2013
DOI: 10.2478/mms-2013-0017
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Secure Key Exchange Systems Based on the Johnson- Noise Scheme

Abstract: We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically-perfect security. While these practical improvements offer progressively enhanced security and/or speed for non-ideal conditions, the fundamental physical laws providing the security remain the same.In the "intelligent" KLJN (iKLJN) scheme, Alice and Bob utilize the fact that they exactly know not only their own resistor value but also the s… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
67
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(67 citation statements)
references
References 23 publications
0
67
0
Order By: Relevance
“…Consequently these resistor sets and temperatures are deterministic, which in accordance with Kerckhoffs's principle [23] implies that all of the parameters are known by Eve. (Note that "keying" these parameter values by randomly generating and disseminating them via secure communication, by using the formerly shared key, is of course possible, just as it is the case of the Keyed-KLJN scheme [5] and some quantum versions [24,25], but such enhancements to make Eve's job more difficult are not the topic of the present paper).…”
Section: The Vadai-mingesz-gingl Kljn Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Consequently these resistor sets and temperatures are deterministic, which in accordance with Kerckhoffs's principle [23] implies that all of the parameters are known by Eve. (Note that "keying" these parameter values by randomly generating and disseminating them via secure communication, by using the formerly shared key, is of course possible, just as it is the case of the Keyed-KLJN scheme [5] and some quantum versions [24,25], but such enhancements to make Eve's job more difficult are not the topic of the present paper).…”
Section: The Vadai-mingesz-gingl Kljn Schemementioning
confidence: 99%
“…A disadvantage of the RRRT-KLJN scheme is that the Kish-Granqvist temperature-compensation defense mechanism [16] cannot be used to nullify cable resistance effects against an as yet unknown attack type of such kind. A perhaps more practical version of the RRRT-KLJN scheme is the generalization of the formerly proposed Multiple-KLJN (MKLJN) system [5] based on a random choice of a known large set of resistors by introducing a random choice of temperatures from a known large set of such data. As already mentioned above, the known sets must be properly checked, because only choices with degenerated voltage/current/power values can be considered secure-not the singular values.…”
Section: Some Practical Considerationsmentioning
confidence: 99%
“…Here it is important to realize that the cable voltage and cable current are orthogonal-i.e., uncorrelated-in order to ensure zero net power flow and satisfy the Second Law of Thermodynamics [7,[12][13][14][15], so that U(t) I(t) 0 .…”
Section: Case 1: Lossless Short Cable With Very Small Impedancementioning
confidence: 99%
“…None of them could impair the unconditional security of the scheme, since either there was a proper defense scheme against or attack was based on misconceptions [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][27][28][29][30], including experimental errors. On the other hand, passive attacks against practical KLJN systems deviating from the ideal assumptions of the scheme [2] were discussed in several papers [4][5][6][7][8][9][10][11][12][13]. For example, parasitic or non-ideal features such as transients, wire's resistance, cable capacitance, temperature differences, delay effects and transients, etc.…”
Section: Introductionmentioning
confidence: 99%