Please use this identifier to cite or link to this item:
Scopus Web of ScienceĀ® Altmetric
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGunn, L.J.-
dc.contributor.authorAllison, A.-
dc.contributor.authorAbbott, D.-
dc.identifier.citationIEEE Access, 2015; 3:1640-1648-
dc.description.abstractThe Kish Key Distribution (KKD) system has been proposed as a classical alternative to quantum key distribution, making use of temperature-matched thermal noise. Previous analyses assume instant propagation of signals along the cable connecting the two users.We describe a newattack that takes an advantage of propagation delays. At the start of each bit period, the noise temperature will then be increased from zero to its final value. During this process, the noise temperature variation will take time to propagate along the line, resulting in a temperature mismatch. We analyze the information leak due to this effect and consider several potential mitigation schemes.-
dc.description.statementofresponsibilityLachlan J. Gunn, Andrew Allison and Derek Abbott-
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)-
dc.rights2015 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission.-
dc.subjectElectromagnetic propagation; cryptography protocols; channel capacity; cryptography; communication system security-
dc.titleA new transient attack on the Kish key distribution system-
dc.typeJournal article-
dc.identifier.orcidAllison, A. [0000-0003-3865-511X]-
dc.identifier.orcidAbbott, D. [0000-0002-0945-2674]-
Appears in Collections:Aurora harvest 3
Electrical and Electronic Engineering publications

Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.