Transient Attack against the KLJN Secure Key Exchanger

02/11/2023
by   Shahriar Ferdous, et al.
0

We demonstrate the security vulnerability of the ideal Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger against transient attacks. Transients start when Alice and Bob connect the wire to their chosen resistor at the beginning of each clock cycle. A transient attack takes place during a short duration of time, before the transients reflected from the end of Alice and Bob mix together. The information leak arises from the fact that Eve (the eavesdropper) monitors the cable, and analyzes the transients during this time period. We will demonstrate such a transient attack, and, then we introduce a defense protocol to protect against the attack. Computer simulations demonstrate that after applying the defense method the information leak becomes negligible.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/09/2023

Transient Attack against the VMG-KLJN Secure Key Exchanger

The security vulnerability of the Vadai, Mingesz, and Gingl (VMG) Kirchh...
research
10/11/2022

Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger

In this paper, the vulnerability of the Vadai, Mingesz and Gingl (VMG)- ...
research
09/30/2019

Generalized DC loop current attack against the KLJN secure key exchange scheme

A new attack against the Kirchhoff Law Johnson Noise (KLJN) secure key d...
research
07/04/2022

Time synchronization protocol for the KLJN secure key exchange scheme

The information theoretically secure Kirchhoff-law-Johnson-noise (KLJN) ...
research
12/20/2022

SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations

Microarchitectural optimizations are expected to play a crucial role in ...
research
10/26/2019

DDM: A Demand-based Dynamic Mitigation for SMT Transient Channels

Different from the traditional software vulnerability, the microarchitec...
research
12/04/2020

Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol

This paper demonstrates the vulnerability of the Kirchhoff-Law-Johnson-N...

Please sign up or login with your details

Forgot password? Click here to reset