Transient attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchanger Academic Article uri icon

abstract

  • We demonstrate the security vulnerability of an ideal KirchhoffLawJohnsonNoise key exchanger against transient attacks. Transients start when Alice and Bob connect a wire to their chosen resistor at the beginning of each clock cycle. A transient attack takes place during a short duration of time, before the transients reflected from the end of Alice and Bob mix together. The information leak arises from the fact that Eve (the eavesdropper) monitors the cable and analyzes the transients during this time period. We will demonstrate such a transient attack, and then, we introduce a defense protocol to protect against the attack. Computer simulations demonstrate that after applying the defense method the information leak becomes negligible.

published proceedings

  • APPLIED PHYSICS LETTERS

author list (cited authors)

  • Ferdous, S., & Kish, L. B.

citation count

  • 0

complete list of authors

  • Ferdous, Shahriar||Kish, Laszlo B

publication date

  • April 2023