Cable Capacitance Attack against the KLJN Secure Key Exchange
The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small inf...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2015-10-01
|
Series: | Information |
Subjects: | |
Online Access: | http://www.mdpi.com/2078-2489/6/4/719 |
id |
doaj-dcff0a893aae4a12bba86c6866dc8c26 |
---|---|
record_format |
Article |
spelling |
doaj-dcff0a893aae4a12bba86c6866dc8c262020-11-24T21:34:41ZengMDPI AGInformation2078-24892015-10-016471973210.3390/info6040719info6040719Cable Capacitance Attack against the KLJN Secure Key ExchangeHsien-Pu Chen0Elias Gonzalez1Yessica Saez2Laszlo B. Kish3Department of Electrical and Computer Engineering, Texas A & M University, 3128 TAMU, College Station, TX 77843, USADepartment of Electrical and Computer Engineering, Texas A & M University, 3128 TAMU, College Station, TX 77843, USADepartment of Electrical and Computer Engineering, Texas A & M University, 3128 TAMU, College Station, TX 77843, USADepartment of Electrical and Computer Engineering, Texas A & M University, 3128 TAMU, College Station, TX 77843, USAThe security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small information leak, which can be mitigated by privacy amplification or other techniques so that unconditional (information-theoretic) security is preserved. In this paper, the industrial cable and circuit simulator LTSPICE is used to validate the information leak due to one of the non-idealities in KLJN, the parasitic (cable) capacitance. Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak.http://www.mdpi.com/2078-2489/6/4/719KLJNcable capacitance attackcapacitor killersecure key exchangeunconditional securityprivacy amplification |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Hsien-Pu Chen Elias Gonzalez Yessica Saez Laszlo B. Kish |
spellingShingle |
Hsien-Pu Chen Elias Gonzalez Yessica Saez Laszlo B. Kish Cable Capacitance Attack against the KLJN Secure Key Exchange Information KLJN cable capacitance attack capacitor killer secure key exchange unconditional security privacy amplification |
author_facet |
Hsien-Pu Chen Elias Gonzalez Yessica Saez Laszlo B. Kish |
author_sort |
Hsien-Pu Chen |
title |
Cable Capacitance Attack against the KLJN Secure Key Exchange |
title_short |
Cable Capacitance Attack against the KLJN Secure Key Exchange |
title_full |
Cable Capacitance Attack against the KLJN Secure Key Exchange |
title_fullStr |
Cable Capacitance Attack against the KLJN Secure Key Exchange |
title_full_unstemmed |
Cable Capacitance Attack against the KLJN Secure Key Exchange |
title_sort |
cable capacitance attack against the kljn secure key exchange |
publisher |
MDPI AG |
series |
Information |
issn |
2078-2489 |
publishDate |
2015-10-01 |
description |
The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the fluctuation-dissipation theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small information leak, which can be mitigated by privacy amplification or other techniques so that unconditional (information-theoretic) security is preserved. In this paper, the industrial cable and circuit simulator LTSPICE is used to validate the information leak due to one of the non-idealities in KLJN, the parasitic (cable) capacitance. Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak. |
topic |
KLJN cable capacitance attack capacitor killer secure key exchange unconditional security privacy amplification |
url |
http://www.mdpi.com/2078-2489/6/4/719 |
work_keys_str_mv |
AT hsienpuchen cablecapacitanceattackagainstthekljnsecurekeyexchange AT eliasgonzalez cablecapacitanceattackagainstthekljnsecurekeyexchange AT yessicasaez cablecapacitanceattackagainstthekljnsecurekeyexchange AT laszlobkish cablecapacitanceattackagainstthekljnsecurekeyexchange |
_version_ |
1725948077416644608 |