22 research outputs found

    Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange

    Get PDF
    We classify and analyze bit errors in the current measurement mode of the Kirchhoff-law-Johnson-noise (KLJN) key distribution. The error probability decays exponentially with increasing bit exchange period and fixed bandwidth, which is similar to the error probability decay in the voltage measurement mode. We also analyze the combination of voltage and current modes for error removal. In this combination method, the error probability is still an exponential function that decays with the duration of the bit exchange period, but it has superior fidelity to the former schemes.Comment: 9 pages, accepted for publication in Journal of Computational Electronic

    Error Elimination in the KLJN Secure Key Exchange and Vehicular Applications

    Get PDF
    The Kirchhoff-law-Johnson-noise (KLJN) system is a classical physical secure key exchange scheme based on the Kirchhoff鈥檚 circuit loop law and the fluctuation-dissipation theorem of statistical physics. This dissertation contains two main studies related to this scheme: bit error analysis and removal, and applications in vehicular communication systems. The thesis starts with a presentation of some of the challenges faced by modern communications. It also includes a description of the working principle of the KLJN system and the motivation upon which this dissertation is built. Then, a study of the errors in this scheme is carried out. In the first part, the types of errors due to statistical inaccuracies in the voltage-based and current-based measurement modes are classified and analyzed. In both measurement modes and for all types of errors, at fixed bandwidth, the error probabilities decay exponentially versus the duration of the bit sharing period. In the second part, an error removal method is proposed to improve the fidelity of the system. This method is based on the combination of the voltage-based and current-based schemes and it drastically reduces the error probabilities. The second topic of study in the thesis explores a potential practical application for the KLJN key exchange scheme. First, we present a vehicular communication network architecture with unconditionally secure KLJN keys. Secondly, a new solution for secure KLJN key donation to vehicles is proposed and an upper limit for the lifetime of this key is given. A summary of the work is given in the last section and the main results of the research are discussed. These contributions include: closed-form expressions for the error probabilities in the KLJN system, error removal methods without the need of implementing any error correcting technique, and a new potential vehicular application for the KLJN scheme. Some of the future research initiatives related to these topics are discussed

    Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system

    Get PDF
    A recent paper by Gunn-Allison-Abbott (GAA) [L.J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an incorrect operation since the single loop is essential for the security in the KLJN system, and hence GAA's asserted information leak is trivial. Another consequence is that a fully defended KLJN system would not be able to function due to its built-in current-comparison defense against active (invasive) attacks. In this paper we crack GAA's scheme via an elementary current comparison attack which yields negligible error probability for Eve even without averaging over the correlation time of the noise.Comment: Accepted for publication in Fluctuation and Noise Letters, on November 3, 201

    Current Injection Attack against the KLJN Secure Key Exchange

    Full text link
    The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show that two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system's unconditional security

    On KLJN-based secure key distribution in vehicular communication networks

    Full text link
    In a former paper [Fluct. Noise Lett., 13 (2014) 1450020] we introduced a vehicular communication system with unconditionally secure key exchange based on the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution scheme. In this paper, we address the secure KLJN key donation to vehicles. This KLJN key donation solution is performed lane-by-lane by using roadside key provider equipment embedded in the pavement. A method to compute the lifetime of the KLJN key is also given. This key lifetime depends on the car density and gives an upper limit of the lifetime of the KLJN key for vehicular communication networks.Comment: Accepted for publicatio

    Cable Capacitance Attack against the KLJN Secure Key Exchange

    Full text link
    The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the Fluctuation-Dissipation-Theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small information leak, which can be mitigated by privacy amplification or other techniques so that the unconditional (information theoretic) security is preserved. In this paper, the industrial cable and circuit simulator LTSPICE is used to validate the information leak due to one of the non-idealities in KLJN, the parasitic (cable) capacitance. Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak.Comment: Accepted for publication in the journal: Informatio

    Analysis of an Attenuator Artifact in an Experimental Attack by Gunn鈥揂llison鈥揂bbott Against the Kirchhoff-Law鈥揓ohnson-Noise (KLJN) Secure Key Exchange System

    Get PDF
    A recent paper by Gunn-Allison-Abbott (GAA) [L.J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an incorrect operation since the single loop is essential for the security in the KLJN system, and hence GAA's asserted information leak is trivial. Another consequence is that a fully defended KLJN system would not be able to function due to its built-in current-comparison defense against active (invasive) attacks. In this paper we crack GAA's scheme via an elementary current comparison attack which yields negligible error probability for Eve even without averaging over the correlation time of the noise
    corecore