15 research outputs found
Comments On "A New Transient Attack On The Kish Key Distribution System"
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new
transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key
exchange system. The attack is valid, but it is easy to build a defense for the
KLJN system. Here we note that GAA's paper contains several invalid statements
regarding security measures and the continuity of functions in classical
physics. These deficiencies are clarified in our present paper, wherein we also
emphasize that a new version of the KLJN system is immune against all existing
attacks, including the one by GAA.Comment: Accepted for publication in the journal Metrology and Measurement
Systems (May 2016
Current Injection Attack against the KLJN Secure Key Exchange
The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical
secure key exchange system based on the laws of classical statistical physics
to provide unconditional security. We used the LTSPICE industrial cable and
circuit simulator to emulate one of the major active (invasive) attacks, the
current injection attack, against the ideal and a practical KLJN system,
respectively. We show that two security enhancement techniques, namely, the
instantaneous voltage/current comparison method, and a simple privacy
amplification scheme, independently and effectively eliminate the information
leak and successfully preserve the system's unconditional security
Generalized DC loop current attack against the KLJN secure key exchange scheme
A new attack against the Kirchhoff Law Johnson Noise (KLJN) secure key
distribution system is studied with unknown parasitic DC voltage sources at
both Alices and Bobs ends. This paper is the generalization of our earlier
investigation with a single end parasitic source. Under the assumption that Eve
does not know the values of the parasitic sources, a new attack, utilizing the
current generated by the parasitic dc voltage sources, is introduced. The
attack is mathematically analyzed and demonstrated by computer simulations.
Simple defense methods against the attack are shown. The earlier defense method
based solely on the comparison of current/voltage data at Alice's and Bob's
terminals is useless here since the wire currents and voltages are equal at
both ends. However, the more expensive version of the earlier defense method,
which is based on in situ system simulation and comparison with measurements,
works efficiently.Comment: 11 pages, 6 Figures, and Journal pape