uu.seUppsala University Publications
Change search
ReferencesLink to record
Permanent link

Direct link
Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange
Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA..
Uppsala University, Disciplinary Domain of Science and Technology, Technology, Department of Engineering Sciences, Solid State Physics.
2016 (English)In: METROLOGY AND MEASUREMENT SYSTEMS, ISSN 0860-8229, Vol. 23, no 1, 3-11 p.Article in journal (Refereed) PublishedText
Abstract [en]

We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.

Place, publisher, year, edition, pages
2016. Vol. 23, no 1, 3-11 p.
Keyword [en]
KLJN key exchange, information theoretic security, unconditional security
National Category
Accelerator Physics and Instrumentation Engineering and Technology
URN: urn:nbn:se:uu:diva-282477DOI: 10.1515/mms-2016-0007ISI: 000371268000001OAI: oai:DiVA.org:uu-282477DiVA: diva2:917136
Available from: 2016-04-05 Created: 2016-04-05 Last updated: 2016-04-28Bibliographically approved

Open Access in DiVA

fulltext(1309 kB)59 downloads
File information
File name FULLTEXT01.pdfFile size 1309 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Search in DiVA

By author/editor
Granqvist, Claes G.
By organisation
Solid State Physics
Accelerator Physics and InstrumentationEngineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 59 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 170 hits
ReferencesLink to record
Permanent link

Direct link