Loading…

A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System

In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication...

Full description

Saved in:
Bibliographic Details
Published in:Applied sciences 2019-02, Vol.9 (4), p.666
Main Authors: Melhem, Mutaz, Kish, Laszlo
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283
cites cdi_FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283
container_end_page
container_issue 4
container_start_page 666
container_title Applied sciences
container_volume 9
creator Melhem, Mutaz
Kish, Laszlo
description In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, or between different units within an instrument, due to a ground loop and/or electromagnetic interference (EMI). Our present study investigates the DC ground loop situation when no AC or EMI effects are present. Surprisingly, the usual current/voltage comparison-based defense method that exposes active attacks or parasitic features (such as wire resistance allowing information leaks) does not function here. The attack is successfully demonstrated and proposed defense methods against the attack are shown.
doi_str_mv 10.3390/app9040666
format article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_deb1b1a7dd0f4da3a12c0d53e47d255c</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_deb1b1a7dd0f4da3a12c0d53e47d255c</doaj_id><sourcerecordid>2331360053</sourcerecordid><originalsourceid>FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283</originalsourceid><addsrcrecordid>eNpNkU1v2zAMho1hAxa0ufQXCNilG6BWMi3ZOgZFuzUNukPWs0DrI3aaWp6koM2_n9sM3XghQTx8SeItijPOLgAUu8RxVKxiUsoPxaxktaRQ8frjf_XnYp7Slk2hODSczQq_IOuMuTd0F8JIzT5GN2SyyBnNI1lssB9SJrlz5K6PpuuC93SFz3QZuiGFgd6HPjlyfrda3n8lazfNT6Q7kOsX0-GwcWR9SNk9nRafPO6Sm__NJ8XDzfWvqx909fP77dViRQ1InqmS4Gslaq9sI7ipwGLjjLIeOVcIJcrGlAy95Ci8b1G2ioGrhXKtaHnZwElxe9S1Abd6jP0TxoMO2Ou3RogbjXH6due0dS1vOdbWMl9ZBOSlYVaAq2pbCmEmrS9HrTGG33uXst6GfRym83UJwEEyJmCivh0pE0NK0fn3rZzpV1v0P1vgD0MUfuc</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2331360053</pqid></control><display><type>article</type><title>A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System</title><source>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</source><creator>Melhem, Mutaz ; Kish, Laszlo</creator><creatorcontrib>Melhem, Mutaz ; Kish, Laszlo</creatorcontrib><description>In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, or between different units within an instrument, due to a ground loop and/or electromagnetic interference (EMI). Our present study investigates the DC ground loop situation when no AC or EMI effects are present. Surprisingly, the usual current/voltage comparison-based defense method that exposes active attacks or parasitic features (such as wire resistance allowing information leaks) does not function here. The attack is successfully demonstrated and proposed defense methods against the attack are shown.</description><identifier>ISSN: 2076-3417</identifier><identifier>EISSN: 2076-3417</identifier><identifier>DOI: 10.3390/app9040666</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Communication ; ground loop vulnerability ; Information theory ; Internet of Things ; Kirchhoff law ; KLJN key exchange ; Leaking of information ; Noise ; Optical fibers ; passive attack ; Physics ; Power flow ; Quantum computing ; Resistors ; Social security ; Thermal noise ; unconditional security ; Values ; Visibility ; Wireless networks</subject><ispartof>Applied sciences, 2019-02, Vol.9 (4), p.666</ispartof><rights>2019. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283</citedby><cites>FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2331360053/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2331360053?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,44590,75126</link.rule.ids></links><search><creatorcontrib>Melhem, Mutaz</creatorcontrib><creatorcontrib>Kish, Laszlo</creatorcontrib><title>A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System</title><title>Applied sciences</title><description>In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, or between different units within an instrument, due to a ground loop and/or electromagnetic interference (EMI). Our present study investigates the DC ground loop situation when no AC or EMI effects are present. Surprisingly, the usual current/voltage comparison-based defense method that exposes active attacks or parasitic features (such as wire resistance allowing information leaks) does not function here. The attack is successfully demonstrated and proposed defense methods against the attack are shown.</description><subject>Communication</subject><subject>ground loop vulnerability</subject><subject>Information theory</subject><subject>Internet of Things</subject><subject>Kirchhoff law</subject><subject>KLJN key exchange</subject><subject>Leaking of information</subject><subject>Noise</subject><subject>Optical fibers</subject><subject>passive attack</subject><subject>Physics</subject><subject>Power flow</subject><subject>Quantum computing</subject><subject>Resistors</subject><subject>Social security</subject><subject>Thermal noise</subject><subject>unconditional security</subject><subject>Values</subject><subject>Visibility</subject><subject>Wireless networks</subject><issn>2076-3417</issn><issn>2076-3417</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNpNkU1v2zAMho1hAxa0ufQXCNilG6BWMi3ZOgZFuzUNukPWs0DrI3aaWp6koM2_n9sM3XghQTx8SeItijPOLgAUu8RxVKxiUsoPxaxktaRQ8frjf_XnYp7Slk2hODSczQq_IOuMuTd0F8JIzT5GN2SyyBnNI1lssB9SJrlz5K6PpuuC93SFz3QZuiGFgd6HPjlyfrda3n8lazfNT6Q7kOsX0-GwcWR9SNk9nRafPO6Sm__NJ8XDzfWvqx909fP77dViRQ1InqmS4Gslaq9sI7ipwGLjjLIeOVcIJcrGlAy95Ci8b1G2ioGrhXKtaHnZwElxe9S1Abd6jP0TxoMO2Ou3RogbjXH6due0dS1vOdbWMl9ZBOSlYVaAq2pbCmEmrS9HrTGG33uXst6GfRym83UJwEEyJmCivh0pE0NK0fn3rZzpV1v0P1vgD0MUfuc</recordid><startdate>20190215</startdate><enddate>20190215</enddate><creator>Melhem, Mutaz</creator><creator>Kish, Laszlo</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>DOA</scope></search><sort><creationdate>20190215</creationdate><title>A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System</title><author>Melhem, Mutaz ; Kish, Laszlo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Communication</topic><topic>ground loop vulnerability</topic><topic>Information theory</topic><topic>Internet of Things</topic><topic>Kirchhoff law</topic><topic>KLJN key exchange</topic><topic>Leaking of information</topic><topic>Noise</topic><topic>Optical fibers</topic><topic>passive attack</topic><topic>Physics</topic><topic>Power flow</topic><topic>Quantum computing</topic><topic>Resistors</topic><topic>Social security</topic><topic>Thermal noise</topic><topic>unconditional security</topic><topic>Values</topic><topic>Visibility</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Melhem, Mutaz</creatorcontrib><creatorcontrib>Kish, Laszlo</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Directory of Open Access Journals</collection><jtitle>Applied sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Melhem, Mutaz</au><au>Kish, Laszlo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System</atitle><jtitle>Applied sciences</jtitle><date>2019-02-15</date><risdate>2019</risdate><volume>9</volume><issue>4</issue><spage>666</spage><pages>666-</pages><issn>2076-3417</issn><eissn>2076-3417</eissn><abstract>In this study, a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, or between different units within an instrument, due to a ground loop and/or electromagnetic interference (EMI). Our present study investigates the DC ground loop situation when no AC or EMI effects are present. Surprisingly, the usual current/voltage comparison-based defense method that exposes active attacks or parasitic features (such as wire resistance allowing information leaks) does not function here. The attack is successfully demonstrated and proposed defense methods against the attack are shown.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/app9040666</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2076-3417
ispartof Applied sciences, 2019-02, Vol.9 (4), p.666
issn 2076-3417
2076-3417
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_deb1b1a7dd0f4da3a12c0d53e47d255c
source Publicly Available Content Database (Proquest) (PQ_SDU_P3)
subjects Communication
ground loop vulnerability
Information theory
Internet of Things
Kirchhoff law
KLJN key exchange
Leaking of information
Noise
Optical fibers
passive attack
Physics
Power flow
Quantum computing
Resistors
Social security
Thermal noise
unconditional security
Values
Visibility
Wireless networks
title A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T09%3A18%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Static-loop-current%20Attack%20Against%20the%20Kirchhoff-Law-Johnson-Noise%20(KLJN)%20Secure%20Key%20Exchange%20System&rft.jtitle=Applied%20sciences&rft.au=Melhem,%20Mutaz&rft.date=2019-02-15&rft.volume=9&rft.issue=4&rft.spage=666&rft.pages=666-&rft.issn=2076-3417&rft.eissn=2076-3417&rft_id=info:doi/10.3390/app9040666&rft_dat=%3Cproquest_doaj_%3E2331360053%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c361t-963f7957f9d851c43da8ec9dfa119a32a68c20af61a5ffba6b903e759eb5b1283%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2331360053&rft_id=info:pmid/&rfr_iscdi=true