2014
DOI: 10.1142/s0219477514500217
|View full text |Cite
|
Sign up to set email alerts
|

What Kind of Noise Guarantees Security for the Kirchhoff-Law–Johnson-Noise Key Exchange?

Abstract: This article is a supplement to our recent one about the analysis of the noise properties in the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system [Gingl and Mingesz, PLOS ONE 9 (2014) e96109, doi:10.1371/journal.pone.0096109]. Here we use purely mathematical statistical derivations to prove that only normal distribution with special scaling can guarantee security. Our results are in agreement with earlier physical assumptions [Kish, Phys. Lett. A 352 (2006) 178-182, doi: 10.1016/j.physleta.2005.0… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
27
0
4

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(32 citation statements)
references
References 17 publications
1
27
0
4
Order By: Relevance
“…The Quantum Key Distribution (QKD) [5] and the Kirchhoff-Law-Johnson-Noise (KLJN) [6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26] secure key exchange are two examples of hardware-based secure key exchange concepts that are information theoretically secure [27]. Thus even with infinite computing resources the key will not be extracted by Eve, because the security offered by these schemes are based on fundamental laws of physics, to crack the key exchange would require Eve to break the underpinning laws of physics.…”
Section: Hardware-based Secure Key Exchangesmentioning
confidence: 99%
“…The Quantum Key Distribution (QKD) [5] and the Kirchhoff-Law-Johnson-Noise (KLJN) [6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26] secure key exchange are two examples of hardware-based secure key exchange concepts that are information theoretically secure [27]. Thus even with infinite computing resources the key will not be extracted by Eve, because the security offered by these schemes are based on fundamental laws of physics, to crack the key exchange would require Eve to break the underpinning laws of physics.…”
Section: Hardware-based Secure Key Exchangesmentioning
confidence: 99%
“…The answer to the questions is simple, and we first observe that the voltage Ux(t) will be a Gaussian noise [8][9][10], because a linear combination of Gaussians results in a Gaussian as a consequence of the Central Limit Theorem [11]. Thus the real question regards the variance of the voltage.…”
Section: Case 1: Lossless Short Cable With Very Small Impedancementioning
confidence: 99%
“…According to the security proofs in earlier work [9,10], it is a strict mathematical requirement for the security of the KLJN scheme to have Gaussian processes, which means that the time derivatives also must be Gaussians. GAA did not specify their waveform generator, and thus the degree of Gaussianity remains unclear.…”
Section: Non-gaussianitymentioning
confidence: 99%
“…The Kirchhoff-law-Johnson-noise (KLJN) secure key distribution scheme [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] is a classical-statistical physical alternative to the quantum key distribution. Figure 1 depicts a binary version of the KLJN scheme and shows that, during a single-bit exchange, the communicating parties (Alice and Bob) connect their randomly chosen resistor (including its Johnson noise generator) to a wire channel.…”
Section: Introductionmentioning
confidence: 99%
“…To avoid a potential information leak by variations in the shape of a probability distribution, the noises are Gaussian [1], and it has been proven that other distributions cannot offer perfect security [17,18]. The security against active (invasive) attacks is provided by the robustness of classical-physical quantities, which guarantees that they can be continuously monitored and exchanged between Alice and Bob via authenticated communication.…”
Section: Introductionmentioning
confidence: 99%