Advertisement

Quantum Information Processing

, Volume 13, Issue 10, pp 2213–2219 | Cite as

On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator

  • Laszlo B. Kish
  • Claes G. Granqvist
Article

Abstract

A simple and general proof is given for the information theoretic (unconditional) security of the Kirchhoff-law–Johnson-noise key exchange system under practical conditions. The unconditional security for ideal circumstances, which is based on the second law of thermodynamics, is found to prevail even under slightly non-ideal conditions. This security level is guaranteed by the continuity of functions describing classical physical linear, as well as stable non-linear, systems. Even without privacy amplification, Eve’s probability for successful bit guessing is found to converge toward 0.5—i.e., the perfect security level—when ideal conditions are approached.

Keywords

Classical physical secure key exchange Johnson noise 

Notes

Acknowledgments

L.K. is grateful to Horace Yuen, Vadim Makarov, Vincent Poor, and Renato Renner for helpful discussions about relevant security measures.

References

  1. 1.
    Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2012)CrossRefGoogle Scholar
  2. 2.
    Liang, Y., Poor, H.V., Shamai, S. Information theoretic security. Found. Trends Commun. Inform. Theory 5, 355–580 (2008)Google Scholar
  3. 3.
    Yuen, H.P.: Essential Lack of Security Proof in Quantum Key Distribution (2013). arXiv:1310.0842Google Scholar
  4. 4.
    Hirota, O.: Incompleteness and Limit of Quantum Key Distribution Theory (2012). arXiv:1208.2106Google Scholar
  5. 5.
    Renner, R.: Reply to Recent Scepticism About the Foundations of Quantum Cryptography (2012). arXiv:1209.2423v1Google Scholar
  6. 6.
    Abbott, D., Schmera, G.: Secure communications using the KLJN scheme. Scholarpedia 8, 31157 (2013). (open access) http://www.scholarpedia.org/article/Secure_communications_using_the_KLJN_scheme
  7. 7.
    Kish, L.B.: Totally secure classical communication utilizing Johnson(-like) noise and Kirchhoff’s law. Phys. Lett. A 352, 178–182 (2006)zbMATHCrossRefADSGoogle Scholar
  8. 8.
    Mingesz, R., Gingl, Z., Kish, L.B.: Johnson(-like)-noise–Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line. Phys. Lett. A 372, 978–984 (2008)zbMATHCrossRefADSGoogle Scholar
  9. 9.
    Mingesz, R., Kish, L.B., Gingl, Z., Granqvist, C.G., Wen, H., Peper, F., Eubanks T., Schmera, G.: Unconditional security by the laws of classical physics. Metrol. Meas. Syst. XX, 3–16 (2013). (open access) http://www.degruyter.com/view/j/mms.2013.20.issue-1/mms-2013-0001/mms-2013-0001.xml
  10. 10.
    Horvath, T., Kish, L.B., Scheuer, J.: Effective privacy amplification for secure classical communications. EPL 94, 28002 (2011)CrossRefADSGoogle Scholar
  11. 11.
    Saez, Y., Kish, L.B., Mingesz, R., Gingl, Z., Granqvist, C.G.: Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange. J. Comput. Electron. (in press) (2013). arXiv:1309.2179Google Scholar
  12. 12.
    Rosenthal, J.S.: Convergence rates of Markov chains. SIAM Rev. 37, 387–405 (1995)zbMATHMathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Department of Electrical and Computer EngineeringTexas A&M UniversityCollege StationUSA
  2. 2.Department of Engineering Sciences, The Ångström LaboratoryUppsala UniversityUppsalaSweden

Personalised recommendations