Cable Capacitance Attack against the KLJN Secure Key Exchange

The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the Fluctuation-Dissipation-Theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small information leak, which can be mitigated by privacy amplification or other techniques so that the unconditional (information theoretic) security is preserved. In this paper, the industrial cable and circuit simulator LTSPICE is used to validate the information leak due to one of the non-idealities in KLJN, the parasitic (cable) capacitance. Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak.

[1]  L. Kish,et al.  Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.

[2]  Zoltan Gingl,et al.  Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors , 2015, Scientific Reports.

[3]  Laszlo B. Kish PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY , 2006 .

[4]  Charles H. Bennett,et al.  On the security of key distribution based on Johnson-Nyquist noise , 2013, ArXiv.

[5]  Vadim Makarov,et al.  Avoiding the blinding attack in QKD , 2010 .

[6]  J. Skaar,et al.  Thermal blinding of gated detectors in quantum cryptography. , 2010, Optics express.

[7]  Laszlo B. Kish,et al.  UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.

[8]  Horace P. Yuen Unconditional Security In Quantum Key Distribution , 2012 .

[9]  Laszlo B. Kish RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE" , 2006 .

[10]  Laszlo B. Kish,et al.  Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system , 2014, ArXiv.

[11]  Adrian Cho,et al.  Simple Noise May Stymie Spies Without Quantum Weirdness , 2005, Science.

[12]  Robert S. Balog,et al.  Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges , 2015, Entropy.

[13]  Zeeya Merali,et al.  Hackers blind quantum cryptographers , 2010 .

[14]  Laszlo B. Kish Response to Scheuer-Yariv: "A Classical Key-Distribution System based on Johnson (like) noise -How Secure?" - short response , 2006 .

[15]  Laszlo B. Kish,et al.  Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.

[16]  Laszlo B. Kish,et al.  Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2013, PloS one.

[17]  Osamu Hirota,et al.  Incompleteness and Limit of Quantum Key Distribution Theory : Yuen theory vs Renner theory , 2012, 1208.2106.

[18]  Vadim Makarov,et al.  Controlling an actively-quenched single photon detector with bright light. , 2008, Optics express.

[19]  Claes-Goran Granqvist,et al.  Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange , 2015, 1509.08150.

[20]  H.P. Yuen,et al.  Key Generation: Foundations and a New Quantum Approach , 2009, IEEE Journal of Selected Topics in Quantum Electronics.

[21]  Gerd Leuchs,et al.  Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.

[22]  Horace P. Yuen,et al.  On the Foundations of Quantum Key Distribution - Reply to Renner and Beyond , 2012 .

[23]  Vadim Makarov,et al.  Superlinear threshold detectors in quantum cryptography , 2011, 1106.2119.

[24]  Hoi-Kwong Lo,et al.  Measurement-Device-Independent Quantum Cryptography , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[25]  J. Skaar,et al.  Controlling a superconducting nanowire single-photon detector using tailored bright illumination , 2011, 1106.2396.

[26]  Janusz Smulko,et al.  Performance Analysis of the "Intelligent" Kirchhoff-Law–Johnson-Noise Secure Key Exchange , 2014 .

[27]  J. Skaar,et al.  Tailored bright illumination attack on distributed-phase-reference protocols , 2010, 1012.4366.

[28]  Ferdinand Peper,et al.  Information Networks Secured by the Laws of Physics , 2011, IEICE Trans. Commun..

[29]  L. B. Kish,et al.  Waves in a short cable at low frequencies, or just hand-waving? What does physics say? , 2015, 2015 International Conference on Noise and Fluctuations (ICNF).

[30]  V. Makarov Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.

[31]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[32]  Johannes Skaar,et al.  Avoiding the blinding attack in QKD , 2010, 1012.0476.

[33]  V. Makarov,et al.  Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[34]  H. Yuen Essential lack of security proof in quantum key distribution , 2013, 1310.0842.

[35]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[36]  Renato Renner,et al.  Reply to recent scepticism about the foundations of quantum cryptography , 2012, ArXiv.

[37]  Jacob Scheuer,et al.  A classical key-distribution system based on Johnson (like) noise—How secure? , 2006 .

[38]  F. Hao,et al.  Kish ’ s key exchange scheme is insecure , 2006 .

[39]  Vadim Makarov,et al.  Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..

[40]  Christian Kurtsiefer,et al.  Experimentally faking the violation of Bell's inequalities. , 2011, Physical review letters.

[41]  Laszlo B. Kish,et al.  Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.

[42]  Xiaolin Cao,et al.  Securing vehicle communication systems by the KLJN key exchange protocol , 2014, ArXiv.

[43]  J. Scheuer,et al.  Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator , 2010, 1002.0087.

[44]  J. Skaar,et al.  After-gate attack on a quantum cryptosystem , 2010, 1009.2683.

[45]  Robert S. Balog,et al.  Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.

[46]  Laszlo B. Kish,et al.  On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott , 2014, ArXiv.

[47]  Horace P. Yuen Security Significance of the Trace Distance Criterion in Quantum Key Distribution , 2011 .

[48]  Laszlo B. Kish,et al.  Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange , 2009, ArXiv.

[49]  Laszlo B. Kish,et al.  Bit Errors in the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2014 .

[50]  Laszlo B. Kish,et al.  On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator , 2013, Quantum Inf. Process..

[51]  Kaikai Xu,et al.  Increased Efficiency of Silicon Light-Emitting Device in Standard Si-CMOS Technology , 2015, IEEE Journal of Quantum Electronics.

[52]  Chiman Kwan,et al.  Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.

[53]  Andrea Fiore,et al.  Waveguide Nanowire Superconducting Single-Photon Detectors Fabricated on GaAs and the Study of Their Optical Properties , 2015, IEEE Journal of Selected Topics in Quantum Electronics.

[54]  Shihan Sajeed,et al.  Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch , 2015, 1502.02785.

[55]  Derek Abbott,et al.  Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.

[56]  Laszlo B. Kish,et al.  Do electromagnetic waves exist in a short cable at low frequencies? What does physics say? , 2014, The Random and Fluctuating World.

[57]  L. Kish,et al.  TOTALLY SECURE CLASSICAL NETWORKS WITH MULTIPOINT TELECLONING (TELEPORTATION) OF CLASSICAL BITS THROUGH LOOPS WITH JOHNSON-LIKE NOISE , 2006, physics/0603041.

[58]  Nicolas Gisin,et al.  Random Variation of Detector Efficiency: A Countermeasure Against Detector Blinding Attacks for Quantum Key Distribution , 2014, IEEE Journal of Selected Topics in Quantum Electronics.

[59]  Jacob Scheuer,et al.  Effective privacy amplification for secure classical communications , 2011, ArXiv.

[60]  Laszlo B. Kish,et al.  Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange , 2013, ArXiv.

[61]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[62]  Laszlo B. Kish,et al.  Unconditional Security by the Laws of Classical Physics , 2013 .

[63]  Laszlo B. Kish,et al.  Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System , 2014, Entropy.