Skip to main content
Log in

On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

A simple and general proof is given for the information theoretic (unconditional) security of the Kirchhoff-law–Johnson-noise key exchange system under practical conditions. The unconditional security for ideal circumstances, which is based on the second law of thermodynamics, is found to prevail even under slightly non-ideal conditions. This security level is guaranteed by the continuity of functions describing classical physical linear, as well as stable non-linear, systems. Even without privacy amplification, Eve’s probability for successful bit guessing is found to converge toward 0.5—i.e., the perfect security level—when ideal conditions are approached.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2012)

    Article  Google Scholar 

  2. Liang, Y., Poor, H.V., Shamai, S. Information theoretic security. Found. Trends Commun. Inform. Theory 5, 355–580 (2008)

  3. Yuen, H.P.: Essential Lack of Security Proof in Quantum Key Distribution (2013). arXiv:1310.0842

  4. Hirota, O.: Incompleteness and Limit of Quantum Key Distribution Theory (2012). arXiv:1208.2106

  5. Renner, R.: Reply to Recent Scepticism About the Foundations of Quantum Cryptography (2012). arXiv:1209.2423v1

  6. Abbott, D., Schmera, G.: Secure communications using the KLJN scheme. Scholarpedia 8, 31157 (2013). (open access) http://www.scholarpedia.org/article/Secure_communications_using_the_KLJN_scheme

  7. Kish, L.B.: Totally secure classical communication utilizing Johnson(-like) noise and Kirchhoff’s law. Phys. Lett. A 352, 178–182 (2006)

    Article  MATH  ADS  Google Scholar 

  8. Mingesz, R., Gingl, Z., Kish, L.B.: Johnson(-like)-noise–Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line. Phys. Lett. A 372, 978–984 (2008)

    Article  MATH  ADS  Google Scholar 

  9. Mingesz, R., Kish, L.B., Gingl, Z., Granqvist, C.G., Wen, H., Peper, F., Eubanks T., Schmera, G.: Unconditional security by the laws of classical physics. Metrol. Meas. Syst. XX, 3–16 (2013). (open access) http://www.degruyter.com/view/j/mms.2013.20.issue-1/mms-2013-0001/mms-2013-0001.xml

  10. Horvath, T., Kish, L.B., Scheuer, J.: Effective privacy amplification for secure classical communications. EPL 94, 28002 (2011)

    Article  ADS  Google Scholar 

  11. Saez, Y., Kish, L.B., Mingesz, R., Gingl, Z., Granqvist, C.G.: Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange. J. Comput. Electron. (in press) (2013). arXiv:1309.2179

  12. Rosenthal, J.S.: Convergence rates of Markov chains. SIAM Rev. 37, 387–405 (1995)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgments

L.K. is grateful to Horace Yuen, Vadim Makarov, Vincent Poor, and Renato Renner for helpful discussions about relevant security measures.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laszlo B. Kish.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kish, L.B., Granqvist, C.G. On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator. Quantum Inf Process 13, 2213–2219 (2014). https://doi.org/10.1007/s11128-014-0729-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-014-0729-7

Keywords

Navigation