Abstract
A simple and general proof is given for the information theoretic (unconditional) security of the Kirchhoff-law–Johnson-noise key exchange system under practical conditions. The unconditional security for ideal circumstances, which is based on the second law of thermodynamics, is found to prevail even under slightly non-ideal conditions. This security level is guaranteed by the continuity of functions describing classical physical linear, as well as stable non-linear, systems. Even without privacy amplification, Eve’s probability for successful bit guessing is found to converge toward 0.5—i.e., the perfect security level—when ideal conditions are approached.
Similar content being viewed by others
References
Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2012)
Liang, Y., Poor, H.V., Shamai, S. Information theoretic security. Found. Trends Commun. Inform. Theory 5, 355–580 (2008)
Yuen, H.P.: Essential Lack of Security Proof in Quantum Key Distribution (2013). arXiv:1310.0842
Hirota, O.: Incompleteness and Limit of Quantum Key Distribution Theory (2012). arXiv:1208.2106
Renner, R.: Reply to Recent Scepticism About the Foundations of Quantum Cryptography (2012). arXiv:1209.2423v1
Abbott, D., Schmera, G.: Secure communications using the KLJN scheme. Scholarpedia 8, 31157 (2013). (open access) http://www.scholarpedia.org/article/Secure_communications_using_the_KLJN_scheme
Kish, L.B.: Totally secure classical communication utilizing Johnson(-like) noise and Kirchhoff’s law. Phys. Lett. A 352, 178–182 (2006)
Mingesz, R., Gingl, Z., Kish, L.B.: Johnson(-like)-noise–Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line. Phys. Lett. A 372, 978–984 (2008)
Mingesz, R., Kish, L.B., Gingl, Z., Granqvist, C.G., Wen, H., Peper, F., Eubanks T., Schmera, G.: Unconditional security by the laws of classical physics. Metrol. Meas. Syst. XX, 3–16 (2013). (open access) http://www.degruyter.com/view/j/mms.2013.20.issue-1/mms-2013-0001/mms-2013-0001.xml
Horvath, T., Kish, L.B., Scheuer, J.: Effective privacy amplification for secure classical communications. EPL 94, 28002 (2011)
Saez, Y., Kish, L.B., Mingesz, R., Gingl, Z., Granqvist, C.G.: Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange. J. Comput. Electron. (in press) (2013). arXiv:1309.2179
Rosenthal, J.S.: Convergence rates of Markov chains. SIAM Rev. 37, 387–405 (1995)
Acknowledgments
L.K. is grateful to Horace Yuen, Vadim Makarov, Vincent Poor, and Renato Renner for helpful discussions about relevant security measures.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kish, L.B., Granqvist, C.G. On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator. Quantum Inf Process 13, 2213–2219 (2014). https://doi.org/10.1007/s11128-014-0729-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-014-0729-7