A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic dc-voltage-source in the loop.Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, due to a ground loop and/or electromagnetic interference (EMI).Surprisingly, the usual current/voltage comparison based defense method that exposes active attacks or parasitic features (such as wire resistance allowing information leak) does not function here. The attack is successfully demonstrated. Proposed defense methods against it are shown.
A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system is studied with unknown parasitic DC-voltage sources at both Alice's and Bob's ends. This paper is the generalization of our earlier investigation with a single-end parasitic source. Under the assumption that Eve does not know the values of the parasitic sources, a new attack, utilizing the current generated by the parasitic dc-voltage sources, is introduced. The attack is mathematically analyzed and demonstrated by computer simulations. Simple defense methods against the attack are shown. The earlier defense method based solely on the comparison of current/voltage data at Alice's and Bob's terminals is useless here since the wire currents and voltages are equal at both ends. However, the more expensive version of the earlier defense method, which is based on in-situ system simulation and comparison with measurements, works efficiently.
This study addresses a new question regarding the security of the Kirchhoff-Law-Johnson-Noise (KLJN) scheme compromised by DC sources at Alice and Bob: What is the impact of these parasitic sources on active attacks, such as the man-in-the-middle (MITM) attack, or the current injection attack if Alice and Bod did not eliminate these sources? The surprising answer is that the parasitic DC sources actually increase the security of the system because, in the case of the MITM attack, they make easier to uncover the eavesdropping than the ideal situation. In some of the cases, Eve can fix this deficiency but then the problem gets reduced to the original MITM attack to which the KLJN scheme is immune, it is already proven earlier.
Recently, several passive and active attack methods have been proposed against the Kirchhoff–Law–Johnson–Noise (KLJN) secure key exchange scheme by utilizing direct (DC) loop currents. The DC current attacks are relatively easy, but their practical importance is low. On the other hand, parasitic alternating (AC) currents are virtually omnipresent in wire-based systems. Such situations exist due to AC ground loops and electromagnetic interference (EMI). However, utilizing AC currents for attacks is a harder problem. Here, we introduce and demonstrate AC current attacks in various frequency ranges. The attacks exploit a parasitic/periodic AC voltage-source at either Alice’s or Bob’s end. In the low-frequency case, the procedure is the generalized form of the former DC ground-loop-based attack. In the high-frequency case, the power density spectrum of the wire voltage is utilized. The attack is demonstrated in both the low and the high-frequency situations. Defense protocols against the attack are also discussed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.