates that the random number generator outputs are truly random for Eve.
翻译:本文介绍并展示了对Kirchhoff-Law-Johnson-Noise(KLJN)安全关键交换机制(KLJN)的四起新的统计攻击。 这些攻击利用了Alice/Bob网站的失密随机数字生成器。 爱丽丝/ Bob和Eve探测噪音之间的部分关联被探索了, 即Eve对Alice和Bob噪音的了解有限, 但不是零。 我们探索了Eve部分了解Alice和Bob随机数字生成器的双边情况。 这表明在这种情况下, Eve通过在Alice/Bob的站点, 使用其随机随机数字生成器, 可以打破安全关键部分。 她也可以打破安全关键部分的关联性, 也就是她对Alice/Bob噪音和Bob噪音的评估是有限的, 但是我们随后探索了单方面的情况, 夏娃只部分了解Alice随机数字生成器, 因而只有这些随机数字(Alice and Bob) 随机数字生成器才能打破安全关键部分部分, 交换了安全性的可能性。 KEvereal的整个时间段, 交换了其他安全性需要。 KL整个安全性。