Perspective – On the thermodynamics of perfect unconditional security

by   Christiana Chamon, et al.

A secure key distribution (exchange) scheme is unconditionally secure if it is unbreakable against arbitrary technological improvements of computing power and/or any development of new algorithms. There are only two families of experimentally realized and tested unconditionally secure key distribution technologies: Quantum Key Distribution (QKD), the base of quantum cryptography, which utilizes quantum physical photonic features; and the Kirchhoff-Law-Johnson-Noise (KLJN) system that is based on classical statistical physics (fluctuation-dissipation theorem). The focus topic of this paper is the thermodynamical situation of the KLJN system. In all the original works, the proposed KLJN schemes required thermal equilibrium between the devices of the communicating parties to achieve perfect security. However, Vadai, et al, in (Nature) Science Reports 5 (2015) 13653 shows a modified scheme, where there is a non-zero thermal noise energy flow between the parties, yet the system seems to resist all the known attack types. We introduce a new attack type against their system. The new attack utilizes coincidence events between the line current and voltages. We show that there is non-zero information leak toward the Eavesdropper, even under idealized conditions. As soon as the thermal equilibrium is restored, the system becomes perfectly secure again. In conclusion, perfect unconditional security requires thermal equilibrium.


page 6

page 7


Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security

In (Nature) Science Report 5 (2015) 13653, Vadai, Mingesz and Gingl (VMG...

Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol

This paper introduces a new attack against the Kirchhoff-Law-Johnson-Noi...

Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input

To date, there has been no systematic investigation of thermal profiles ...

Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry

As a warm-blooded mammalian species, we humans routinely leave thermal r...

Quantum and Semi-Quantum Lottery: Strategies and Advantages

Lottery is a game in which multiple players take chances in the hope of ...

Quantitative Convergence Analysis of Path Integral Representations for Quantum Thermal Average

The quantum thermal average is a central topic in quantum physics and ca...

Please sign up or login with your details

Forgot password? Click here to reset