2014
DOI: 10.1371/journal.pone.0096109
|View full text |Cite
|
Sign up to set email alerts
|

Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System

Abstract: In this paper we determine the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis. It has already been shown using physical laws that resistors and Johnson-like noise sources provide unconditional security. However real implementations use artificial noise generators, therefore it is a question if other kind of noise sources and resistor values could be used as well. We answer this question and in … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
26
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 35 publications
(30 citation statements)
references
References 17 publications
3
26
0
1
Order By: Relevance
“…in agreement with the results presented in [1]. We have carried out numerical simulations to obtain the joint statistics of IE and VE.…”
Section: Resultssupporting
confidence: 87%
See 1 more Smart Citation
“…in agreement with the results presented in [1]. We have carried out numerical simulations to obtain the joint statistics of IE and VE.…”
Section: Resultssupporting
confidence: 87%
“…It has already been stated that the security requires the use of Johnson-like noise, namely the noise must have normal distribution and the standard deviance must be scaled as the root of the resistance [2]. We have proven this statement using purely mathematical statistical tools [1], and in the present article we will show that these noise properties not only needed, but also guarantee absolute security against statistical attacks. Note that in this paper we do not address protection against attacks based on the analysis of the time dependence of the signals.…”
Section: Introductionmentioning
confidence: 51%
“…The Quantum Key Distribution (QKD) [5] and the Kirchhoff-Law-Johnson-Noise (KLJN) [6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26] secure key exchange are two examples of hardware-based secure key exchange concepts that are information theoretically secure [27]. Thus even with infinite computing resources the key will not be extracted by Eve, because the security offered by these schemes are based on fundamental laws of physics, to crack the key exchange would require Eve to break the underpinning laws of physics.…”
Section: Hardware-based Secure Key Exchangesmentioning
confidence: 99%
“…The Kirchhoff-law-Johnson-noise (KLJN) secure key distribution scheme [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] is a classical-statistical physical alternative to the quantum key distribution. Figure 1 depicts a binary version of the KLJN scheme and shows that, during a single-bit exchange, the communicating parties (Alice and Bob) connect their randomly chosen resistor (including its Johnson noise generator) to a wire channel.…”
Section: Introductionmentioning
confidence: 99%
“…To avoid a potential information leak by variations in the shape of a probability distribution, the noises are Gaussian [1], and it has been proven that other distributions cannot offer perfect security [17,18]. The security against active (invasive) attacks is provided by the robustness of classical-physical quantities, which guarantees that they can be continuously monitored and exchanged between Alice and Bob via authenticated communication.…”
Section: Introductionmentioning
confidence: 99%