2019
DOI: 10.3390/app9040666
|View full text |Cite
|
Sign up to set email alerts
|

A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System

Abstract: A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic dc-voltage-source in the loop.Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, due to a ground loop and/or electromagnetic interference (EMI).Surprisingly, the usual current/voltage comparison based defense method that exposes active attacks or parasitic features (such as wire resistanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
43
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(43 citation statements)
references
References 50 publications
0
43
0
Order By: Relevance
“…The attack can be countered using the same defense techniques, as described in [14], namely, cancelling the DC voltages, or by increasing the effective (rms) value of noises by increasing the noise temperature and/or the bandwidth (without exceeding the wave limit [1,2,29]). All methods are the same as those discussed in [14], except for the DC voltages cancellation techniques in which the defense can be conducted in two other ways: i) Adding variable DC-voltage sources at each side and tuning them to compensate out the parasitic sources. Alternatively tuning them to reach U DCB -U DCA = 0.…”
Section: Defense Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…The attack can be countered using the same defense techniques, as described in [14], namely, cancelling the DC voltages, or by increasing the effective (rms) value of noises by increasing the noise temperature and/or the bandwidth (without exceeding the wave limit [1,2,29]). All methods are the same as those discussed in [14], except for the DC voltages cancellation techniques in which the defense can be conducted in two other ways: i) Adding variable DC-voltage sources at each side and tuning them to compensate out the parasitic sources. Alternatively tuning them to reach U DCB -U DCA = 0.…”
Section: Defense Methodsmentioning
confidence: 99%
“…The above equation is useful to Eve in the LL and HH situations, where she knows the connected resistors, including R B , see [14].…”
Section: Eve Estimates the Values Of The Ground-loop Voltagesmentioning
confidence: 99%
See 3 more Smart Citations