On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator
- 244 Downloads
A simple and general proof is given for the information theoretic (unconditional) security of the Kirchhoff-law–Johnson-noise key exchange system under practical conditions. The unconditional security for ideal circumstances, which is based on the second law of thermodynamics, is found to prevail even under slightly non-ideal conditions. This security level is guaranteed by the continuity of functions describing classical physical linear, as well as stable non-linear, systems. Even without privacy amplification, Eve’s probability for successful bit guessing is found to converge toward 0.5—i.e., the perfect security level—when ideal conditions are approached.
KeywordsClassical physical secure key exchange Johnson noise
L.K. is grateful to Horace Yuen, Vadim Makarov, Vincent Poor, and Renato Renner for helpful discussions about relevant security measures.
- 2.Liang, Y., Poor, H.V., Shamai, S. Information theoretic security. Found. Trends Commun. Inform. Theory 5, 355–580 (2008)Google Scholar
- 3.Yuen, H.P.: Essential Lack of Security Proof in Quantum Key Distribution (2013). arXiv:1310.0842Google Scholar
- 4.Hirota, O.: Incompleteness and Limit of Quantum Key Distribution Theory (2012). arXiv:1208.2106Google Scholar
- 5.Renner, R.: Reply to Recent Scepticism About the Foundations of Quantum Cryptography (2012). arXiv:1209.2423v1Google Scholar
- 6.Abbott, D., Schmera, G.: Secure communications using the KLJN scheme. Scholarpedia 8, 31157 (2013). (open access) http://www.scholarpedia.org/article/Secure_communications_using_the_KLJN_scheme
- 9.Mingesz, R., Kish, L.B., Gingl, Z., Granqvist, C.G., Wen, H., Peper, F., Eubanks T., Schmera, G.: Unconditional security by the laws of classical physics. Metrol. Meas. Syst. XX, 3–16 (2013). (open access) http://www.degruyter.com/view/j/mms.2013.20.issue-1/mms-2013-0001/mms-2013-0001.xml
- 11.Saez, Y., Kish, L.B., Mingesz, R., Gingl, Z., Granqvist, C.G.: Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange. J. Comput. Electron. (in press) (2013). arXiv:1309.2179Google Scholar