2016
DOI: 10.1515/mms-2016-0025
|View full text |Cite
|
Sign up to set email alerts
|

Current Injection Attack against the KLJN Secure Key Exchange

Abstract: The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show that two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 24 publications
(21 citation statements)
references
References 45 publications
0
20
0
1
Order By: Relevance
“…ii) Active attacks, where Eve either modifies the information channel or she injects an extra current into that. Current injection attack [30,49] and the man-in-the-attack [50] are the explored examples [2006]. Due to the current and voltage comparison [50] feature and its more advanced cable-modeling version [49], active attacks are, so far, the least efficient attacks against the KLJN scheme.…”
Section: On Former Attacks Against the Kljn Secure Key Distributionmentioning
confidence: 99%
“…ii) Active attacks, where Eve either modifies the information channel or she injects an extra current into that. Current injection attack [30,49] and the man-in-the-attack [50] are the explored examples [2006]. Due to the current and voltage comparison [50] feature and its more advanced cable-modeling version [49], active attacks are, so far, the least efficient attacks against the KLJN scheme.…”
Section: On Former Attacks Against the Kljn Secure Key Distributionmentioning
confidence: 99%
“…Several active attacks have been proposed against the KLJN system [5,11,12], but the defense method mentioned above is able to protect the system and maintain its unconditional security under general conditions [12]. Specifically, the KLJN system has been proposed to deliver unconditional security for hardware in computers, games and instruments [13] and to be used as a PUF device [2].…”
Section: The Kljn Key Exchange Schemementioning
confidence: 99%
“…Inspired by these results, Kish and Granqvist proposed a Random-Resistor-Random-Temperature (RRRT-) KLJN scheme that uses random resistances and random temperatures from a continuum interval [21]. Nonetheless, as in any physical scheme of key exchange, various types of attacks against the KLJN system have been (and continue to be) implemented [22][23][24][25][26][27][28]. Fortunately, so far, for each one of those speci¯c attacks, there is a defense mechanism that has been proven to be e®ective [8][9][10][29][30][31][32][33][34] In the KLJN secure key exchanger, the key bits are generated based on measurements of the mean-square value of the noise (voltage and/or current) of the channel between the two communicating parties.…”
Section: Introductionmentioning
confidence: 99%