Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange

We classify and analyze bit errors in the current measurement mode of the Kirchhoff-law–Johnson-noise (KLJN) key distribution. The error probability decays exponentially with increasing bit exchange period and fixed bandwidth, which is similar to the error probability decay in the voltage measurement mode. We also analyze the combination of voltage and current modes for error removal. In this combination method, the error probability is still an exponential function that decays with the duration of the bit exchange period, but it has superior fidelity to the former schemes.

[1]  Vadim Makarov,et al.  Comment on “Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography” [Appl. Phys. Lett. 98, 231104 (2011)] , 2011, 1106.3756.

[2]  Vadim Makarov,et al.  Avoiding the blinding attack in QKD , 2010 .

[3]  J. Skaar,et al.  Thermal blinding of gated detectors in quantum cryptography. , 2010, Optics express.

[4]  Vadim Makarov,et al.  Controlling an actively-quenched single photon detector with bright light. , 2008, Optics express.

[5]  Laszlo B. Kish,et al.  Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.

[6]  Osamu Hirota,et al.  Incompleteness and Limit of Quantum Key Distribution Theory : Yuen theory vs Renner theory , 2012, 1208.2106.

[7]  Derek Abbott,et al.  Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.

[8]  Laszlo B. Kish,et al.  UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.

[9]  Horace P. Yuen Unconditional Security In Quantum Key Distribution , 2012 .

[10]  James F. Dynes,et al.  Avoiding the blinding attack in QKD , 2010 .

[11]  J. Skaar,et al.  Tailored bright illumination attack on distributed-phase-reference protocols , 2010, 1012.4366.

[12]  Gilles Brassard,et al.  Quantum Cryptography, or Unforgeable Subway Tokens , 1982, CRYPTO.

[13]  L. Kish,et al.  TOTALLY SECURE CLASSICAL NETWORKS WITH MULTIPOINT TELECLONING (TELEPORTATION) OF CLASSICAL BITS THROUGH LOOPS WITH JOHNSON-LIKE NOISE , 2006, physics/0603041.

[14]  Laszlo B. Kish,et al.  Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.

[16]  Ferdinand Peper,et al.  Information Networks Secured by the Laws of Physics , 2011, IEICE Trans. Commun..

[17]  Hatim Salih,et al.  Protocol for direct counterfactual quantum communication. , 2012, Physical review letters.

[18]  L. Kish,et al.  Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.

[19]  V. Makarov Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.

[20]  J. Skaar,et al.  After-gate attack on a quantum cryptosystem , 2010, 1009.2683.

[21]  Robert S. Balog,et al.  Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.

[22]  Laszlo B. Kish PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY , 2006 .

[23]  Kentaro Kato,et al.  Incompleteness and limit of security theory of quantum key distribution , 2012, Other Conferences.

[24]  Laszlo B. Kish,et al.  Unconditional Security by the Laws of Classical Physics , 2013 .

[25]  Horace P. Yuen Security Significance of the Trace Distance Criterion in Quantum Key Distribution , 2011 .

[26]  Zeeya Merali,et al.  Hackers blind quantum cryptographers , 2010 .

[27]  Laszlo B. Kish,et al.  Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2013, PloS one.

[28]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[29]  Igor Rychlik On Some Reliability Applications of Rice's Formula for the Intensity of Level Crossings , 2000 .

[30]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[31]  Horace P. Yuen,et al.  On the Foundations of Quantum Key Distribution - Reply to Renner and Beyond , 2012 .

[32]  Vadim Makarov,et al.  Superlinear threshold detectors in quantum cryptography , 2011, 1106.2119.

[33]  J. Skaar,et al.  Controlling a superconducting nanowire single-photon detector using tailored bright illumination , 2011, 1106.2396.

[34]  Chiman Kwan,et al.  Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.

[35]  H.P. Yuen,et al.  Key Generation: Foundations and a New Quantum Approach , 2009, IEEE Journal of Selected Topics in Quantum Electronics.

[36]  Gerd Leuchs,et al.  Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.

[37]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[38]  Renato Renner,et al.  Reply to recent scepticism about the foundations of quantum cryptography , 2012, ArXiv.

[39]  S. Rice Mathematical analysis of random noise , 1944 .

[40]  Vadim Makarov,et al.  Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..

[41]  Christian Kurtsiefer,et al.  Experimentally faking the violation of Bell's inequalities. , 2011, Physical review letters.