Cybersecurity is a very important aspect of signal transfer, and an urgent need exists to protect intelligence, companies, infrastructure, and personal data in an efficient way. Encryption keys can be used to transfer data between two hosts over a network, but the key itself must also be transmitted over the network to provide it from one host to another with any reasonable speed. However, transfer of such a key over a network makes the key potentially vulnerable to an attack by a third party monitoring the network.
Embodiments of the subject invention provide systems and methods for the secure distribution of keys (e.g., encryption keys) in a network and/or a data communication channel. In many embodiments, a Kirchhoff-Law-Johnson-(like)-Noise (KLJN) secure key exchange protocol is utilized. Systems and methods of the subject invention can be utilized in any network where data is exchanged between elements (e.g., hosts) and where such elements are connected by at least one wire capable of transmitting electrical current. A KLJN secure key exchange protocol according to embodiments of the subject invention provides information security that is information theoretically secure.
In an embodiment, a KLJN system for secure key distribution can include: a wired network; and a plurality of hosts connected to each other on the wired network, wherein each host is connected to every other host by a continuous wired path capable of transmitting electrical current. Each host of the plurality of hosts can include a first resistor and can be configured to produce a first-resistor enhanced Johnson noise voltage (“first-resistor” is used as a label only) when the first resistor is connected to a voltage source, and each host of the plurality of hosts can further include a second resistor and can be further configured to produce a second-resistor enhanced Johnson noise voltage (“second-resistor is used as a label only) when the second resistor is connected to a voltage source. The resistance value of the first resistor of each host can be identical to that of all other hosts of the plurality of hosts, and the resistance value of the second resistor of each host can be identical to that of all other hosts of the plurality of hosts. In a further embodiment, the plurality of hosts can include at least three hosts.
In another embodiment, a KLJN method for secure key distribution can include using a system as described in the previous paragraph. The method can include: connecting, to a voltage source, exactly one of the first resistor or the second resistor of a first host of the plurality of hosts, thereby producing a first-host enhanced Johnson noise voltage, which is transmitted to a second host of the plurality of hosts; and connecting, to a voltage source, exactly one of the first resistor or the second resistor of the second host, thereby producing a second-host enhanced Johnson noise voltage, which is transmitted to the first host. In a further embodiment, the method can further include connecting, to a voltage source, exactly one of the first resistor or the second resistor of a third host of the plurality of hosts, thereby producing a third-host enhanced Johnson noise voltage, which is transmitted to the first host.
Embodiments of the subject invention provide systems and methods for the secure distribution of keys (e.g., encryption keys) in a network and/or a data communication channel. In many embodiments, a Kirchhoff-Law-Johnson-(like)-Noise (KLJN) secure key exchange protocol is utilized. Systems and methods of the subject invention can be utilized in any network where data is exchanged between elements (e.g., hosts) and where such elements are connected by at least one wire capable of transmitting electrical current. The term “wire” as used herein can include a cable or any other similar structure. Systems and methods of the subject invention can be utilized in a wide range of applications, including but not limited to power grids, telephone lines, ethernet cables, and television cables (e.g., coaxial cable). A KLJN secure key exchange protocol according to embodiments of the subject invention provides information security that is information theoretically secure.
An element exchanging data (e.g., a host) can be, for example, a building, a computer workstation, a laptop computer, a mobile electronic device, a modem, a router, or a telephone, though embodiments are not limited thereto. The hosts must be connected by at least one wire; that is, each host that is to exchange a key (e.g., an encryption key) must be have a wired connection to every other host with which such a key is to be exchanged. Advantageously, systems and methods of the subject invention can be implemented on existing networks, for example, an existing power grid, existing telephone lines, existing ethernet cables, and/or existing television cables. The term “existing network” as used herein refers to an existing infrastructure network, for example the power grid of an area (e.g., a city), a grid of telephone lines, television cabling for an area (e.g., a city), and/or ethernet cables in place for multiple locations.
Private key-based secure communications require a shared secret key between two stations that can communicate with each other over remote distances. In many secure communications, sharing such a key also utilizes electronic communications because courier and mail services are slow. However, software-based key distribution methods offer only limited security levels that are only computationally-conditional and not future-proof. That is, by using sufficient computing power, an eavesdropper can crack the key and all the communications that are using that key. Therefore, unconditional security requires more than a software solution. Unconditional security indicates that the security holds even for theoretically infinite computational power and can be referred to as “information theoretic security”. Embodiments of the subject invention offer such unconditional security by, among other techniques, utilizing the proper laws of physics.
One scheme that claims information theoretic security by utilizing the laws of physics is quantum key distribution (QKD). Though the security available in QKD schemes can be considered debatable, there is at least the potential to reach a satisfactory security level. However, QKD devices are prohibitively expensive and have other practical weaknesses, such as sensitivity to vibrations, bulk, range limitations, and the requirement for a special “dark optical fiber” cable with sophisticated infrastructure.
Embodiments of the subject invention offer the ability to exchange keys and information securely over wires. To utilize a wire connection for secure key exchange, different principles of physics are applied compared to those used in QKD that work with optical fibers. A KLJN key exchange system can be used and is a wire-based scheme that is free from several weaknesses of QKD. Similar to QKD, KLJN is an information theoretically secure key distribution; however it is robust, not sensitive to vibrations, has unlimited range, can be integrated on chips, and can use existing wire infrastructure (e.g., power lines, telephone lines, ethernet cables). In addition, KLJN-based networks can be constructed. Thus, in many embodiments, a secure key exchange system is a KLJN key exchange system.
In an embodiment of the subject invention, a KLJN secure key exchange protocol can be implemented over a power grid. This can be accomplished by, for example, utilizing filters for each host (e.g., building) and/or utilizing an extra wire in the power line. In many embodiments, the power grid can be a smart grid. A smart grid is an electrical power distribution network that uses information and communications technology to improve the security, reliability, efficiency, and sustainability of the production and distribution of electricity. A smart grid is a form of a cyber-physical system and enables greater efficiency through a higher degree of awareness and control while also introducing new failure modes associated with data being intercepted and compromised.
A power grid, such as a smart grid, offers an advantageous way to perform secure key exchange because each host (e.g., a building) in the grid is electrically connected. The KLJN channel is a wire, and the 50 Hz/60 Hz AC grid provides universal time synchronization. It is noted that not every building or device connected to the network need be a host; rather only those that are to exchange a key are hosts. Hosts on the network can each have a plurality of resistors (i.e., a first resistor, a second resistor, possibly a third resistor, etc.), and the resistance value of each corresponding resistor for each host can be identical (or identical within normal error tolerances e.g., 1%). That is, the resistance value for the first resistor of each host can be identical, the resistance value for the second resistor of each host can be identical, the resistance value for the third resistor (if present) of each host can be identical, etc. For example, each host can have a pair of resistors, RLow and RHigh (e.g., representing the 0 and 1 bit situations). At the beginning of each clock cycle, each host can randomly select and connect one of the resistors (whether there are two or more resistors). In practical applications, voltage noise generators enhance the Johnson noise of the resistors so that all resistors in the system have the same, publicly known effective noise-temperature, which can be referred to as Teff. In an embodiment, Teff≧109 Kelvin. The enhanced Johnson noise voltages of the resistor result in a channel noise voltage between the wire and the ground, and a channel noise current in the wire. In an embodiment, low-pass filters can be used because the noise-bandwidth, which can be referred to as KLJN-band (its value can depend on the range), must be chosen so that wave, reflection, and propagation/delay effects are negligible, otherwise the security may be compromised.
Two hosts that are to exchange information can measure the mean-square amplitudes and/or within the KLJN-band in the line. From any of these values, the loop resistance can be calculated by using the Johnson noise formula with the noise-bandwidth. The hosts know their own resistor choice; thus, from the loop resistance, each host can deduce the resistance value and the actual bit status at the other end of the wire. In the ideal situation, the cases RL|RH and RH|RL, represent a secure bit exchange event because they cannot be distinguished by the measured mean-square values. An attacker or eavesdropper can do the very same measurements but will have no knowledge about any of the resistance choices; thus, the attacker is unable to extract the key bits from the measured loop resistance.
In certain embodiments, a protocol can have a reconfigurable filter system to create non-overlapping single loops in a network for the realization of the KLJN secure key distribution system. The protocol can be valid for one-dimensional radial networks (e.g., chain-like power line), which are typical of an electricity distribution network between a utility company and a customer, as well as for branched networks. Such a system can provide unconditionally secure key distribution over a network (e.g., a smart power grid) of arbitrary geometrical dimensions. In addition, many embodiments of the subject invention provide for overlapping key exchanges while utilizing more than two frequencies or frequency bands.
In an embodiment, a channel of a KLJN key exchange system can be a wire. Two remote stations can be connected by the wire and can have identical sets of resistors. For example, the two remote stations, which can be referred to as “A” and “B” or “Alice and “Bob” for simplicity, can have identical pairs of resistors. The pairs of resistors can be referred to as RL and RH and can represent the 0 and 1 bit situations. At the beginning of each clock cycle (e.g., in the case of a power grid, the 50 Hz or 60 Hz alternating current would provide universal time synchronization), Alice and Bob can randomly select and connect one of the resistors.
In many embodiments, one or more voltage noise generators can enhance the Johnson noise of the resistors (e.g., RL and RH) so that all resistors in the system have the same, publicly known effective noise-temperature, which can be referred to as Teff In an embodiment, Teff≧109 Kelvin. The enhanced Johnson noise voltages {UL,A(t) or UH,A(t); and UL,B(t) or UH,A(t)} of the resistor can result in a channel noise voltage (Uch(t)) between the wire (KLJN channel) and the ground, and a channel noise current Ich(t) in the wire. The system can include a filter, for example a low-pass filter. Such a filter can be included because, for example, the noise-bandwidth, which can be referred to as KLJN-band Bkljn (its value can depends on the range), must be chosen so that wave, reflection, and propagation/delay effects are negligible; otherwise, security may be compromised. Filters can be used to protect against man-in-the-middle attacks. Alice and Bob can measure the mean-square amplitudes <Uch2 (t)> and/or <Ich2(t)> within the KLJN-band in the line. From any of these values, the loop resistance can be calculated by using the Johnson noise formula with the noise-bandwidth Teff:
Alice and Bob each knows its own resistor choice; therefore, based on the loop resistance, the resistance value and the actual bit status at the other station of the wire can be deduced. In the ideal situation, the cases RL|RH and RH|RL represent a secure bit exchange event because they cannot be distinguished by the measured mean-square values. An eavesdropper, which can be referred to as Eve for simplicity, can do the very same measurements but will have no knowledge about any of the resistance choices; thus Eve is unable to extract the key bits from the measured loop resistance.
In a KLJN key exchange system of the subject invention, remote hosts must share a wired connection. This is not an issue for many applications because many hosts for such applications are already connected via a grid. For example, wires for a KLJN key exchange system can be for example, an electrical power grid (e.g., a smart grid), a telephone grid, a cable grid, a data line grid (e.g., ethernet cables), though embodiments are not limited thereto. Wires can be any conductive wires (i.e., capable of passing electrical current) known in the art.
In certain embodiments, a single loop connection is present between two remote hosts. Such a configuration, as shown in
Secure key exchange can be achieved by switching on and off proper filtering units in a structured way within a KLJN system (e.g., a smart grid). Filters can pass or reject the KLJN frequency band Bkljn and/or the main frequency. The main frequency can be the regular frequency used over the wires. For example, in a power grid, the main frequency can be the power frequency (e.g., 50 or 60 Hz). When both Bkljn and the main frequency (which can be referred to as fp for simplicity) are passed, it is a short; when both of frequencies are rejected, it is a break. The filters that pass or reject the KLJN frequency band and the main frequency can be referred to as “switched filters”. The pattern of connections between KLJN units can be varied to provide the exchange of a separate secure key for each possible pair of hosts by varying the network of filters and their connections accordingly.
The functional units connected to the KLJN system (e.g., connected via a smart grid) can be referred to as hosts or remote hosts. A host is able to execute a KLJN key exchange in any direction simultaneously. For example, in a linear system as shown in
For demonstrative purposes only, key exchange between eight hosts in a one-dimensional system, as shown in
Systems and methods of the subject invention can be used on a network having any reasonable number of hosts. The number of hosts of such a network can be, for example, any of the following values, at least any of the following values, no more than any of the following values, or any range having any of the following values as endpoints: 2, 3, 4, 5, 6, 7, 8, 9, 10, 20, 30, 40 50, 60, 70, 80, 90, 100, 1000, 10^4, 10^5, 10^6, 10^7, 10^8, 10^9, or 10^10. Each host must have a wired connection to every other host with which there is to be an exchange of a key (e.g., an encryption key). The wired connection is by at least one wire, cable, or similar that is capable of conducting electrical current.
The size of a network can be defined as being of size N when that network has N+1 hosts. An example of a network of size N=7 is illustrated in
Each host of the network can include one or more filter boxes, which can distribute the KLJN signals and the main frequency (e.g., the power) and can be responsible for connecting the proper elements for the KLJN key exchange and supplying the hosts with the main signal or frequency (e.g., power frequency).
Properly-controlled filter boxes can provide non-overlapping KLJN loops between the hosts. KLJN loops can be non-overlapping loops, as the KLJN protocol is fundamentally peer-to-peer. If overlapping loops were allowed using only the KLJN frequency and the main frequency, then there is a possibility that an eavesdropper might be in between and would require the trust of the intermediate hosts. The reason for having two KLJN units per host is to decrease the time needed to connect every host by having simultaneous loops in both directions of the one-dimensional grid (e.g., toward left and right), without overlapping. It is possible to use overlapping key exchanges, but additional frequencies or frequency bands would be required to be used. That is, many embodiments of the subject invention provide for overlapping key exchanges while utilizing more than two frequencies or frequency bands.
When there is a key exchange between the first host (host 0) and the last host (host 7) over the whole network (
Referring to
Referring to
To quickly and efficiently connect every host with all other hosts in the same one-dimensional network, a protocol can be established. The protocol must make every possible connection in the network, must not overlap loops (for this non-overlapping demonstrative example), and must be quick and efficient by making as many simultaneous loops as possible without overlapping. An example of such a protocol will be described in detail for demonstrative purposes, though embodiments of the subject invention are not limited to the protocol described (not even non-overlapping, one-dimensional embodiments).
In a classical KLJN system, where only the noise exists in the wire, the low-frequency cutoff of the noise is 0 Hz and the high-frequency cut-off is Bin. In the case of KLJN in a smart grid, the power frequency is present. However, at short distances (e.g., less than 10 miles), the Bkljn band can be beyond the power frequency fp and the difference is negligible. In such a situation, the shortest characteristic time in the system can be the correlation time τkljn of the noise (τkljn≈1/Bkljn). Bkljn can be determined by the distance L between two remote hosts (e.g., Alice and Bob) so that Bkljn<<c/L, where c is the speed of light (for example, Bkljn<<100 kHz for L=1 kilometer). Alice and Bob can perform a statistical analysis on the noise, which typically requires around 100 τkljn duration (e.g., 0.01 seconds if Bkljn=10 kHz) to have a sufficiently high fidelity (faster performance is expected in advanced KLJN methods). A bit exchange (BE) occurs when Alice and Bob have different resistor values, and this occurs in an average of 200 τkljn (e.g., 0.02 seconds if Bkljn=10 kHz). The length of the secure key exchange can be any arbitrary length. For example, if a key length is 100 bits, then 100 BE are required, which requires on average 20,000 τkljn (e.g., approximately 2 seconds if Bkljn is 10 kHz). Once the KLJN secure key has been exchanged the total amount of time needed to complete this is one KLJN secure key exchange period (KE). While the key exchange may be slow in certain instances, the system has the advantage that it is running continuously (not only during the handshake period like during common secure internet protocols); thus, a large number of secure key bits are produced during the continuous operation.
For the sake of simplicity only in this purely demonstrative example, the pessimistic estimation can be used by assuming a uniform duration for KE determined by the largest distance in the network, even though in reality short distances can exchange keys at a higher speed.
An example of a protocol for key exchange includes first connecting the nearest neighbor of every host. This allows the highest number of simultaneous non-overlapping loops per KE and only requires one KE to complete the first step. The protocol then connects the second nearest neighbors, thereby allowing the second-highest number of simultaneous loops per KE. However, due to the requirement of avoiding overlapping loops (for this non-overlapping one-dimensional demonstrative example), connecting each pairs of second nearest neighbors requires two KEs. The protocol then connects the third nearest neighbors, which requires 3 KEs to complete and connects the third most simultaneous loops per KE. The procedure can continue until the i-th nearest neighbor is equal to or less than half of the size of the network. If the number of steps i between the i-th nearest neighbors satisfies the relation i>N/2, then, to avoid overlapping loops, only one connection per KE is possible.
In an embodiment, a method of securely exchanging data (e.g., one or more keys such as encryption keys) over a network comprises utilizing a KLJN system and/or protocol as described herein.
Embodiments of the subject invention advantageously provide unconditionally secure key exchange over a network, such as a smart grid. A reconfigurable filter system can be used for the realization of a KLJN secure key distribution system. The system can achieve unconditionally secure key distribution over a network of arbitrary dimensions.
A possible attack strategy against the KLJN secure key exchange system could include utilizing the lack of exact thermal equilibrium in practical applications and could be based on cable resistance losses and the fact that the Second Law of Thermodynamics may not be able to provide full security when such losses are present. Such an attack does not challenge the unconditional security of the KLJN scheme, but it puts more stringent demands on the security/privacy enhancing protocol than other types of attack. In an embodiment of the subject invention, a simple defense protocol can be used to fully eliminate such an attack by increasing the noise-temperature at the side of the smaller resistance value over the noise-temperature at the side with the greater resistance value. Such a protocol can completely remove any potential information for an eavesdropper (i.e., an attacker), not only for an attack utilizing the lack of exact thermal equilibrium in practical applications, but also for a Bergou-Scheuer-Yariv attack, as discussed below. The most efficient potential attack strategies against the KLJN scheme can therefore be nullified.
Referring to
In the case of secure bit exchange (i.e., the LH or HL bit situations for Alice and Bob), an eavesdropper (Eve) cannot distinguish between these two situations by measuring the mean-square value of the voltage Uc(t) and/or current Ic(t) in the cable, because both arrangements lead to the same result. For demonstrative purposes only, the case where one of these secure bit exchange situations (either LH or HL) applies will be considered. Though, embodiments of the subject invention are not limited to cases where one of these secure bit exchange situations (either LH or HL) applies.
To avoid potential information leak by variations in the shape of a probability distribution, the noises are Gaussian, as other distributions may not be secure. Security is provided at least in part by the Second Law of Thermodynamics because directional information, due to the direction of power flow, does not exist because the mean power flow is zero even though the LH and HL situations have asymmetric resistance arrangements. That is, the security of the ideal KLJN scheme against passive (non-invasive listening/measuring) attacks is as strong as the impossibility to build a perpetual motion machine of the second kind. The security against active (invasive) attacks is provided at least in part by the robustness of classical physical quantities, which guarantees that these quantities can be monitored (and their integrity with the cable parameters and model can be checked) continuously without destroying their values. It can be observed, in passing, that the situation is totally different for the case of quantum physics.
The Bergou-Scheuer-Yariv (BSY) cable resistance attack is an attack against a non-ideal KLJN scheme. The BSY cable resistance attack utilizes the fact that, due to the non-zero cable resistance, the mean-square voltage will be slightly less at the cable end with the smaller resistance value than at the other end with the greater resistance.
where k is Boltzmann's constant, Δf is noise bandwidth and Rc is cable resistance. Clearly ΔKS scales with the square of the cable resistance, i.e., ΔKS ∝Rc2.
The rules about transformations of noise spectra in linear systems, along with Johnson's formula for thermal noise can be used to derive Equation (19).
UR2(t)=4kTeffRΔf (19)
Here, <UR2(t)> denotes mean-square voltage fluctuations on the resistor, with resistance R, within the bandwidth Δf. The cable resistance has a non-zero value, and therefore the resistors and their noise generators are not in thermal equilibrium in practical versions of the KLJN system (with Teff much greater than the cable temperature). Consequently, the Second Law of Thermodynamics may not be able to provide full security. The cable-heating powers by the generators at the “H” and “L” ends are different and are given by
The difference between PHc and PLc can be utilized for the Second-Law-attack in the case where the resistor values RH and RL are publicly known. The implementation of this attack can be used to measure and compare the net power flows at the two ends of the cable, as shown in
The power flows PHL and PLH are directly measurable by Eve, and their difference,
gives the difference between the powers supplied by the two cable ends; with the measured cable voltages and current (see
The opposite current sign at the “L” end expresses the fact that the current flowing out from the “H” end is flowing into the “L” end (using the same current sign would instead provide the power dissipated in the cable resistance, which is always positive and gives no directional information).
If it were supposed that Eve measures the above current-voltage cross-correlations at the two ends and evaluates the pertinent quantities, with the notation introduced in
ΔPAB=PAB−PBA=[UcA(t)+UcB(t)]Ic(t) (26)
As an example, suppose that RH has the greater resistance value and RL the smaller one, i.e., RL<RH. In the ideal case, when Rc=0, ΔPAB=0 in accordance with the Second Law of Thermodynamics, which yields <UC(t)IC(t)>=0. However, in the practical case, with Rc>0:
(i) if ΔPAB>0, then Alice has RH and Bob has RL,
(ii) if ΔPAB<0, then Alice has RL and Bob has RH.
The signal inherent in the Second-Law-attack scales linearly with Rc, which provides a much better situation for Eve—especially in the case of vanishing cable resistance—than the square-law scaling of the BSY attack. Moreover, in a practical case where Rc<<RL<<RH, Eve's signal-to-noise ratio is always greater in the Second-Law-attack than in the BSY attack. This is due to the fact that the BSY attack evaluates the dc fraction of ≈Rc2/(RLRH) in the measured (empirical) mean-square channel noise voltage, while the Second-Law-attack evaluates the dc fraction of Rc/RH in the measured mean power flow. The measured mean-square channel noise voltage and the measured mean power flow follow similar statistics because they are the time average of the products of Gaussian processes.
The Second-Law-attack is an elegant and efficient one, but it does not challenge the unconditional security of the KLJN scheme. Eve's probability p of successful guessing can arbitrarily approach the limit p=0.5 by proper tuning of the parameters inherent in the KLJN scheme, such as resistances and bandwidth, and privacy amplification can be implemented if needed. Though, a Second-Law-attack may significantly increase the demands on parameter tuning and/or necessitate elaborate privacy amplification, which may come at a cost.
In an embodiment, a natural/simple defense can be used against a Second-Law-attack. If the cable and the resistors are kept at the same temperature, such a temperature-equilibration method virtually eliminates any Second-Law-attack information for Eve (but not necessarily the information in the BSY-attack, albeit its formula for the information leak is changed). Temperature equilibration constitutes a very simple defense, but the cable temperature and its possible variations cannot be neglected any longer. If the cable temperature is different from that of the resistors, then the KLJN scheme is vulnerable to a Hao-type attack. In principle, with cables of homogeneous temperatures, this attack can be avoided if Alice and Bob are able to monitor the temperature value of the cable by resistance and Johnson noise measurements, since they can then choose Teff to be the same as the cable temperature. While these steps can be taken, the KLJN scheme is not necessarily still considered simple. Moreover, the mentioned defense method may be unpractical in certain applications because of the requirement of a homogeneous cable temperature, small noise levels, and because it inhibits the adoption of enhanced KLJN methods wherein Alice and Bob eliminate their own contributions in order to accomplish higher speed and security.
In an embodiment, an advanced defense can be used against a Second-Law-attack. The cable end with the smaller resistance value can emit less power toward the other end, and this can be the foundation of a Second-Law-attack. This effect, as well as Eve's related signal, can be partially or completely eliminated by properly changing the ratio of the noise-temperatures of the generators for the resistors with the smaller and the greater resistance values (see
If an offset in the noise-temperatures of the generators for the RH and the RL resistors were introduced, then Equation (27) holds, where Teff is the noise temperature at the RH resistors and βTeff is the noise temperature of the RL resistors.
ΔPHL=PHL(Teff)−PLH(βTeff)=0 (27)
The solution of the equation is
This value of β for the temperature-offset consequently eliminates Eve's opportunity to use the Second-Law-attack. It can be determined that β>1 for RL<RH and β<1 for RH<RL.
Reevaluating the analysis of the BSY with the temperature offset given by Equation (28), Equation (29) can be obtained.
where α=(RL/RH). By substituting the above value for β, the nominator becomes zero so that
ΔKS(Teff,βTeff)=|UcH2(t,Teff)−UcL2(t,βTeff)|=0 (30)
Hence, a modification of the noise temperature of the generators supplying the noise of the RL resistors by the factor β yields a complete elimination of the strongest attacks against the KLJN key exchange scheme, namely the Second-Law-attack and the BSY-attack.
According to certain embodiments of the subject invention, an advanced defense against a Second-Law-attack involves a proper increase of the noise-temperature of the noise generator for the smaller resistances compared to that of the generators for the greater resistances, which surprisingly eliminates not only the Second-Law-attack but also a BSY attack. Removing these attacks can radically reduce Eve's fidelity while increasing that of Alice and Bob as a result of the potentially allowed longer bit-exchange periods and/or higher bandwidths. In order to reduce the risk for hacking attacks or attacks due to possible malfunction, not only should the voltage and current amplitudes be monitored and compared at the two cable ends but Gaussianity, spectral, and other proper statistical checks can also be run on the signals, and the cable transfer function and signal integrity can be monitored against hacking.
The invention includes, but is not limited to, the following embodiments:
A Kirchhoff-Law-Johnson-(like)-Noise (KLJN) system for secure key distribution, comprising:
a wired network; and
a plurality of hosts connected to each other on the wired network,
wherein each host is connected to every other host by a continuous wired path capable of transmitting electrical current,
wherein each host of the plurality of hosts comprises a first resistor and is configured to produce a first-resistor enhanced Johnson noise voltage when the first resistor is connected to a voltage source,
wherein each host of the plurality of hosts further comprises a second resistor and is further configured to produce a second-resistor enhanced Johnson noise voltage when the second resistor is connected to a voltage source,
wherein the resistance value of the first resistor of each host is identical to that of all other hosts of the plurality of hosts, and
wherein the resistance value of the second resistor of each host is the identical to that of all other hosts of the plurality of hosts.
The system according to embodiment 1, wherein each host further comprises a filter box.
The system according to embodiment 2, wherein the filter box comprises:
a first KLJN filter for KLJN key exchange; and
a main signal filter for supplying a main signal of the network to the host having the filter box.
The system according to embodiment 3, wherein at least one of the first KLJN filter and the main signal filter is a low pass filter.
The system according to any of embodiments 3-4, wherein the first KLJN filter is connected to the first and second resistors, such that the first KLJN filter is connected between all other hosts and the first and second resistors of the host having the filter box.
The system according to any of embodiments 3-5, wherein each host comprises a third resistor, and wherein the main signal filter is connected to the third resistor of the host having the filter box such that the main signal filter is connected between all other hosts and the third resistor of the host having the filter box.
The system according to any of embodiments 3-6, wherein the KLJN filter comprises a first sub-filter and a second sub-filter,
wherein, when open, the first sub-filter permits a signal to pass through the KLJN filter without reaching the first and second resistors,
wherein, when open, the second sub-filter permits a signal to reach the first and second resistors,
wherein the KLJN filter is configured such that, in an inactive state, the first sub-filter is open to Johnson noise and the second sub-filter is closed to Johnson noise, and
wherein the KLJN filter is configured such that, in an active state, the first sub-filter is closed to Johnson noise and the second sub-filter is open to Johnson noise.
The system according to any of embodiments 1-7, wherein the wired network is an existing infrastructure network.
The system according to any of embodiments 1-8, wherein the wired network is a smart power grid.
The system according to any of embodiments 3-8, wherein the wired network is a smart power grid, and wherein the main signal filter is a power filter for supplying power to the host having the filter box.
The system according to any of embodiments 3-10, wherein the plurality of hosts comprises at least three hosts.
A Kirchhoff-Law-Johnson-(like)-Noise (KLJN) method for secure key distribution using a system, wherein the system comprises:
a wired network; and
a plurality of hosts connected to each other on the wired network,
wherein each host is connected to every other host by a continuous wired path capable of transmitting electrical current,
wherein each host of the plurality of hosts comprises a first resistor and a second resistor, wherein the resistance value of the first resistor of each host is identical to that of all other hosts of the plurality of hosts,
wherein the resistance value of the second resistor of each host is the identical to that of all other hosts of the plurality of hosts, and
wherein the method comprises:
The method according to embodiment 12, wherein each host further comprises a filter box.
The method according to embodiment 13, wherein the filter box comprises:
a first KLJN filter for KLJN key exchange; and
a main signal filter for supplying a main signal of the network to the host having the filter box.
The method according to embodiment 14, wherein at least one of the first KLJN filter and the main signal filter is a low pass filter.
The method according to any of embodiments 14-15, wherein the first KLJN filter is connected to the first and second resistors, such that the first KLJN filter is connected between all other hosts and the first and second resistors of the host having the filter box.
The method according to any of embodiments 14-16, wherein each host comprises a third resistor, and wherein the main signal filter is connected to the third resistor of the host having the filter box such that the main signal filter is connected between all other hosts and the third resistor of the host having the filter box.
The method according to any of embodiments 14-17, wherein the KLJN filter comprises a first sub-filter and a second sub-filter,
wherein, when open, the first sub-filter permits a signal to pass through the KLJN filter without reaching the first and second resistors,
wherein, when open, the second sub-filter permits a signal to reach the first and second resistors,
and wherein the method further comprises:
The method according to any of embodiments 12-18, wherein the wired network is an existing infrastructure network.
The method according to any of embodiments 12-19, wherein the wired network is a smart power grid.
The method according to any of embodiments 14-19, wherein the wired network is a smart power grid, and wherein the main signal filter is a power filter for supplying power to the host having the filter box.
The method according to any of embodiments 12-21, wherein the plurality of hosts comprises at least three hosts.
The method according to any of embodiments 12-22, wherein the method further comprises connecting, to a voltage source, exactly one of the first resistor or the second resistor of a third host of the plurality of hosts, thereby producing a third-host enhanced Johnson noise voltage (“third-host” is used as a label only), which is transmitted to the first host.
A greater understanding of the present invention and of its many advantages may be had from the following examples, given by way of illustration. The following examples are illustrative of some of the methods, applications, embodiments and variants of the present invention. They are, of course, not to be considered as limiting the invention. Numerous changes and modifications can be made with respect to the invention.
The one-dimensional grid shown in
A network of size N=7, as shown in
The first step in the protocol connects the nearest neighbors, as shown in
The protocol then connects the seventh-closest neighbors, as shown in
This completes the protocol for an example of size N=7, and a pattern emerges for N being odd. The pattern is 1 KE, 2 KE, 3 KE, 4 KE, 3 KE, 2 KE, and 1 KE. This is essentially Gauss's counting technique up to N/2 and back. The total number of KEs needed is 1KE+2KE+3KE+4KE+3KE+2KE+1KE=16KE. The speed or time requirement of the protocol for a network of arbitrary size N with N being odd is ((N+1)/2)2 KEs and can be derived as follows.
Since N is odd, it can be expressed as;
N=2n+1. (2)
To find the midpoint, n can be solved for and expressed in terms of N to give the following;
The pattern when N is odd has the following form;
Expressing n in terms of N gives;
It is known from Gauss's counting method that,
In the pattern, Gauss's counting method can be used twice to find the sum as follows.
This simplifies to
Thus, the speed of the network is proportional to (N2)/4 with N being odd and the size of the network.
The one-dimensional grid shown in
A network of size N=8, as shown in
A pattern emerges for N being even. The KEs by step are 1 KE, 2 KE, 3 KE, 4 KE, 4 KE, 3 KE, 2 KE, and 1 KE. This is essentially Gauss's counting technique up to N/2 and back. The total number of KEs needed is 1KE+2KE+3KE+4KE+4KE+3KE+2KE+1KE=20KE. The time needed to connect the entire network will take 20 KEs (e.g., approximately 40 seconds if Bkljn is 10 kHz and if the key is 100 bits long).
The speed or time requirement of the protocol for a network of size N with N being even between the first and last host is ((N2)/4+N/2) KEs and can be derived as follows.
With N=8 the pattern in this case is;
Since N is even, it can be expressed as;
N=2n. (10)
To find the midpoint, n can be solved for and expressed in terms of N, giving the following;
The general pattern when N is even has the following form;
Expressing n in terms of N gives;
It is know from Gauss's counting method that,
In the pattern, Gauss's counting method can be used twice to find the sum as follows.
This simplifies to
Thus, the speed of the network is proportional to (N2)/4 with N being the size of the network and even.
It should be understood that the examples and embodiments described herein are for illustrative purposes only and that various modifications or changes in light thereof will be suggested to persons skilled in the art and are to be included within the spirit and purview of this application.
All patents, patent applications, provisional applications, and publications referred to or cited herein (including those in the “References” section) are incorporated by reference in their entirety, including all figures and tables, to the extent they are not inconsistent with the explicit teachings of this specification.
The present application claims the benefit of U.S. Provisional Application Ser. No. 61/951,072 filed Mar. 11, 2014, which is hereby incorporated by reference herein in its entirety, including any figures, tables, and drawings.
Number | Name | Date | Kind |
---|---|---|---|
7907849 | Scheuer | Mar 2011 | B1 |
8015597 | Libin | Sep 2011 | B2 |
8185947 | Kurapati | May 2012 | B2 |
8862718 | Naim | Oct 2014 | B2 |
8904181 | Felsher | Dec 2014 | B1 |
20050097342 | Gatto | May 2005 | A1 |
20060059373 | Fayad | Mar 2006 | A1 |
20060230269 | Doebrich | Oct 2006 | A1 |
20100116630 | Pinkerton | May 2010 | A1 |
20140115341 | Robertson | Apr 2014 | A1 |
20150134947 | Varcoe | May 2015 | A1 |
20150263853 | Gonzalez | Sep 2015 | A1 |
Number | Date | Country |
---|---|---|
WO 2012000755 | Jan 2012 | WO |
Entry |
---|
Amin, Massoud et al., “Toward a smart grid: Power delivery for the 21st century,” IEEE Power Energy Magazine, 2008, 3:114-122. |
Balog, Robert et al., “Coupled Inductor Filters: A Basic Filter Building Block,” IEEE Transactions on Power Electronics, 2013, 28:537-546. |
Bergou, János. Interviewed in Adrian Cho's “Cryptography: Simple Noise May Stymie Spies Without Quantum Weirdness,” Science, 2005, 309:2148. |
Engleman, Eric et al., “Obama to share cybersecurity priorities with congress,” 2013, http://www.bloomberg.com/news/2013-02-27/obama-to-share-cybersecurity-priorities-with-congress.html. |
Gerhardt, Ilja et al., “Full-field implementation of a perfect eavesdropper on a quantum cryptography system,” Nature Communications, 2011, p. 1-8. |
Gerhardt, Ilja, et al., “Experimentally faking the violation of Bell's inequalities,” Physical Review Letters, 2011, 107. doi: 10.1103/PhysRevLett.107.170404. |
Gingl, Zoltan et al., “Noise Properties in the Ideal Kirchoff-Law-Johnson-Noise Secure Communication System,” PLoS ONE, 2014, e96109, doi: 10.1371/journal.pone.0096109. |
Gonzalez, Elias et al., “Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters,” PLoS ONE, 2013, doi: 10.1371/journal.pone.0070206. |
Hao, Feng. “Kish's key exchange scheme is insecure,” IEE Proc. Inform. Soc., 2006, 153:141-142. |
Horvath, Tamás et al., “Effective Privacy Amplification for Secure Classical Communications,” EPL, 2011, 94:28002. |
Jain, Nitin et al., “Device calibration impacts security of quantum key distribution,” Physical Review Letters, 2011, 107. doi: 10.1103/PhysRevLett.107.11051. |
Kezunovic, Mladen. “Smart Fault Location for Smart Grids,” IEEE Transactions on Smart Grid, 2011, 2(1):11-22. |
Kim, Sangsun et al., “A new hybrid active power filter (APF) topology,” IEEE Transactions on Power Electronics, 2002, 17:48-54. |
Kish, Laszlo B. “Absolutely Secure Communications by Johnson (-like) noise and Kirchhoff's laws,” Phys. Lett. A, 2006, 352:178-182. |
Kish, Laszlo B. “Enhanced secure key exchange systems based on the Johnson-noise scheme,” Metrology & Measurement Systems, 2013, p. 1-14. |
Kish, Laszlo B. “Methods of Using Existing and Currently Used Wire Lines (Power Lines, Phone Lines, Internet Lines) for Totally Secure Classical Communication Utilizing Kirchhoff's Law and Johnson-like Noise,” Oct. 2, 2006, accessed from: http://arxiv.org/ftp/physics/papers/0610/0610014.pdf. |
Kish, Laszlo B. “Protection against the man-in-the-middle-attack for the Kirchhoff-Loop-Johnson (-like)-noise cipher and expansion by voltage-based security,” Fluctuation and Noise Letters, 2006, 6: L57-L63. doi: 10.1142/s0219477506003148. |
Kish, Laszlo B. “Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law,” Physics Letters A, 2006, 352: 178-182. doi: 10.1016/j.physleta.2005.11.062. |
Kish, Laszlo B. et al., “Elimination of a Second-Law-attack, and all cable-resistance-based attacks, in the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system,” Jun. 27, 2014; accessed from: http://arxiv.org/ftp/arxiv/papers/1406/1406.5179.pdf. |
Kish, Laszlo B. et al., “Information networks secured by the laws of physics,” Ieice Transactions on Communications, 2012, E95B: 1501-1507. doi: 10.1587/transcom.E95.B.1501. |
Kish, Laszlo B. et al., “Noise in the wire: the real impact of wire resistance for the Johnson (-like) noise based secure communicator,” Phys. Lett. A, 2010, 374:2140-2142. |
Kish, Laszlo B. et al., “On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator,” Quantum Inf. Process, 2014, in press, doi: 10.1007/s11128-014-0729-7. |
Kish, Laszlo B. et al., “Spectra for the Product of Gaussian Noises,” Metrol. Meas. Syst., 2012, 19:653-658. |
Kish, Laszlo B. et al., “Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise,” Fluctuation and Noise Letters, 6:L447-L447. doi: 10.1142/s0219477506003628. |
Kish, Laszlo B. et al., “Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives,” Fluctuation and Noise Letters, 2008, 8:L95-L98, doi: 10.1142/s0219477508004362. |
Kundur, D. et al., “Towards modeling the impact of cyber attacks on a smart grid,” Int. J. Security and Networks, 2011, 6:2-13. |
Lydersen, Lars et al., “Thermal blinding of gated detectors in quantum cryptography,” Optics Express, 2010, 18: 27938-27954. doi: 10.1364/oe.18.027938. |
Lydersen, Lars, et al., “Comment on ‘Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography’,” Applied Physics Letters, 2011, 99. doi: 10.1063/1.3658806. |
Lydersen, Lars, et al., “Controlling a superconducting nanowire single-photon detector using tailored bright illumination,” New Journal of Physics, 2011, 13. doi: 10.1088/1367-2630/13/11/113042. |
Lydersen, Lars, et al., “Hacking commercial quantum cryptography systems by tailored bright illumination,” Nature Photonics, 2010, 4:686-689. |
Lydersen, Lars, et al., “Reply to ‘Avoiding the Detector Blinding Attack on Quantum Cryptography’,” Nature Photonics, 2010, 4: 801-801. doi: 10.1038/nphoton.2010.278. |
Lydersen, Lars, et al., “Superlinear threshold detectors in quantum cryptography,” Physical Review A, 2011, 84. doi: 10.1103/PhysRevA.84.032320. |
Lydersen, Lars, et al., “Tailored bright illumination attack on distributed-phase-reference protocols,” Journal of Modern Optics, 2011, 58: 680-685. doi: 10.1080/09500340.2011.565889. |
Makarov, Vadim et al., “Fakes states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols,” Quantum Information & Computation, 2008, 8:622-635. |
Makarov, Vadim. “Controlling passively quenched single photon detectors by bright light,” New Journal of Physics, 2009, 11. doi: 10.1088/1367-2630/11/6/065003. |
McDaniel, Patrick et al., “Security and privacy challenges in the smart Grid,” IEEE Security & Privacy, 2009, 7:75-77. |
Mingesz, Robert et al., “Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line,” Physics Letters A, 2008, 372:978-984. doi: 10.1016/j.physleta.2007.67.086. |
Mingesz, Robert et al., “Unconditional security by the laws of classical physics,” Metrology and Measurement Systems, 2013, 20:3-16; (open access): http://www.metrology.pg.gda.pl/full/2013/M&MS—2013—003.pdf. |
Mingesz, Robert et al., “What Kind of Noise Guarantees Security for the Kirchhoff-Loop-Johnson-Noise Key Exchange?” Fluct. Noise Lett., 2014, in press, arXiv:1405.1196. |
Saez, Yessica et al., “Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange,” J. Comput. Electron., 2014, 13:271-277. |
Sauge, Sebastien et al., “Controlling an actively-quenched single photon detector with bright light,” Optics Express, 2011, 19: 23590-23600. |
Scheuer, Jacob et al., “A Classical Key-Distribution System based on Johnson (like) noise—How Secure?” Phys. Lett. A, 2006, 359:737-740. |
Smulko, Janusz. “Performance Analysis of the “Intelligent” Kirchhoff-Law-Johnson-Noise Secure Key Exchange,” Fluct. Noise Lett., 2014, 13(3):1-8. |
Wiechers, C. et al., “Aftergate attack on a quantum cryptosystem,” New Journal of Physics, 2011, 13. doi: 10.1088/1367-2630/13/1/013043. |
Yuen, Horace P., “On the Foundations of Quantum Key Distribution—Reply to Renner and Beyond,” 2011, manuscript: http://arxiv.org/pdf/1210.2804v2.pdf. |
Number | Date | Country | |
---|---|---|---|
20150263853 A1 | Sep 2015 | US |
Number | Date | Country | |
---|---|---|---|
61951072 | Mar 2014 | US |