What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange?

This paper is a supplement to our recent one about the analysis of the noise properties in the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system [Gingl and Mingesz, PLOS ONE 9 (2014) e96109, doi: 10.1371/journal.pone.0096109]. Here, we use purely mathematical statistical derivations to prove that only normal distribution with special scaling can guarantee security. Our results are in agreement with earlier physical assumptions [Kish, Phys. Lett. A 352 (2006) 178–182, doi: 10.1016/j.physleta.2005.11.062]. Furthermore, we have carried out numerical simulations to show that the communication is clearly unsecure for improper selection of the noise properties. Protection against attacks using time and correlation analysis is not considered in this paper. Related simulations are available at http://www.noise.inf.u-szeged.hu/Research/kljn/.

[1]  L. Kish,et al.  Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.

[2]  Charles H. Bennett,et al.  On the security of key distribution based on Johnson-Nyquist noise , 2013, ArXiv.

[3]  Derek Abbott,et al.  Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.

[4]  Laszlo B. Kish,et al.  Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.

[5]  Robert Mingesz,et al.  Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System , 2014, PloS one.

[6]  Robert S. Balog,et al.  Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.

[7]  Laszlo B. Kish,et al.  Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange , 2009, ArXiv.

[8]  Laszlo B. Kish,et al.  UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.

[9]  Pao-Lo Liu A new look at the classical key exchange system based on amplified Johnson noise , 2009 .

[10]  Chiman Kwan,et al.  Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.

[11]  Laszlo B. Kish RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE" , 2006 .

[12]  Laszlo B. Kish Response to Scheuer-Yariv: "A Classical Key-Distribution System based on Johnson (like) noise -How Secure?" - short response , 2006 .

[13]  E. Lukács,et al.  A Property of the Normal Distribution , 1954 .

[14]  Laszlo B. Kish,et al.  Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.

[15]  Laszlo B. Kish,et al.  Unconditional Security by the Laws of Classical Physics , 2013 .

[16]  Jacob Scheuer,et al.  A classical key-distribution system based on Johnson (like) noise—How secure? , 2006 .

[17]  F. Hao,et al.  Kish ’ s key exchange scheme is insecure , 2006 .

[18]  J. Scheuer,et al.  Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator , 2010, 1002.0087.