Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System

In this paper we determine the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis. It has already been shown using physical laws that resistors and Johnson-like noise sources provide unconditional security. However real implementations use artificial noise generators, therefore it is a question if other kind of noise sources and resistor values could be used as well. We answer this question and in the same time we provide a theoretical basis to analyze real systems as well.

[1]  Laszlo B. Kish,et al.  Unconditional Security by the Laws of Classical Physics , 2013 .

[2]  Derek Abbott,et al.  Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.

[3]  Laszlo B. Kish RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE" , 2006 .

[4]  L. Kish,et al.  Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.

[5]  Charles H. Bennett,et al.  On the security of key distribution based on Johnson-Nyquist noise , 2013, ArXiv.

[6]  Robert S. Balog,et al.  Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.

[7]  Sunil P. Khatri,et al.  A novel cryptographic key exchange scheme using resistors , 2011, 2011 IEEE 29th International Conference on Computer Design (ICCD).

[8]  J. Scheuer,et al.  Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator , 2010, 1002.0087.

[9]  Chiman Kwan,et al.  Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.

[10]  Laszlo B. Kish,et al.  Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange , 2009, ArXiv.

[11]  Laszlo B. Kish,et al.  Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.

[12]  Laszlo B. Kish,et al.  UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.

[13]  Pao-Lo Liu,et al.  A Key Agreement Protocol Using Band-Limited Random Signals and Feedback , 2009, Journal of Lightwave Technology.

[14]  Laszlo B. Kish Response to Scheuer-Yariv: "A Classical Key-Distribution System based on Johnson (like) noise -How Secure?" - short response , 2006 .

[15]  Laszlo B. Kish,et al.  Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2013, PloS one.

[16]  Jacob Scheuer,et al.  A classical key-distribution system based on Johnson (like) noise—How secure? , 2006 .

[17]  F. Hao,et al.  Kish ’ s key exchange scheme is insecure , 2006 .

[18]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[19]  Laszlo B. Kish,et al.  Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.