323 research outputs found

    Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange

    Get PDF
    We classify and analyze bit errors in the current measurement mode of the Kirchhoff-law-Johnson-noise (KLJN) key distribution. The error probability decays exponentially with increasing bit exchange period and fixed bandwidth, which is similar to the error probability decay in the voltage measurement mode. We also analyze the combination of voltage and current modes for error removal. In this combination method, the error probability is still an exponential function that decays with the duration of the bit exchange period, but it has superior fidelity to the former schemes.Comment: 9 pages, accepted for publication in Journal of Computational Electronic

    Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system

    Get PDF
    In this paper we determine the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis. It has already been shown using physical laws that resistors and Johnson-like noise sources provide unconditional security. However real implementations use artificial noise generators, therefore it is a question if other kind of noise sources and resistor values could be used as well. We answer this question and in the same time we provide a theoretical basis to analyze real systems as well

    Error Elimination in the KLJN Secure Key Exchange and Vehicular Applications

    Get PDF
    The Kirchhoff-law-Johnson-noise (KLJN) system is a classical physical secure key exchange scheme based on the Kirchhoff’s circuit loop law and the fluctuation-dissipation theorem of statistical physics. This dissertation contains two main studies related to this scheme: bit error analysis and removal, and applications in vehicular communication systems. The thesis starts with a presentation of some of the challenges faced by modern communications. It also includes a description of the working principle of the KLJN system and the motivation upon which this dissertation is built. Then, a study of the errors in this scheme is carried out. In the first part, the types of errors due to statistical inaccuracies in the voltage-based and current-based measurement modes are classified and analyzed. In both measurement modes and for all types of errors, at fixed bandwidth, the error probabilities decay exponentially versus the duration of the bit sharing period. In the second part, an error removal method is proposed to improve the fidelity of the system. This method is based on the combination of the voltage-based and current-based schemes and it drastically reduces the error probabilities. The second topic of study in the thesis explores a potential practical application for the KLJN key exchange scheme. First, we present a vehicular communication network architecture with unconditionally secure KLJN keys. Secondly, a new solution for secure KLJN key donation to vehicles is proposed and an upper limit for the lifetime of this key is given. A summary of the work is given in the last section and the main results of the research are discussed. These contributions include: closed-form expressions for the error probabilities in the KLJN system, error removal methods without the need of implementing any error correcting technique, and a new potential vehicular application for the KLJN scheme. Some of the future research initiatives related to these topics are discussed

    Resource requirements and speed versus geometry of unconditionally secure physical key exchanges

    Get PDF
    The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information theoretically secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise (KLJN). However, these concepts require a dedicated connection between hosts in peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A practical and cost effective method is to have each host share their respective cable(s) with other hosts such that two remote hosts can realize a secure key exchange without the need of an additional cable or key exchanger. In this article we analyze the cost complexities of cable, key exchangers, and time required in the star network. We mentioned the reliability of the star network and compare it with other network geometries. We also conceived a protocol and equation for the number of secure bit exchange periods needed in a star network. We then outline other network geometries and trade-off possibilities that seem interesting to explore.Comment: 13 pages, 7 figures, MDPI Entrop

    Current Injection Attack against the KLJN Secure Key Exchange

    Full text link
    The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show that two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system's unconditional security

    Transient Attacks against the VMG-KLJN Secure Key Exchanger

    Full text link
    The security vulnerability of the Vadai, Mingesz, and Gingl (VMG) Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger, as presented in the publication "Nature, Science Report 5 (2015) 13653," has been exposed to transient attacks. Recently an effective defense protocol was introduced (Appl. Phys. Lett. 122 (2023) 143503) to counteract mean-square voltage-based (or mean-square current-based) transient attacks targeted at the ideal KLJN framework. In the present study, this same mitigation methodology has been employed to fortify the security of the VMG-KLJN key exchanger. It is worth noting that the protective measures need to be separately implemented for the HL and LH scenarios. This conceptual framework is corroborated through computer simulations, demonstrating that the application of this defensive technique substantially mitigates information leakage to a point of insignificance
    corecore