Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
1862626 | Physics Letters A | 2006 | 4 Pages |
Abstract
We present a comprehensive analysis of the Johnson (like) noise based classical key-distribution scheme presented by Kish [L.B. Kish, Phys. Lett. A 352 (2006) 178]. We suggest two passive attack strategies that enable an adversary to gain complete knowledge of the exchanged key. The first approach exploits the transient response of the voltage in the transmission line after the resistors are switched and the second one exploits the finite impedance of the wire connecting the two parties.
Related Topics
Physical Sciences and Engineering
Physics and Astronomy
Physics and Astronomy (General)
Authors
Jacob Scheuer, Amnon Yariv,