Experimental study of the Kirchhoff-Law-Johnson-Noise secure key exchange

The Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system provides a way of exchanging secure keys by using classical physics (electricity and thermodynamics). Several theoretical studies have addressed the performance and applicability of the communication protocol, and they have indicated that it is protected against all known types of attacks. However, until now, there have been very few real physical implementations and experimental tests of the protocol. With our work, we continue filling this gap. Details of implementing a KLJN based system are presented using a dedicated hardware and an off-the-shelf solution as well. Furthermore, the results of experimental tests and analysis of the performance will be presented.

[1]  Laszlo B. Kish,et al.  Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.

[2]  L. Kish,et al.  Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.

[3]  Laszlo B. Kish PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY , 2006 .

[4]  Robert S. Balog,et al.  Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.

[5]  Jacob Scheuer,et al.  Noise in the wire: the correct results for the Johnson (-like) noise based secure communicator , 2010 .

[6]  J. Scheuer,et al.  Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator , 2010, 1002.0087.

[7]  L. Kish,et al.  TOTALLY SECURE CLASSICAL NETWORKS WITH MULTIPOINT TELECLONING (TELEPORTATION) OF CLASSICAL BITS THROUGH LOOPS WITH JOHNSON-LIKE NOISE , 2006, physics/0603041.

[8]  Jacob Scheuer,et al.  Effective privacy amplification for secure classical communications , 2011, ArXiv.

[9]  Laszlo B. Kish,et al.  Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange , 2013, ArXiv.

[10]  Ferdinand Peper,et al.  Information Theoretic Security by the Laws of Classical Physics - (Plenary Paper) , 2012, SOFA.