Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges

@article{Gonzalez2015ResourceRA,
  title={Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges},
  author={Elias Gonzalez and Robert S. Balog and Laszlo B. Kish},
  journal={ArXiv},
  year={2015},
  volume={abs/1504.06541}
}
The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are theoretically information-secure are quantum key distribution (QKD) and Kirchoff-Law-Johnson-Noise (KLJN). However, these concepts require a dedicated connection between hosts in peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A practical and cost effective… Expand
Cable Capacitance Attack against the KLJN Secure Key Exchange
TLDR
Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak in Kirchhoff-law-Johnson-(like)-noise key exchange system. Expand
Unconditional security for the smart power grids and star networks
We introduce a protocol with a reconfigurable switch circuit system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secureExpand
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
This paper introduces and demonstrates two new attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks are based on random number generators with compromisedExpand
Current Injection Attack against the KLJN Secure Key Exchange
TLDR
Two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the Kirchhoff-law-Johnson-noise system's unconditional security. Expand
Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
TLDR
The vulnerability of the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchanger to compromised random number generator(s) even if these random numbers are used solely to generate the noises emulating the Johnson noise of Alice's and Bob's resistors is demonstrated. Expand
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
TLDR
It is demonstrated that a TD as little as 1% results in a notable power flow along the information channel, which leads to a significant information leak. Expand
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange
TLDR
This work proposes a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. Expand
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
TLDR
A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme is introduced, which exploits a parasitic AC voltage-source at either Alice or Bob ends. Expand
Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources
TLDR
This study addresses a new question regarding the security of the Kirchhoff-Law-Johnson-Noise (KLJN) scheme compromised by DC sources by finding that the parasitic DC sources actually increase theSecurity of the system because, in the case of the MITM attack, they make easier to uncover the eavesdropping. Expand
Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
This paper introduces and demonstrates four new statistical attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks utilize compromised random number generatorsExpand
...
1
2
...

References

SHOWING 1-10 OF 65 REFERENCES
Enhanced secure key exchange systems based on the Johnson-noise scheme
We introduce seven new versions of the Kirchhoff -Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically -perfect security. WhileExpand
TOTALLY SECURE CLASSICAL NETWORKS WITH MULTIPOINT TELECLONING (TELEPORTATION) OF CLASSICAL BITS THROUGH LOOPS WITH JOHNSON-LIKE NOISE
First, we show a new inexpensive defense against intruders and the man-in-the-middle attack in the Kirchhoff's-loop-Johnson-like-noise (KLJN) cipher. Then instead of point-to-point communication, weExpand
Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic
TLDR
A "ultra"-strong PUF with intrinsic dynamical randomness, which is not only not cloneable but it also gets renewed to an independent key (with fresh randomness) during each use via the unconditionally secure key exchange. Expand
Unconditional Security by the Laws of Classical Physics
TLDR
The KLJN system is briefly surveyed here with discussions about the essential questions such as perfect and imperfect security characteristics of the key distribution, and how these two types of securities can be unconditional (or information theoretical). Expand
Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law
  • L. Kish
  • Physics, Computer Science
  • 2006
TLDR
An absolutely secure, fast, inexpensive, robust, maintenance-free and low-power- consumption communication is proposed, where the eavesdropper can decode the message if she inject current in the wire and measures the voltage change and the current changes in the two directions. Expand
Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters
We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure keyExpand
UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES
TLDR
Kirchhoff-loop-Johnson-(like)-noise ciphers can easily be integrated on existing types of digital chips in order to provide secure data communication between hardware processors, memory chips, hard disks and other units within a computer or other data processor system. Expand
RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE"
  • L. Kish
  • Computer Science, Physics
  • 2006
TLDR
It is pointed out that the necessity to build a statistics to extract information during the properly chosen clock time leads to extremely poor eavesdropper statistics and this situation provides a good practical raw bit security that can be orders of magnitude beyond the rawbit security of idealized quantum communicators. Expand
Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme
TLDR
This paper cracks the BR system with 100% success via passive attacks, and demonstrates that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. Expand
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
TLDR
It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure. Expand
...
1
2
3
4
5
...