Cable Capacitance Attack against the KLJN Secure Key Exchange

The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small inf...

Full description

Bibliographic Details
Main Authors: Hsien-Pu Chen, Elias Gonzalez, Yessica Saez, Laszlo B. Kish
Format: Article
Language:English
Published: MDPI AG 2015-10-01
Series:Information
Subjects:
Online Access:http://www.mdpi.com/2078-2489/6/4/719
id doaj-dcff0a893aae4a12bba86c6866dc8c26
record_format Article
spelling doaj-dcff0a893aae4a12bba86c6866dc8c262020-11-24T21:34:41ZengMDPI AGInformation2078-24892015-10-016471973210.3390/info6040719info6040719Cable Capacitance Attack against the KLJN Secure Key ExchangeHsien-Pu Chen0Elias Gonzalez1Yessica Saez2Laszlo B. Kish3Department of Electrical and Computer Engineering, Texas A & M University, 3128 TAMU, College Station, TX 77843, USADepartment of Electrical and Computer Engineering, Texas A & M University, 3128 TAMU, College Station, TX 77843, USADepartment of Electrical and Computer Engineering, Texas A & M University, 3128 TAMU, College Station, TX 77843, USADepartment of Electrical and Computer Engineering, Texas A & M University, 3128 TAMU, College Station, TX 77843, USAThe security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small information leak, which can be mitigated by privacy amplification or other techniques so that unconditional (information-theoretic) security is preserved. In this paper, the industrial cable and circuit simulator LTSPICE is used to validate the information leak due to one of the non-idealities in KLJN, the parasitic (cable) capacitance. Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak.http://www.mdpi.com/2078-2489/6/4/719KLJNcable capacitance attackcapacitor killersecure key exchangeunconditional securityprivacy amplification
collection DOAJ
language English
format Article
sources DOAJ
author Hsien-Pu Chen
Elias Gonzalez
Yessica Saez
Laszlo B. Kish
spellingShingle Hsien-Pu Chen
Elias Gonzalez
Yessica Saez
Laszlo B. Kish
Cable Capacitance Attack against the KLJN Secure Key Exchange
Information
KLJN
cable capacitance attack
capacitor killer
secure key exchange
unconditional security
privacy amplification
author_facet Hsien-Pu Chen
Elias Gonzalez
Yessica Saez
Laszlo B. Kish
author_sort Hsien-Pu Chen
title Cable Capacitance Attack against the KLJN Secure Key Exchange
title_short Cable Capacitance Attack against the KLJN Secure Key Exchange
title_full Cable Capacitance Attack against the KLJN Secure Key Exchange
title_fullStr Cable Capacitance Attack against the KLJN Secure Key Exchange
title_full_unstemmed Cable Capacitance Attack against the KLJN Secure Key Exchange
title_sort cable capacitance attack against the kljn secure key exchange
publisher MDPI AG
series Information
issn 2078-2489
publishDate 2015-10-01
description The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small information leak, which can be mitigated by privacy amplification or other techniques so that unconditional (information-theoretic) security is preserved. In this paper, the industrial cable and circuit simulator LTSPICE is used to validate the information leak due to one of the non-idealities in KLJN, the parasitic (cable) capacitance. Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak.
topic KLJN
cable capacitance attack
capacitor killer
secure key exchange
unconditional security
privacy amplification
url http://www.mdpi.com/2078-2489/6/4/719
work_keys_str_mv AT hsienpuchen cablecapacitanceattackagainstthekljnsecurekeyexchange
AT eliasgonzalez cablecapacitanceattackagainstthekljnsecurekeyexchange
AT yessicasaez cablecapacitanceattackagainstthekljnsecurekeyexchange
AT laszlobkish cablecapacitanceattackagainstthekljnsecurekeyexchange
_version_ 1725948077416644608