Loading…
A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System
In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication...
Saved in:
Published in: | Applied sciences 2019-02, Vol.9 (4), p.666 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283 |
---|---|
cites | cdi_FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283 |
container_end_page | |
container_issue | 4 |
container_start_page | 666 |
container_title | Applied sciences |
container_volume | 9 |
creator | Melhem, Mutaz Kish, Laszlo |
description | In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, or between different units within an instrument, due to a ground loop and/or electromagnetic interference (EMI). Our present study investigates the DC ground loop situation when no AC or EMI effects are present. Surprisingly, the usual current/voltage comparison-based defense method that exposes active attacks or parasitic features (such as wire resistance allowing information leaks) does not function here. The attack is successfully demonstrated and proposed defense methods against the attack are shown. |
doi_str_mv | 10.3390/app9040666 |
format | article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_deb1b1a7dd0f4da3a12c0d53e47d255c</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_deb1b1a7dd0f4da3a12c0d53e47d255c</doaj_id><sourcerecordid>2331360053</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283</originalsourceid><addsrcrecordid>eNpNkU1v2zAMho1hAxa0ufQXCNilG6BWMi3ZOgZFuzUNukPWs0DrI3aaWp6koM2_n9sM3XghQTx8SeItijPOLgAUu8RxVKxiUsoPxaxktaRQ8frjf_XnYp7Slk2hODSczQq_IOuMuTd0F8JIzT5GN2SyyBnNI1lssB9SJrlz5K6PpuuC93SFz3QZuiGFgd6HPjlyfrda3n8lazfNT6Q7kOsX0-GwcWR9SNk9nRafPO6Sm__NJ8XDzfWvqx909fP77dViRQ1InqmS4Gslaq9sI7ipwGLjjLIeOVcIJcrGlAy95Ci8b1G2ioGrhXKtaHnZwElxe9S1Abd6jP0TxoMO2Ou3RogbjXH6due0dS1vOdbWMl9ZBOSlYVaAq2pbCmEmrS9HrTGG33uXst6GfRym83UJwEEyJmCivh0pE0NK0fn3rZzpV1v0P1vgD0MUfuc</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2331360053</pqid></control><display><type>article</type><title>A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System</title><source>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</source><creator>Melhem, Mutaz ; Kish, Laszlo</creator><creatorcontrib>Melhem, Mutaz ; Kish, Laszlo</creatorcontrib><description>In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, or between different units within an instrument, due to a ground loop and/or electromagnetic interference (EMI). Our present study investigates the DC ground loop situation when no AC or EMI effects are present. Surprisingly, the usual current/voltage comparison-based defense method that exposes active attacks or parasitic features (such as wire resistance allowing information leaks) does not function here. The attack is successfully demonstrated and proposed defense methods against the attack are shown.</description><identifier>ISSN: 2076-3417</identifier><identifier>EISSN: 2076-3417</identifier><identifier>DOI: 10.3390/app9040666</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Communication ; ground loop vulnerability ; Information theory ; Internet of Things ; Kirchhoff law ; KLJN key exchange ; Leaking of information ; Noise ; Optical fibers ; passive attack ; Physics ; Power flow ; Quantum computing ; Resistors ; Social security ; Thermal noise ; unconditional security ; Values ; Visibility ; Wireless networks</subject><ispartof>Applied sciences, 2019-02, Vol.9 (4), p.666</ispartof><rights>2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283</citedby><cites>FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2331360053/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2331360053?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,44590,75126</link.rule.ids></links><search><creatorcontrib>Melhem, Mutaz</creatorcontrib><creatorcontrib>Kish, Laszlo</creatorcontrib><title>A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System</title><title>Applied sciences</title><description>In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, or between different units within an instrument, due to a ground loop and/or electromagnetic interference (EMI). Our present study investigates the DC ground loop situation when no AC or EMI effects are present. Surprisingly, the usual current/voltage comparison-based defense method that exposes active attacks or parasitic features (such as wire resistance allowing information leaks) does not function here. The attack is successfully demonstrated and proposed defense methods against the attack are shown.</description><subject>Communication</subject><subject>ground loop vulnerability</subject><subject>Information theory</subject><subject>Internet of Things</subject><subject>Kirchhoff law</subject><subject>KLJN key exchange</subject><subject>Leaking of information</subject><subject>Noise</subject><subject>Optical fibers</subject><subject>passive attack</subject><subject>Physics</subject><subject>Power flow</subject><subject>Quantum computing</subject><subject>Resistors</subject><subject>Social security</subject><subject>Thermal noise</subject><subject>unconditional security</subject><subject>Values</subject><subject>Visibility</subject><subject>Wireless networks</subject><issn>2076-3417</issn><issn>2076-3417</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpNkU1v2zAMho1hAxa0ufQXCNilG6BWMi3ZOgZFuzUNukPWs0DrI3aaWp6koM2_n9sM3XghQTx8SeItijPOLgAUu8RxVKxiUsoPxaxktaRQ8frjf_XnYp7Slk2hODSczQq_IOuMuTd0F8JIzT5GN2SyyBnNI1lssB9SJrlz5K6PpuuC93SFz3QZuiGFgd6HPjlyfrda3n8lazfNT6Q7kOsX0-GwcWR9SNk9nRafPO6Sm__NJ8XDzfWvqx909fP77dViRQ1InqmS4Gslaq9sI7ipwGLjjLIeOVcIJcrGlAy95Ci8b1G2ioGrhXKtaHnZwElxe9S1Abd6jP0TxoMO2Ou3RogbjXH6due0dS1vOdbWMl9ZBOSlYVaAq2pbCmEmrS9HrTGG33uXst6GfRym83UJwEEyJmCivh0pE0NK0fn3rZzpV1v0P1vgD0MUfuc</recordid><startdate>20190215</startdate><enddate>20190215</enddate><creator>Melhem, Mutaz</creator><creator>Kish, Laszlo</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>DOA</scope></search><sort><creationdate>20190215</creationdate><title>A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System</title><author>Melhem, Mutaz ; Kish, Laszlo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Communication</topic><topic>ground loop vulnerability</topic><topic>Information theory</topic><topic>Internet of Things</topic><topic>Kirchhoff law</topic><topic>KLJN key exchange</topic><topic>Leaking of information</topic><topic>Noise</topic><topic>Optical fibers</topic><topic>passive attack</topic><topic>Physics</topic><topic>Power flow</topic><topic>Quantum computing</topic><topic>Resistors</topic><topic>Social security</topic><topic>Thermal noise</topic><topic>unconditional security</topic><topic>Values</topic><topic>Visibility</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Melhem, Mutaz</creatorcontrib><creatorcontrib>Kish, Laszlo</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Directory of Open Access Journals</collection><jtitle>Applied sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Melhem, Mutaz</au><au>Kish, Laszlo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System</atitle><jtitle>Applied sciences</jtitle><date>2019-02-15</date><risdate>2019</risdate><volume>9</volume><issue>4</issue><spage>666</spage><pages>666-</pages><issn>2076-3417</issn><eissn>2076-3417</eissn><abstract>In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, or between different units within an instrument, due to a ground loop and/or electromagnetic interference (EMI). Our present study investigates the DC ground loop situation when no AC or EMI effects are present. Surprisingly, the usual current/voltage comparison-based defense method that exposes active attacks or parasitic features (such as wire resistance allowing information leaks) does not function here. The attack is successfully demonstrated and proposed defense methods against the attack are shown.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/app9040666</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2076-3417 |
ispartof | Applied sciences, 2019-02, Vol.9 (4), p.666 |
issn | 2076-3417 2076-3417 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_deb1b1a7dd0f4da3a12c0d53e47d255c |
source | Publicly Available Content Database (Proquest) (PQ_SDU_P3) |
subjects | Communication ground loop vulnerability Information theory Internet of Things Kirchhoff law KLJN key exchange Leaking of information Noise Optical fibers passive attack Physics Power flow Quantum computing Resistors Social security Thermal noise unconditional security Values Visibility Wireless networks |
title | A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T09%3A18%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Static-loop-current%20Attack%20Against%20the%20Kirchhoff-Law-Johnson-Noise%20(KLJN)%20Secure%20Key%20Exchange%20System&rft.jtitle=Applied%20sciences&rft.au=Melhem,%20Mutaz&rft.date=2019-02-15&rft.volume=9&rft.issue=4&rft.spage=666&rft.pages=666-&rft.issn=2076-3417&rft.eissn=2076-3417&rft_id=info:doi/10.3390/app9040666&rft_dat=%3Cproquest_doaj_%3E2331360053%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2331360053&rft_id=info:pmid/&rfr_iscdi=true |