scholarly journals Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors

2015 ◽  
Vol 5 (1) ◽  
Author(s):  
Gergely Vadai ◽  
Robert Mingesz ◽  
Zoltan Gingl
2016 ◽  
Vol 23 (3) ◽  
pp. 321-331 ◽  
Author(s):  
Laszlo B. Kish ◽  
Claes G. Granqvist

Abstract A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA’s paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These deficiencies are clarified in our present paper, wherein we also emphasize that a new version of the KLJN system is immune against all existing attacks, including the one by GAA.


2014 ◽  
Vol 14 (01) ◽  
pp. 1550011 ◽  
Author(s):  
Laszlo B. Kish ◽  
Zoltan Gingl ◽  
Robert Mingesz ◽  
Gergely Vadai ◽  
Janusz Smulko ◽  
...  

A recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an incorrect operation since the single loop is essential for the security in the KLJN system, and hence GAA's asserted information leak is trivial. Another consequence is that a fully defended KLJN system would not be able to function due to its built-in current-comparison defense against active (invasive) attacks. In this paper we crack GAA's scheme via an elementary current-comparison attack which yields negligible error probability for Eve even without averaging over the correlation time of the noise.


2014 ◽  
Vol 13 (03) ◽  
pp. 1450021 ◽  
Author(s):  
Robert Mingesz ◽  
Gergely Vadai ◽  
Zoltan Gingl

This paper is a supplement to our recent one about the analysis of the noise properties in the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system [Gingl and Mingesz, PLOS ONE 9 (2014) e96109, doi: 10.1371/journal.pone.0096109]. Here, we use purely mathematical statistical derivations to prove that only normal distribution with special scaling can guarantee security. Our results are in agreement with earlier physical assumptions [Kish, Phys. Lett. A 352 (2006) 178–182, doi: 10.1016/j.physleta.2005.11.062]. Furthermore, we have carried out numerical simulations to show that the communication is clearly unsecure for improper selection of the noise properties. Protection against attacks using time and correlation analysis is not considered in this paper. Related simulations are available at http://www.noise.inf.u-szeged.hu/Research/kljn/ .


2021 ◽  
pp. 2150050
Author(s):  
Mutaz Y. Melhem ◽  
Christiana Chamon ◽  
Shahriar Ferdous ◽  
Laszlo B. Kish

Recently, several passive and active attack methods have been proposed against the Kirchhoff–Law–Johnson–Noise (KLJN) secure key exchange scheme by utilizing direct (DC) loop currents. The DC current attacks are relatively easy, but their practical importance is low. On the other hand, parasitic alternating (AC) currents are virtually omnipresent in wire-based systems. Such situations exist due to AC ground loops and electromagnetic interference (EMI). However, utilizing AC currents for attacks is a harder problem. Here, we introduce and demonstrate AC current attacks in various frequency ranges. The attacks exploit a parasitic/periodic AC voltage-source at either Alice’s or Bob’s end. In the low-frequency case, the procedure is the generalized form of the former DC ground-loop-based attack. In the high-frequency case, the power density spectrum of the wire voltage is utilized. The attack is demonstrated in both the low and the high-frequency situations. Defense protocols against the attack are also discussed.


2011 ◽  
Vol 3 (1) ◽  
pp. 102-108 ◽  
Author(s):  
K. Saraswathi ◽  
B. Jayaram ◽  
R. Balasubramanian

2014 ◽  
Vol 33 ◽  
pp. 1460368
Author(s):  
Janusz Smulko

The Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system provides a way of exchanging information theoretic secure keys by measuring the random voltage and current through the wire connecting two different resistors at Alice's and Bob's ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper we analyze the KLJN system and compare with “intelligent” KLJN (iKLJN) scheme. This task requires the determination of the applied resistors and the identification of the various superpositions of known and unknown noise components. Some statistical tools to determine how the duration of the bit exchange window (averaging time) influences the performance of secure bit exchange will be explored.


Sign in / Sign up

Export Citation Format

Share Document