Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange
@article{Saez2013ErrorsAT, title={Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange}, author={Yessica Saez and Laszlo B. Kish}, journal={PLoS ONE}, year={2013}, volume={8} }
A method to quantify the error probability at the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange is introduced. The types of errors due to statistical inaccuracies in noise voltage measurements are classified and the error probability is calculated. The most interesting finding is that the error probability decays exponentially with the duration of the time window of single bit exchange. The results indicate that it is feasible to have so small error probabilities of the exchanged bits…
36 Citations
Bit Errors in the Kirchhoff-Law-Johnson-Noise Secure Key Exchange
- Physics, Computer Science
- 2014
This work classifies and analyzes bit errors in the voltage and current measurement modes of the Kirchhoff-law–Johnson-noise secure key distribution system and presents an error mitigation strategy based on the combination of voltage-based and current-based schemes.
Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange
- PhysicsArXiv
- 2013
This work classify and analyze bit errors in the current measurement mode of the Kirchhoff-law–Johnson-noise (KLJN) key distribution, and analyzes the combination of voltage and current modes for error removal.
Current and voltage based bit errors and their combined mitigation at the Johnson noise based secure key exchange
- Physics
- 2013
We classify and analyze bit errors in the current measurement mode of the Kirchhoff-law– Johnson-noise (KLJN) key distribution. The error probability decays exponentially with increasing bit exchange…
Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System
- Computer SciencePloS one
- 2014
This paper determines the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis and provides a theoretical basis to analyze real systems as well.
Performance analysis of the “intelligent” Kirchhoff-Law-Johnson-Noise secure key exchange
- Computer Science
- 2014
The Kirchhoff-Law-Johnson-Noise system is analyzed and the “intelligent” KLJN (iKLJN) scheme is compared to determine how the duration of the bit exchange window (averaging time) influences the performance of secure bit exchange.
Cable Capacitance Attack against the KLJN Secure Key Exchange
- Computer ScienceInf.
- 2015
Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak in Kirchhoff-law-Johnson-(like)-noise key exchange system.
Performance Analysis of the "Intelligent" Kirchhoff-Law–Johnson-Noise Secure Key Exchange
- Computer Science
- 2014
This paper analyzes the Kirchhoff-law–Johnson-noise system and compares with the "intelligent" KLJN (iKLJN) scheme to determine how the duration of the bit exchange window (averaging time) influences the performance of the secure bit exchange.
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
- Computer Science, MathematicsFluctuation and Noise Letters
- 2021
It is demonstrated that as little as 1% results in a notable power flow along the information channel, which leads to a significant information leak, and that decreasing the effective temperature and reducing nonlinearity results in the KLJN scheme approaching perfect security.
Optimization-Based Strategies for the Error Removal Method in the Ideal, Symmetric KLJN Secure Key Exchanger
- Computer ScienceFluctuation and Noise Letters
- 2019
Numerical results show that the proposed optimization techniques not only ensure that the bit probability error remains within the desired limit, but also provide more flexibility to define the thresholds values, reduce the bit exchange period needed to guarantee an acceptable bit error probability, weaken Eve's statistics, and improve the system resource managing.
A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
- Computer ScienceArXiv
- 2018
A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is introduced based on studying the number of samples per bit in the security key that the measured Alice/Bob voltages exceeds or falls below a threshold voltage, respectively.
References
SHOWING 1-10 OF 50 REFERENCES
Information Theoretic Security by the Laws of Classical Physics - (Plenary Paper)
- Computer ScienceSOFA
- 2012
This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)?
Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme
- Computer Science, MathematicsPloS one
- 2013
This paper cracks the BR system with 100% success via passive attacks, and demonstrates that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics.
Enhanced secure key exchange systems based on the Johnson-noise scheme
- Computer ScienceArXiv
- 2013
We introduce seven new versions of the Kirchhoff -Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically -perfect security. While…
Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law
- Computer Science
- 2006
Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange
- PhysicsArXiv
- 2009
Information Networks Secured by the Laws of Physics
- Computer ScienceIEICE Trans. Commun.
- 2012
The state of the art of the secure key exchange method that is secured by the laws of classical statistical physics, and involves the Kirchhoff’s law and the generalized Johnson noise equation is surveyed.
RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE"
- Computer Science
- 2006
It is pointed out that the necessity to build a statistics to extract information during the properly chosen clock time leads to extremely poor eavesdropper statistics and this situation provides a good practical raw bit security that can be orders of magnitude beyond the rawbit security of idealized quantum communicators.