Current Injection Attack against the KLJN Secure Key Exchange

The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show that two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system's unconditional security.

[1]  Laszlo B. Kish,et al.  Comments On "A New Transient Attack On The Kish Key Distribution System" , 2016, ArXiv.

[2]  Laszlo B. Kish,et al.  Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System , 2014, Entropy.

[3]  Zoltan Gingl,et al.  Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors , 2015, Scientific Reports.

[4]  Laszlo B. Kish RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE" , 2006 .

[5]  L. Kish,et al.  TOTALLY SECURE CLASSICAL NETWORKS WITH MULTIPOINT TELECLONING (TELEPORTATION) OF CLASSICAL BITS THROUGH LOOPS WITH JOHNSON-LIKE NOISE , 2006, physics/0603041.

[6]  Laszlo B. Kish,et al.  Cable Capacitance Attack against the KLJN Secure Key Exchange , 2015, Inf..

[7]  Jacob Scheuer,et al.  Effective privacy amplification for secure classical communications , 2011, ArXiv.

[8]  Laszlo B. Kish,et al.  Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange , 2013, ArXiv.

[9]  Laszlo B. Kish,et al.  UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.

[10]  Laszlo B. Kish,et al.  Unconditionally secure communication via wire , 2007 .

[11]  J. Scheuer,et al.  Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator , 2010, 1002.0087.

[12]  Pao-Lo Liu A new look at the classical key exchange system based on amplified Johnson noise , 2009 .

[13]  Ferdinand Peper,et al.  Information Networks Secured by the Laws of Physics , 2011, IEICE Trans. Commun..

[14]  Jacob Scheuer,et al.  A classical key-distribution system based on Johnson (like) noise—How secure? , 2006 .

[15]  L. B. Kish,et al.  Waves in a short cable at low frequencies, or just hand-waving? What does physics say? , 2015, 2015 International Conference on Noise and Fluctuations (ICNF).

[16]  F. Hao,et al.  Kish ’ s key exchange scheme is insecure , 2006 .

[17]  Laszlo B. Kish,et al.  Do electromagnetic waves exist in a short cable at low frequencies? What does physics say? , 2014, The Random and Fluctuating World.

[18]  Claes-Goran Granqvist,et al.  Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange , 2015, 1509.08150.

[19]  Laszlo B. Kish,et al.  Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.

[20]  Derek Abbott,et al.  Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.

[21]  Xiaolin Cao,et al.  On KLJN-based secure key distribution in vehicular communication networks , 2014, The Random and Fluctuating World.

[22]  Laszlo B. Kish,et al.  Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system , 2014, ArXiv.

[23]  Robert S. Balog,et al.  Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges , 2015, Entropy.

[24]  Robert Mingesz,et al.  Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System , 2014, PloS one.

[25]  Chiman Kwan,et al.  Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.

[26]  Laszlo B. Kish,et al.  Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange , 2015, ArXiv.

[27]  Laszlo B. Kish,et al.  Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.

[28]  Laszlo B. Kish,et al.  Random-resistor-random-temperature KLJN key exchange , 2015, ArXiv.

[29]  Xiaolin Cao,et al.  Securing vehicle communication systems by the KLJN key exchange protocol , 2014, ArXiv.

[30]  Laszlo B. Kish,et al.  On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator , 2013, Quantum Inf. Process..

[31]  Janusz Smulko,et al.  Performance Analysis of the "Intelligent" Kirchhoff-Law–Johnson-Noise Secure Key Exchange , 2014 .

[32]  Adrian Cho,et al.  Simple Noise May Stymie Spies Without Quantum Weirdness , 2005, Science.

[33]  Laszlo B. Kish,et al.  On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott , 2014, ArXiv.

[34]  Laszlo B. Kish,et al.  Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange , 2009, ArXiv.

[35]  Laszlo B. Kish,et al.  Bit Errors in the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2014 .

[36]  L. Kish,et al.  Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.

[37]  Laszlo B. Kish PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY , 2006 .

[38]  Charles H. Bennett,et al.  On the security of key distribution based on Johnson-Nyquist noise , 2013, ArXiv.

[39]  Derek Abbott,et al.  A New Transient Attack on the Kish Key Distribution System , 2015, IEEE Access.

[40]  Janusz Smulko Performance analysis of the “intelligent” Kirchhoff-Law-Johnson-Noise secure key exchange , 2014 .

[41]  Robert S. Balog,et al.  Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.

[42]  Derek Abbott,et al.  A directional wave measurement attack against the Kish key distribution system , 2014, Scientific Reports.

[43]  Laszlo B. Kish,et al.  Enhanced usage of keys obtained by physical, unconditionally secure distributions , 2014, ArXiv.

[44]  Laszlo B. Kish,et al.  Unconditional Security by the Laws of Classical Physics , 2013 .

[45]  Laszlo B. Kish Response to Scheuer-Yariv: "A Classical Key-Distribution System based on Johnson (like) noise -How Secure?" - short response , 2006 .

[46]  Laszlo B. Kish,et al.  Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2013, PloS one.