Abstract

The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small information leak, which can be mitigated by privacy amplification or other techniques so that unconditional (information-theoretic) security is preserved. In this paper, the industrial cable and circuit simulator LTSPICE is used to validate the information leak due to one of the non-idealities in KLJN, the parasitic (cable) capacitance. Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak.

Highlights

  • The Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system [1,2,3,4] was first introduced in 2005

  • It was claimed that only quantum key distribution (QKD) [5] could offer unconditional security

  • Studies have consistently shown that both the ideal and the practical KLJN versions remain unconditionally secure [4,34,35,36,37,38,39,40,41,42,43] despite facing various attacks and related information leaks associated with the non-idealities of components in the system

Read more

Summary

Introduction

The Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system [1,2,3,4] was first introduced in 2005. It was claimed that only quantum key distribution (QKD) [5] could offer unconditional (that is, information-theoretic) security. We use the industrial cable and circuit simulator LTSPICE by Linear Technology to simulate practical realizations of the KLJN system and to evaluate the cable capacitance attack. Solutions to mitigate this attack, such as the capacitor killer arrangement [39] and privacy amplification [44], are tested

The KLJN Protocol
Cable Capacitance Attack
Realization of the Attack
Generating the Noise
Comparing the Lumped and Distributed Element Models at Different Wavelengths
The Attack Protocol
Simulation Results of the Cable Capacitance Attack
Capacitor Killer
Privacy Amplification
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.