Author:
Kish Laszlo B.,Granqvist Claes G.
Abstract
AbstractWe introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.
Reference20 articles.
1. Enhanced secure key exchange systems based on the Johnson - noise scheme Metrol;Kish;Meas Syst,2013
2. Response to Scheuer - Yariv : A classical key - distribution system based on Johnson like ) noise - how secure A;Kish;Phys Lett,2006
3. A classical key - distribution system based on Johnson like ) noise - How secure A;Scheuer;Phys Lett,2006
4. La cryptographie militaire Militaires;Kerckhoffs;Sci,1883
5. On the cracking scheme in the paper A directional coupler attack against the Kish key distribution system by Gunn Allison and Abbott Metrol;Chen;Meas Syst,2014
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献