Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange

@article{Saez2013ErrorsAT,
  title={Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange},
  author={Yessica Saez and Laszlo B. Kish},
  journal={PLoS ONE},
  year={2013},
  volume={8}
}
A method to quantify the error probability at the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange is introduced. The types of errors due to statistical inaccuracies in noise voltage measurements are classified and the error probability is calculated. The most interesting finding is that the error probability decays exponentially with the duration of the time window of single bit exchange. The results indicate that it is feasible to have so small error probabilities of the exchanged bits… 

Figures and Tables from this paper

Bit Errors in the Kirchhoff-Law-Johnson-Noise Secure Key Exchange

This work classifies and analyzes bit errors in the voltage and current measurement modes of the Kirchhoff-law–Johnson-noise secure key distribution system and presents an error mitigation strategy based on the combination of voltage-based and current-based schemes.

Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange

This work classify and analyze bit errors in the current measurement mode of the Kirchhoff-law–Johnson-noise (KLJN) key distribution, and analyzes the combination of voltage and current modes for error removal.

Current and voltage based bit errors and their combined mitigation at the Johnson noise based secure key exchange

We classify and analyze bit errors in the current measurement mode of the Kirchhoff-law– Johnson-noise (KLJN) key distribution. The error probability decays exponentially with increasing bit exchange

Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System

This paper determines the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis and provides a theoretical basis to analyze real systems as well.

Performance analysis of the “intelligent” Kirchhoff-Law-Johnson-Noise secure key exchange

The Kirchhoff-Law-Johnson-Noise system is analyzed and the “intelligent” KLJN (iKLJN) scheme is compared to determine how the duration of the bit exchange window (averaging time) influences the performance of secure bit exchange.

Cable Capacitance Attack against the KLJN Secure Key Exchange

Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak in Kirchhoff-law-Johnson-(like)-noise key exchange system.

Performance Analysis of the "Intelligent" Kirchhoff-Law–Johnson-Noise Secure Key Exchange

This paper analyzes the Kirchhoff-law–Johnson-noise system and compares with the "intelligent" KLJN (iKLJN) scheme to determine how the duration of the bit exchange window (averaging time) influences the performance of the secure bit exchange.

Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol

It is demonstrated that as little as 1% results in a notable power flow along the information channel, which leads to a significant information leak, and that decreasing the effective temperature and reducing nonlinearity results in the KLJN scheme approaching perfect security.

Optimization-Based Strategies for the Error Removal Method in the Ideal, Symmetric KLJN Secure Key Exchanger

Numerical results show that the proposed optimization techniques not only ensure that the bit probability error remains within the desired limit, but also provide more flexibility to define the thresholds values, reduce the bit exchange period needed to guarantee an acceptable bit error probability, weaken Eve's statistics, and improve the system resource managing.

A Static-Loop-Current Attack against the KLJN Secure Key Exchange System

A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is introduced based on studying the number of samples per bit in the security key that the measured Alice/Bob voltages exceeds or falls below a threshold voltage, respectively.

References

SHOWING 1-10 OF 50 REFERENCES

Information Theoretic Security by the Laws of Classical Physics - (Plenary Paper)

This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)?

Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme

This paper cracks the BR system with 100% success via passive attacks, and demonstrates that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics.

Enhanced secure key exchange systems based on the Johnson-noise scheme

We introduce seven new versions of the Kirchhoff -Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically -perfect security. While

Information Networks Secured by the Laws of Physics

The state of the art of the secure key exchange method that is secured by the laws of classical statistical physics, and involves the Kirchhoff’s law and the generalized Johnson noise equation is surveyed.

RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE"

It is pointed out that the necessity to build a statistics to extract information during the properly chosen clock time leads to extremely poor eavesdropper statistics and this situation provides a good practical raw bit security that can be orders of magnitude beyond the rawbit security of idealized quantum communicators.

A new look at the classical key exchange system based on amplified Johnson noise