838 research outputs found
Error Elimination in the KLJN Secure Key Exchange and Vehicular Applications
The Kirchhoff-law-Johnson-noise (KLJN) system is a classical physical secure key exchange scheme based on the Kirchhoff’s circuit loop law and the fluctuation-dissipation theorem of statistical physics. This dissertation contains two main studies related to this scheme: bit error analysis and removal, and applications in vehicular communication systems.
The thesis starts with a presentation of some of the challenges faced by modern communications. It also includes a description of the working principle of the KLJN system and the motivation upon which this dissertation is built. Then, a study of the errors in this scheme is carried out. In the first part, the types of errors due to statistical inaccuracies in the voltage-based and current-based measurement modes are classified and analyzed. In both measurement modes and for all types of errors, at fixed bandwidth, the error probabilities decay exponentially versus the duration of the bit sharing period. In the second part, an error removal method is proposed to improve the fidelity of the system. This method is based on the combination of the voltage-based and current-based schemes and it drastically reduces the error probabilities.
The second topic of study in the thesis explores a potential practical application for the KLJN key exchange scheme. First, we present a vehicular communication network architecture with unconditionally secure KLJN keys. Secondly, a new solution for secure KLJN key donation to vehicles is proposed and an upper limit for the lifetime of this key is given.
A summary of the work is given in the last section and the main results of the research are discussed. These contributions include: closed-form expressions for the error probabilities in the KLJN system, error removal methods without the need of implementing any error correcting technique, and a new potential vehicular application for the KLJN scheme. Some of the future research initiatives related to these topics are discussed
On KLJN-based secure key distribution in vehicular communication networks
In a former paper [Fluct. Noise Lett., 13 (2014) 1450020] we introduced a
vehicular communication system with unconditionally secure key exchange based
on the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution scheme. In this
paper, we address the secure KLJN key donation to vehicles. This KLJN key
donation solution is performed lane-by-lane by using roadside key provider
equipment embedded in the pavement. A method to compute the lifetime of the
KLJN key is also given. This key lifetime depends on the car density and gives
an upper limit of the lifetime of the KLJN key for vehicular communication
networks.Comment: Accepted for publicatio
Current Injection Attack against the KLJN Secure Key Exchange
The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical
secure key exchange system based on the laws of classical statistical physics
to provide unconditional security. We used the LTSPICE industrial cable and
circuit simulator to emulate one of the major active (invasive) attacks, the
current injection attack, against the ideal and a practical KLJN system,
respectively. We show that two security enhancement techniques, namely, the
instantaneous voltage/current comparison method, and a simple privacy
amplification scheme, independently and effectively eliminate the information
leak and successfully preserve the system's unconditional security
Transient Attacks against the VMG-KLJN Secure Key Exchanger
The security vulnerability of the Vadai, Mingesz, and Gingl (VMG)
Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger, as presented in the
publication "Nature, Science Report 5 (2015) 13653," has been exposed to
transient attacks. Recently an effective defense protocol was introduced (Appl.
Phys. Lett. 122 (2023) 143503) to counteract mean-square voltage-based (or
mean-square current-based) transient attacks targeted at the ideal KLJN
framework.
In the present study, this same mitigation methodology has been employed to
fortify the security of the VMG-KLJN key exchanger. It is worth noting that the
protective measures need to be separately implemented for the HL and LH
scenarios. This conceptual framework is corroborated through computer
simulations, demonstrating that the application of this defensive technique
substantially mitigates information leakage to a point of insignificance
- …