Please use this identifier to cite or link to this item:
|Scopus||Web of Science®||Altmetric|
|Title:||A new transient attack on the kish key distribution system|
|Citation:||IEEE Access, 2015; 3:1640-1648|
|Lachlan J. Gunn, Andrew Allison and Derek Abbott|
|Abstract:||The Kish Key Distribution (KKD) system has been proposed as a classical alternative to quantum key distribution, making use of temperature-matched thermal noise. Previous analyses assume instant propagation of signals along the cable connecting the two users.We describe a newattack that takes an advantage of propagation delays. At the start of each bit period, the noise temperature will then be increased from zero to its final value. During this process, the noise temperature variation will take time to propagate along the line, resulting in a temperature mismatch. We analyze the information leak due to this effect and consider several potential mitigation schemes.|
|Keywords:||Electromagnetic propagation; cryptography protocols; channel capacity; cryptography; communication system security|
|Rights:||2015 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission.|
|Appears in Collections:||Electrical and Electronic Engineering publications|
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.