US9270448B2 - Encryption key distribution system and method - Google Patents
Encryption key distribution system and method Download PDFInfo
- Publication number
- US9270448B2 US9270448B2 US14/489,025 US201414489025A US9270448B2 US 9270448 B2 US9270448 B2 US 9270448B2 US 201414489025 A US201414489025 A US 201414489025A US 9270448 B2 US9270448 B2 US 9270448B2
- Authority
- US
- United States
- Prior art keywords
- filter
- host
- kljn
- hosts
- resistor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000009826 distribution Methods 0.000 title claims abstract description 22
- 238000004891 communication Methods 0.000 description 7
- 238000012546 transfer Methods 0.000 description 7
- 230000007123 defense Effects 0.000 description 6
- 238000005259 measurement Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000001010 compromised effect Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000008030 elimination Effects 0.000 description 3
- 238000003379 elimination reaction Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003321 amplification Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000011067 equilibration Methods 0.000 description 2
- 238000003199 nucleic acid amplification method Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000003595 spectral effect Effects 0.000 description 2
- 238000007619 statistical method Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000010183 spectrum analysis Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05F—SYSTEMS FOR REGULATING ELECTRIC OR MAGNETIC VARIABLES
- G05F1/00—Automatic systems in which deviations of an electric quantity from one or more predetermined values are detected at the output of the system and fed back to a device within the system to restore the detected quantity to its predetermined value or values, i.e. retroactive systems
- G05F1/66—Regulating electric power
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Definitions
- Cybersecurity is a very important aspect of signal transfer, and an urgent need exists to protect intelligence, companies, infrastructure, and personal data in an efficient way.
- Encryption keys can be used to transfer data between two hosts over a network, but the key itself must also be transmitted over the network to provide it from one host to another with any reasonable speed. However, transfer of such a key over a network makes the key potentially vulnerable to an attack by a third party monitoring the network.
- Embodiments of the subject invention provide systems and methods for the secure distribution of keys (e.g., encryption keys) in a network and/or a data communication channel.
- keys e.g., encryption keys
- a Kirchhoff-Law-Johnson-(like)-Noise (KLJN) secure key exchange protocol is utilized.
- Systems and methods of the subject invention can be utilized in any network where data is exchanged between elements (e.g., hosts) and where such elements are connected by at least one wire capable of transmitting electrical current.
- a KLJN secure key exchange protocol according to embodiments of the subject invention provides information security that is information theoretically secure.
- a KLJN system for secure key distribution can include: a wired network; and a plurality of hosts connected to each other on the wired network, wherein each host is connected to every other host by a continuous wired path capable of transmitting electrical current.
- Each host of the plurality of hosts can include a first resistor and can be configured to produce a first-resistor enhanced Johnson noise voltage (“first-resistor” is used as a label only) when the first resistor is connected to a voltage source, and each host of the plurality of hosts can further include a second resistor and can be further configured to produce a second-resistor enhanced Johnson noise voltage (“second-resistor is used as a label only) when the second resistor is connected to a voltage source.
- the resistance value of the first resistor of each host can be identical to that of all other hosts of the plurality of hosts, and the resistance value of the second resistor of each host can be identical to that of all other hosts of the plurality of hosts.
- the plurality of hosts can include at least three hosts.
- a KLJN method for secure key distribution can include using a system as described in the previous paragraph.
- the method can include: connecting, to a voltage source, exactly one of the first resistor or the second resistor of a first host of the plurality of hosts, thereby producing a first-host enhanced Johnson noise voltage, which is transmitted to a second host of the plurality of hosts; and connecting, to a voltage source, exactly one of the first resistor or the second resistor of the second host, thereby producing a second-host enhanced Johnson noise voltage, which is transmitted to the first host.
- the method can further include connecting, to a voltage source, exactly one of the first resistor or the second resistor of a third host of the plurality of hosts, thereby producing a third-host enhanced Johnson noise voltage, which is transmitted to the first host.
- FIG. 1 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 2 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 3 shows a schematic view of a filter box of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 4 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 5 shows a schematic view of a filter box of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 6 shows a schematic view of a filter box of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 7 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 8 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 9 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 10 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 11 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 12 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 13 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 14 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 15 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 16 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 17 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 18 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 19 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 20 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 21 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 22 shows a schematic view of a secure key exchange system according to an embodiment of the subject invention.
- FIG. 23 shows a schematic view of a scheme devised to illustrate a Bergou-Scheuer-Yariv (BSY) attack and a Second-Law-attack.
- BSY Bergou-Scheuer-Yariv
- FIG. 24 shows a schematic view of measurements during a Second-Law-attack.
- FIG. 25 shows a schematic view of the elimination of a Second-Law-attack and a BSY-attack by introduction of a proper temperature offset.
- Embodiments of the subject invention provide systems and methods for the secure distribution of keys (e.g., encryption keys) in a network and/or a data communication channel.
- keys e.g., encryption keys
- a Kirchhoff-Law-Johnson-(like)-Noise (KLJN) secure key exchange protocol is utilized.
- Systems and methods of the subject invention can be utilized in any network where data is exchanged between elements (e.g., hosts) and where such elements are connected by at least one wire capable of transmitting electrical current.
- the term “wire” as used herein can include a cable or any other similar structure.
- Systems and methods of the subject invention can be utilized in a wide range of applications, including but not limited to power grids, telephone lines, ethernet cables, and television cables (e.g., coaxial cable).
- a KLJN secure key exchange protocol according to embodiments of the subject invention provides information security that is information theoretically secure.
- An element exchanging data can be, for example, a building, a computer workstation, a laptop computer, a mobile electronic device, a modem, a router, or a telephone, though embodiments are not limited thereto.
- the hosts must be connected by at least one wire; that is, each host that is to exchange a key (e.g., an encryption key) must be have a wired connection to every other host with which such a key is to be exchanged.
- systems and methods of the subject invention can be implemented on existing networks, for example, an existing power grid, existing telephone lines, existing ethernet cables, and/or existing television cables.
- existing network refers to an existing infrastructure network, for example the power grid of an area (e.g., a city), a grid of telephone lines, television cabling for an area (e.g., a city), and/or ethernet cables in place for multiple locations.
- an existing infrastructure network for example the power grid of an area (e.g., a city), a grid of telephone lines, television cabling for an area (e.g., a city), and/or ethernet cables in place for multiple locations.
- Private key-based secure communications require a shared secret key between two stations that can communicate with each other over remote distances. In many secure communications, sharing such a key also utilizes electronic communications because courier and mail services are slow.
- software-based key distribution methods offer only limited security levels that are only computationally-conditional and not future-proof. That is, by using sufficient computing power, an eavesdropper can crack the key and all the communications that are using that key. Therefore, unconditional security requires more than a software solution. Unconditional security indicates that the security holds even for theoretically infinite computational power and can be referred to as “information theoretic security”.
- Embodiments of the subject invention offer such unconditional security by, among other techniques, utilizing the proper laws of physics.
- QKD quantum key distribution
- Embodiments of the subject invention offer the ability to exchange keys and information securely over wires.
- a KLJN key exchange system can be used and is a wire-based scheme that is free from several weaknesses of QKD. Similar to QKD, KLJN is an information theoretically secure key distribution; however it is robust, not sensitive to vibrations, has unlimited range, can be integrated on chips, and can use existing wire infrastructure (e.g., power lines, telephone lines, ethernet cables).
- KLJN-based networks can be constructed.
- a secure key exchange system is a KLJN key exchange system.
- a KLJN secure key exchange protocol can be implemented over a power grid. This can be accomplished by, for example, utilizing filters for each host (e.g., building) and/or utilizing an extra wire in the power line.
- the power grid can be a smart grid.
- a smart grid is an electrical power distribution network that uses information and communications technology to improve the security, reliability, efficiency, and sustainability of the production and distribution of electricity.
- a smart grid is a form of a cyber-physical system and enables greater efficiency through a higher degree of awareness and control while also introducing new failure modes associated with data being intercepted and compromised.
- a power grid such as a smart grid, offers an advantageous way to perform secure key exchange because each host (e.g., a building) in the grid is electrically connected.
- the KLJN channel is a wire, and the 50 Hz/60 Hz AC grid provides universal time synchronization. It is noted that not every building or device connected to the network need be a host; rather only those that are to exchange a key are hosts.
- Hosts on the network can each have a plurality of resistors (i.e., a first resistor, a second resistor, possibly a third resistor, etc.), and the resistance value of each corresponding resistor for each host can be identical (or identical within normal error tolerances e.g., 1%).
- each host can have a pair of resistors, R Low and R High (e.g., representing the 0 and 1 bit situations).
- R Low and R High e.g., representing the 0 and 1 bit situations.
- each host can randomly select and connect one of the resistors (whether there are two or more resistors).
- voltage noise generators enhance the Johnson noise of the resistors so that all resistors in the system have the same, publicly known effective noise-temperature, which can be referred to as T eff .
- T eff ⁇ 10 9 Kelvin.
- the enhanced Johnson noise voltages of the resistor result in a channel noise voltage between the wire and the ground, and a channel noise current in the wire.
- low-pass filters can be used because the noise-bandwidth, which can be referred to as KLJN-band (its value can depend on the range), must be chosen so that wave, reflection, and propagation/delay effects are negligible, otherwise the security may be compromised.
- Two hosts that are to exchange information can measure the mean-square amplitudes and/or within the KLJN-band in the line. From any of these values, the loop resistance can be calculated by using the Johnson noise formula with the noise-bandwidth. The hosts know their own resistor choice; thus, from the loop resistance, each host can deduce the resistance value and the actual bit status at the other end of the wire. In the ideal situation, the cases R L
- a protocol can have a reconfigurable filter system to create non-overlapping single loops in a network for the realization of the KLJN secure key distribution system.
- the protocol can be valid for one-dimensional radial networks (e.g., chain-like power line), which are typical of an electricity distribution network between a utility company and a customer, as well as for branched networks.
- Such a system can provide unconditionally secure key distribution over a network (e.g., a smart power grid) of arbitrary geometrical dimensions.
- many embodiments of the subject invention provide for overlapping key exchanges while utilizing more than two frequencies or frequency bands.
- a channel of a KLJN key exchange system can be a wire.
- Two remote stations can be connected by the wire and can have identical sets of resistors.
- the two remote stations which can be referred to as “A” and “B” or “Alice and “Bob” for simplicity, can have identical pairs of resistors.
- the pairs of resistors can be referred to as R L and R H and can represent the 0 and 1 bit situations.
- Alice and Bob can randomly select and connect one of the resistors.
- one or more voltage noise generators can enhance the Johnson noise of the resistors (e.g., R L and R H ) so that all resistors in the system have the same, publicly known effective noise-temperature, which can be referred to as T eff In an embodiment, T eff ⁇ 10 9 Kelvin.
- the enhanced Johnson noise voltages ⁇ U L,A (t) or U H,A (t); and U L,B (t) or U H,A (t) ⁇ of the resistor can result in a channel noise voltage (U ch (t)) between the wire (KLJN channel) and the ground, and a channel noise current I ch (t) in the wire.
- the system can include a filter, for example a low-pass filter.
- Such a filter can be included because, for example, the noise-bandwidth, which can be referred to as KLJN-band B kljn (its value can depends on the range), must be chosen so that wave, reflection, and propagation/delay effects are negligible; otherwise, security may be compromised. Filters can be used to protect against man-in-the-middle attacks. Alice and Bob can measure the mean-square amplitudes ⁇ U ch 2 (t)> and/or ⁇ I ch 2 (t)> within the KLJN-band in the line. From any of these values, the loop resistance can be calculated by using the Johnson noise formula with the noise-bandwidth T eff :
- FIG. 1 shows a schematic of a KLJN key exchange system according to an embodiment of the subject invention.
- each remote station e.g., Alice and Bob
- each remote station can have a pair of resistors (e.g., R L and R H ) and at least one voltage generator (e.g., U L,A (t) and/or U H,A (t)).
- Alice's R L can be identical to Bob's R L
- Alice's R H can be identical to Bob's R H .
- Each of Alice and Bob can choose one of the resistors, and the enhanced Johnson noise voltages ⁇ U L,A (t) or U H,A (t); and U L,B (t) or U H,A (t) ⁇ of the resistor can result in a channel noise voltage (U ch (t)) between the wire (KLJN channel) and the ground, and a channel noise current I ch (t) in the wire.
- Alice and Bob can measure the mean-square amplitudes ⁇ U ch 2 (t)> and/or ⁇ I ch 2 (t)> within the KLJN-band in the line and, from any of these values, the loop resistance can be calculated by using equation 1 with the noise-bandwidth T eff .
- wires for a KLJN key exchange system can be for example, an electrical power grid (e.g., a smart grid), a telephone grid, a cable grid, a data line grid (e.g., ethernet cables), though embodiments are not limited thereto.
- Wires can be any conductive wires (i.e., capable of passing electrical current) known in the art.
- a single loop connection is present between two remote hosts. Such a configuration, as shown in FIG. 1 , is unconditionally secure. In some embodiments, if a grid is used to connect many remote hosts such that more than single loop connections are present, then filters can be used and controlled for the KLJN frequency band where the key exchange operates.
- Secure key exchange can be achieved by switching on and off proper filtering units in a structured way within a KLJN system (e.g., a smart grid).
- Filters can pass or reject the KLJN frequency band B kljn and/or the main frequency.
- the main frequency can be the regular frequency used over the wires.
- the main frequency can be the power frequency (e.g., 50 or 60 Hz).
- B kljn and the main frequency which can be referred to as f p for simplicity
- the filters that pass or reject the KLJN frequency band and the main frequency can be referred to as “switched filters”.
- the pattern of connections between KLJN units can be varied to provide the exchange of a separate secure key for each possible pair of hosts by varying the network of filters and their connections accordingly.
- the functional units connected to the KLJN system can be referred to as hosts or remote hosts.
- a host is able to execute a KLJN key exchange in any direction simultaneously.
- each host can execute a KLJN key exchange towards the left and right in a simultaneous way.
- each host in such a linear system has two independent KLJN units.
- the filter system must satisfy the following requirements: 1) hosts that currently do not execute KLJN key exchange should not interfere with those processes even if the KLJN signals pass through their connections; and 2) each host should be able to extract the main frequency (e.g., electrical power from the electric power system) without disturbing the KLJN key exchanges.
- main frequency e.g., electrical power from the electric power system
- FIG. 2 For demonstrative purposes only, key exchange between eight hosts in a one-dimensional system, as shown in FIG. 2 , is described.
- the system used for demonstrative purposes is connected via electrical power lines. It is important to note that embodiments of the subject invention are not limited to one-dimensional systems, systems connected via electrical power lines, or systems having eight hosts; rather, these characteristics are present in this system solely for demonstrative purposes.
- the network is branched.
- Systems and methods of the subject invention can be used on a network having any reasonable number of hosts.
- the number of hosts of such a network can be, for example, any of the following values, at least any of the following values, no more than any of the following values, or any range having any of the following values as endpoints: 2, 3, 4, 5, 6, 7, 8, 9, 10, 20, 30, 40 50, 60, 70, 80, 90, 100, 1000, 10 ⁇ 4, 10 ⁇ 5, 10 ⁇ 6, 10 ⁇ 7, 10 ⁇ 8, 10 ⁇ 9, or 10 ⁇ 10.
- Each host must have a wired connection to every other host with which there is to be an exchange of a key (e.g., an encryption key).
- the wired connection is by at least one wire, cable, or similar that is capable of conducting electrical current.
- the size of a network can be defined as being of size N when that network has N+1 hosts.
- Intermediate hosts in the network can be in two different states according to the need: ⁇ ) State 1 is defined when KLJN bandwidth B kljn is not allowed into the host; and ⁇ ) State 2 is defined when KLJN bandwidth B kljn , is allowed into the host.
- the hosts at the two ends (labeled “0” and “7” for demonstrative purposes only) can be in similar situations except that they can communicate in only a single direction.
- the intermediate hosts can communicate in two directions, and the filters used for these intermediate hosts will be discussed in more detail.
- Each host of the network can include one or more filter boxes, which can distribute the KLJN signals and the main frequency (e.g., the power) and can be responsible for connecting the proper elements for the KLJN key exchange and supplying the hosts with the main signal or frequency (e.g., power frequency).
- FIG. 3 shows a schematic of building blocks in a filter box.
- the filters boxes can be controlled by, for example, a central server and/or an automatic algorithm, though embodiments are not limited thereto.
- Each filter box for an intermediate host can have three switched filters and a corresponding output wire. Referring to FIG.
- each filter box can include: a first KLJN filter for KLJN key exchange in a first direction (e.g., a left KLJN filter for KLJN key exchange to the left); a second KLJN filter for KLJN key exchange in a second direction (e.g., a right KLJN filter for KLJN key exchange to the right); and a main signal filter to supply the main signal to the host (e.g., a power filter to supply power to the host).
- Each KLJN filter can be connected to a pair of resistors and at least one voltage source (as shown in FIG. 1 , for each of Alice and Bob).
- the main signal filter can be connected to a resistor (labeled R C in FIG. 3 ), which can have the same or a different resistance value from R L , R H , or both.
- KLJN loops can be non-overlapping loops, as the KLJN protocol is fundamentally peer-to-peer. If overlapping loops were allowed using only the KLJN frequency and the main frequency, then there is a possibility that an eavesdropper might be in between and would require the trust of the intermediate hosts.
- the reason for having two KLJN units per host is to decrease the time needed to connect every host by having simultaneous loops in both directions of the one-dimensional grid (e.g., toward left and right), without overlapping. It is possible to use overlapping key exchanges, but additional frequencies or frequency bands would be required to be used. That is, many embodiments of the subject invention provide for overlapping key exchanges while utilizing more than two frequencies or frequency bands.
- Each host is connected to a filter box, and the filters boxes are connected to the grid (e.g., the power grid).
- Each host has three wire connections to its filter box.
- the solid black line means that both KLJN bandwidth and power frequency are passing through (e.g., ordinary wire).
- the (red) dotted lines carry B kljn while rejecting f p .
- the (blue) dashed lines indicate that the power frequency is passing and the KLJN bandwidth is rejected.
- FIG. 5 shows a schematic of a filter box of an inactive host (i.e., when it is not executing KLJN key exchange) in State 1.
- Filter A is passing everything (shorted), filter B is disconnected.
- filter C is passing B kljn only, and filters E and D are passing fp only.
- State 1 is when the host is not allowed to access KLJN band.
- State 2 is when the host is allowed to access KLJN band.
- the filter box shown in FIG. 5 is in State 1.
- FIG. 6 shows a schematic of a filter box of an active host (i.e., when it is executing a KLJN key exchange) in State 2.
- the power is passing from left to right, but the KLJN band is not and the left and right KLJN units are separated while doing a key exchange to the left and the right.
- State 1 is when the host is not allowed to access KLJN band
- State 2 is when the host is allowed to access KLJN band.
- the filter box shown in FIG. 6 is in State 2.
- FIG. 7 shows a schematic of the hosts during key exchange.
- the nearest neighbors are connected, and this can be one step in a protocol for key exchange (e.g., this can be the first step).
- This step is the quickest and most efficient, as it has the most non-overlapping simultaneous loops and requires only 1 key exchange period (KE) to complete. Every host in this step has access to KLJN band and thus is in State 2.
- KE key exchange period
- FIG. 13 shows a schematic of the hosts during key exchange. Only one key exchange is performed in this step. Hosts 1 through 6 are not allowed access to the KLJN band thus they are in State 1. This step is not the most efficient but only requires one KE since there is only one pair of hosts exchanging a key.
- a protocol can be established.
- the protocol must make every possible connection in the network, must not overlap loops (for this non-overlapping demonstrative example), and must be quick and efficient by making as many simultaneous loops as possible without overlapping.
- An example of such a protocol will be described in detail for demonstrative purposes, though embodiments of the subject invention are not limited to the protocol described (not even non-overlapping, one-dimensional embodiments).
- the low-frequency cutoff of the noise is 0 Hz and the high-frequency cut-off is B in .
- the power frequency is present.
- the B kljn band can be beyond the power frequency f p and the difference is negligible.
- the shortest characteristic time in the system can be the correlation time ⁇ kljn of the noise ( ⁇ kljn ⁇ 1/B kljn ).
- the length of the secure key exchange can be any arbitrary length. For example, if a key length is 100 bits, then 100 BE are required, which requires on average 20,000 ⁇ kljn (e.g., approximately 2 seconds if B kljn is 10 kHz).
- KLJN secure key Once the KLJN secure key has been exchanged the total amount of time needed to complete this is one KLJN secure key exchange period (KE). While the key exchange may be slow in certain instances, the system has the advantage that it is running continuously (not only during the handshake period like during common secure internet protocols); thus, a large number of secure key bits are produced during the continuous operation.
- the pessimistic estimation can be used by assuming a uniform duration for KE determined by the largest distance in the network, even though in reality short distances can exchange keys at a higher speed.
- An example of a protocol for key exchange includes first connecting the nearest neighbor of every host. This allows the highest number of simultaneous non-overlapping loops per KE and only requires one KE to complete the first step. The protocol then connects the second nearest neighbors, thereby allowing the second-highest number of simultaneous loops per KE. However, due to the requirement of avoiding overlapping loops (for this non-overlapping one-dimensional demonstrative example), connecting each pairs of second nearest neighbors requires two KEs. The protocol then connects the third nearest neighbors, which requires 3 KEs to complete and connects the third most simultaneous loops per KE. The procedure can continue until the i-th nearest neighbor is equal to or less than half of the size of the network. If the number of steps i between the i-th nearest neighbors satisfies the relation i>N/2, then, to avoid overlapping loops, only one connection per KE is possible.
- a method of securely exchanging data comprises utilizing a KLJN system and/or protocol as described herein.
- Embodiments of the subject invention advantageously provide unconditionally secure key exchange over a network, such as a smart grid.
- a reconfigurable filter system can be used for the realization of a KLJN secure key distribution system.
- the system can achieve unconditionally secure key distribution over a network of arbitrary dimensions.
- a possible attack strategy against the KLJN secure key exchange system could include utilizing the lack of exact thermal equilibrium in practical applications and could be based on cable resistance losses and the fact that the Second Law of Thermodynamics may not be able to provide full security when such losses are present.
- Such an attack does not challenge the unconditional security of the KLJN scheme, but it puts more stringent demands on the security/privacy enhancing protocol than other types of attack.
- a simple defense protocol can be used to fully eliminate such an attack by increasing the noise-temperature at the side of the smaller resistance value over the noise-temperature at the side with the greater resistance value.
- Such a protocol can completely remove any potential information for an eavesdropper (i.e., an attacker), not only for an attack utilizing the lack of exact thermal equilibrium in practical applications, but also for a Bergou-Scheuer-Yariv attack, as discussed below.
- the most efficient potential attack strategies against the KLJN scheme can therefore be nullified.
- FIG. 22 shows a schematic view of a KLJN secure key exchange system according to many embodiments of the subject invention.
- the cable parameters and integrity can be randomly monitored; the instantaneous voltage U c (t) and current I c (t) amplitudes in the cable can be measured and compared via public authenticated data exchange; and full spectral and statistical analysis/checking can be carried out by the remote hosts (e.g., Alice and Bob).
- R, t, and T eff denote resistance, time, and effective temperature, respectively.
- Line filters and other advanced hardware are not shown in FIG. 22 , though they can be present.
- the communicating parties connect their randomly chosen resistor and corresponding noise-voltage generator to a KLJN channel (e.g., a wire, line, or cable).
- the resistors can be randomly selected from the publicly known set ⁇ R L ,R H ⁇ , R L ⁇ R H , where the elements represent low (L) and high (H) bit values.
- the Gaussian voltage noise generators mimimicking the Fluctuation-Dissipation Theorem and delivering band-limited white noise with publicly agreed bandwidth—produce enhanced thermal (Johnson) noise at a publicly agreed effective temperature T eff , which can be, for example, T eff ⁇ 10 9 K.
- T eff publicly agreed effective temperature
- T eff can be, for example, T eff ⁇ 10 9 K.
- the noises are statistically independent of each other and from the noise of the former bit period.
- the noises are Gaussian, as other distributions may not be secure.
- Security is provided at least in part by the Second Law of Thermodynamics because directional information, due to the direction of power flow, does not exist because the mean power flow is zero even though the LH and HL situations have asymmetric resistance arrangements. That is, the security of the ideal KLJN scheme against passive (non-invasive listening/measuring) attacks is as strong as the impossibility to build a perpetual motion machine of the second kind.
- the security against active (invasive) attacks is provided at least in part by the robustness of classical physical quantities, which guarantees that these quantities can be monitored (and their integrity with the cable parameters and model can be checked) continuously without destroying their values. It can be observed, in passing, that the situation is totally different for the case of quantum physics.
- the Bergou-Scheuer-Yariv (BSY) cable resistance attack is an attack against a non-ideal KLJN scheme.
- the BSY cable resistance attack utilizes the fact that, due to the non-zero cable resistance, the mean-square voltage will be slightly less at the cable end with the smaller resistance value than at the other end with the greater resistance.
- FIG. 23 shows a schematic view of a scheme devised to illustrate the BSY attack and the Second-Law-attack.
- Alice's and Bob's locations are arbitrary in the figure.
- the powers flowing out from the “H” and “L” ends of the cable are calculated and compared.
- the temperature of the cable resistor Rc can be neglected because of the high noise temperature of the generators. The notation is consistent with that in FIG. 22 .
- Eve's measured absolute difference between the mean-square voltages ⁇ U cH 2 (t)> and ⁇ U cL 2 (t)> of the “H” and “L” ends is given by:
- k Boltzmann's constant
- ⁇ f noise bandwidth
- R c cable resistance.
- ⁇ KS scales with the square of the cable resistance, i.e., ⁇ KS ⁇ R c 2 .
- Equation (19) The rules about transformations of noise spectra in linear systems, along with Johnson's formula for thermal noise can be used to derive Equation (19).
- U R 2 ( t ) 4 kT eff R ⁇ f (19)
- ⁇ U R 2 (t)> denotes mean-square voltage fluctuations on the resistor, with resistance R, within the bandwidth ⁇ f.
- the cable resistance has a non-zero value, and therefore the resistors and their noise generators are not in thermal equilibrium in practical versions of the KLJN system (with T eff much greater than the cable temperature). Consequently, the Second Law of Thermodynamics may not be able to provide full security.
- the cable-heating powers by the generators at the “H” and “L” ends are different and are given by
- the difference between P Hc and P Lc can be utilized for the Second-Law-attack in the case where the resistor values R H and R L are publicly known.
- the implementation of this attack can be used to measure and compare the net power flows at the two ends of the cable, as shown in FIG. 23 .
- the mean power flow P HL from the “H” end toward the “L” end of the cable, and the mean power flow P LH from the “L” end toward the “H” end are, respectively,
- the opposite current sign at the “L” end expresses the fact that the current flowing out from the “H” end is flowing into the “L” end (using the same current sign would instead provide the power dissipated in the cable resistance, which is always positive and gives no directional information).
- FIG. 24 shows a schematic view of Eve's measurements during a Second-Law-attack. The powers flowing out from the two ends of the cable are measured and compared. The notation is consistent with that in FIG. 22 .
- R H has the greater resistance value and R L the smaller one, i.e., R L ⁇ R H .
- R c 0
- the Second-Law-attack is an elegant and efficient one, but it does not challenge the unconditional security of the KLJN scheme.
- a Second-Law-attack may significantly increase the demands on parameter tuning and/or necessitate elaborate privacy amplification, which may come at a cost.
- a natural/simple defense can be used against a Second-Law-attack. If the cable and the resistors are kept at the same temperature, such a temperature-equilibration method virtually eliminates any Second-Law-attack information for Eve (but not necessarily the information in the BSY-attack, albeit its formula for the information leak is changed). Temperature equilibration constitutes a very simple defense, but the cable temperature and its possible variations cannot be neglected any longer. If the cable temperature is different from that of the resistors, then the KLJN scheme is vulnerable to a Hao-type attack.
- an advanced defense can be used against a Second-Law-attack.
- the cable end with the smaller resistance value can emit less power toward the other end, and this can be the foundation of a Second-Law-attack.
- This effect, as well as Eve's related signal, can be partially or completely eliminated by properly changing the ratio of the noise-temperatures of the generators for the resistors with the smaller and the greater resistance values (see FIG. 25 ).
- FIG. 25 shows a schematic view of the elimination of the Second-Law-attack and the BSY-attack by introduction of a proper temperature offset. The notation is consistent with that in FIG. 22 .
- Equation (27) Equation (27) holds, where T eff is the noise temperature at the R H resistors and ⁇ T eff is the noise temperature of the R L resistors.
- Equation (29) Reevaluating the analysis of the BSY with the temperature offset given by Equation (28), Equation (29) can be obtained.
- an advanced defense against a Second-Law-attack involves a proper increase of the noise-temperature of the noise generator for the smaller resistances compared to that of the generators for the greater resistances, which surprisingly eliminates not only the Second-Law-attack but also a BSY attack. Removing these attacks can radically reduce Eve's fidelity while increasing that of Alice and Bob as a result of the potentially allowed longer bit-exchange periods and/or higher bandwidths.
- the invention includes, but is not limited to, the following embodiments:
- a Kirchhoff-Law-Johnson-(like)-Noise (KLJN) system for secure key distribution comprising:
- each host is connected to every other host by a continuous wired path capable of transmitting electrical current
- each host of the plurality of hosts comprises a first resistor and is configured to produce a first-resistor enhanced Johnson noise voltage when the first resistor is connected to a voltage source
- each host of the plurality of hosts further comprises a second resistor and is further configured to produce a second-resistor enhanced Johnson noise voltage when the second resistor is connected to a voltage source
- resistance value of the second resistor of each host is the identical to that of all other hosts of the plurality of hosts.
- each host further comprises a filter box.
- filter box comprises:
- a main signal filter for supplying a main signal of the network to the host having the filter box.
- each host comprises a third resistor
- the main signal filter is connected to the third resistor of the host having the filter box such that the main signal filter is connected between all other hosts and the third resistor of the host having the filter box.
- the first sub-filter when open, permits a signal to pass through the KLJN filter without reaching the first and second resistors
- the second sub-filter permits a signal to reach the first and second resistors
- KLJN filter is configured such that, in an inactive state, the first sub-filter is open to Johnson noise and the second sub-filter is closed to Johnson noise, and
- KLJN filter is configured such that, in an active state, the first sub-filter is closed to Johnson noise and the second sub-filter is open to Johnson noise.
- wired network is an existing infrastructure network.
- the wired network is a smart power grid
- the main signal filter is a power filter for supplying power to the host having the filter box.
- a Kirchhoff-Law-Johnson-(like)-Noise (KLJN) method for secure key distribution using a system wherein the system comprises:
- each host is connected to every other host by a continuous wired path capable of transmitting electrical current
- each host of the plurality of hosts comprises a first resistor and a second resistor, wherein the resistance value of the first resistor of each host is identical to that of all other hosts of the plurality of hosts,
- each host further comprises a filter box.
- the filter box comprises:
- a main signal filter for supplying a main signal of the network to the host having the filter box.
- each host comprises a third resistor
- the main signal filter is connected to the third resistor of the host having the filter box such that the main signal filter is connected between all other hosts and the third resistor of the host having the filter box.
- the first sub-filter when open, permits a signal to pass through the KLJN filter without reaching the first and second resistors
- the second sub-filter permits a signal to reach the first and second resistors
- the wired network is a smart power grid
- the main signal filter is a power filter for supplying power to the host having the filter box.
- the method further comprises connecting, to a voltage source, exactly one of the first resistor or the second resistor of a third host of the plurality of hosts, thereby producing a third-host enhanced Johnson noise voltage (“third-host” is used as a label only), which is transmitted to the first host.
- third-host is used as a label only
- KEs key exchange periods
- the analytic form of the exact time required to fully arm every host with enough keys to securely communicate with every host in the network is dependent on the size of the network and whether the network has an even or odd size.
- the analysis in this example focuses on the case where N is an odd number.
- a network of size N 7, as shown in FIG. 2 , was analyzed.
- the network has eight hosts with index i, where 0 ⁇ i ⁇ 7.
- the network has seven intermediate connections between the first host and the last host.
- the first step in the protocol connects the nearest neighbors, as shown in FIG. 7 .
- FIG. 8 shows a schematic of the second step in the protocol, which connects the second-nearest neighbors. This step is the second quickest and the second most efficient. It has the second most non-overlapping simultaneous loops and requires 2 KEs to complete.
- FIG. 9 shows a schematic of the third step in the protocol, which connects the third-nearest neighbors. This step is not as efficient as the first two steps but still has simultaneous loops in two of its KE steps. This step requires 3 KEs to complete.
- FIG. 10 shows a schematic of the fourth step in the protocol, which connects the fourth-nearest neighbors.
- This step requires 4 KEs to complete.
- the midpoint is considered when the distance between key-exchanging hosts is equal to half the length of the network. Simultaneous loops with disconnected hosts are not possible beyond the midpoint.
- the slowest and least efficient steps occur at the midpoint of the protocol.
- FIG. 11 shows a schematic of the fifth step in the protocol, which connects the fifth-nearest neighbors.
- This step is not efficient since simultaneous non-overlapping loops with disconnected hosts cannot occur. This step takes 3 KEs to complete. It is also inefficient since it is beyond the midpoint thus only a single loop is possible, but it requires fewer KEs since there are only three such pairs.
- FIG. 12 shows a schematic of the sixth step in the protocol, which connects the sixth-nearest neighbors. This step requires only 2 KEs since there are only two possibilities.
- the protocol then connects the seventh-closest neighbors, as shown in FIG. 13 . This requires 1 KE since there is only one such pair of hosts.
- N 2 n+ 1.
- n can be solved for and expressed in terms of N to give the following;
- N - 1 2 n . ( 3 )
- the pattern when N is odd has the following form
- N N ⁇ ( N + 1 ) 2 . ( 6 )
- Gauss's counting method can be used twice to find the sum as follows.
- the speed of the network is proportional to (N 2 )/4 with N being odd and the size of the network.
- KEs key exchange periods
- the analytic form of the exact time required to fully arm every host with enough keys to securely communicate with every host in the network is dependent on the size of the network and whether the network has an even or odd size.
- the analysis in this example focuses on the case where N is an even number.
- the network has nine hosts with index i, where 0 ⁇ i ⁇ 8.
- the network has eight intermediate connections between the first host and the last host.
- FIG. 14 shows a schematic of the first step in the protocol, which connects the nearest neighbors. This step is the quickest and most efficient. It has the most non-overlapping simultaneous loops and requires only 1 KE to complete.
- FIG. 15 shows a schematic of the second step in the protocol, which connects the second-nearest neighbors. This step requires 2 KEs to complete and has the second most simultaneous non-overlapping loops. It is the second quickest and second most efficient step.
- FIG. 18 shows a schematic of the fifth step in the protocol, which connects the fifth-nearest neighbors. This step is not efficient since simultaneous non-overlapping loops with disconnected hosts cannot occur. It requires 4 KEs to complete.
- FIG. 20 shows a schematic of the seventh step, which connects the seventh-nearest neighbors. This step is not efficient but only requires 2 KEs since there are only two such pairs of hosts.
- FIG. 21 shows a schematic of the eighth step, which connects the eighth-nearest neighbors. This step is not efficient but only requires 1 KE since there is only one pair of hosts that are eight hosts apart.
- the KEs by step are 1 KE, 2 KE, 3 KE, 4 KE, 4 KE, 3 KE, 2 KE, and 1 KE.
- This is essentially Gauss's counting technique up to N/2 and back.
- the time needed to connect the entire network will take 20 KEs (e.g., approximately 40 seconds if B kljn is 10 kHz and if the key is 100 bits long).
- the speed or time requirement of the protocol for a network of size N with N being even between the first and last host is ((N 2 )/4+N/2) KEs and can be derived as follows.
- N 2 4 + N 2 20 ⁇ ⁇ K ⁇ ⁇ E . ( 9 )
- N 2 n. (10)
- n can be solved for and expressed in terms of N, giving the following;
- N N ⁇ ( N + 1 ) 2 .
- Gauss's counting method can be used twice to find the sum as follows.
- the speed of the network is proportional to (N 2 )/4 with N being the size of the network and even.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Automation & Control Theory (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
TABLE 1 |
Truth table of the KLJN Filters in State 1 (inactive host). |
KLJN Filters | Filter A | Filter B | ||
KLJN Bkljn Allowed | Yes | No | ||
Power Frequency Allowed | Yes | No | ||
TABLE 2 |
Truth table of the Power Filter in State 1 (inactive host). |
Power Filter | Filter C | Filter D | Filter E | ||
KLJN Bkljn Allowed | Yes | No | No | ||
Power Frequency Allowed | No | Yes | Yes | ||
TABLE 3 |
Truth table of left KLJN filter when a host is in State 2 (active host). |
KLJN Filter | Filter A | Filter B | ||
Bkljn allowed | No | Yes | ||
fp allowed | Yes | No | ||
TABLE 4 |
Truth table of power filter when a host is in State 2 (active host). |
Power Filter | Filter C | Filter D | Filter E | ||
Bkljn allowed | No | No | No | ||
fp allowed | No | Yes | Yes | ||
where k is Boltzmann's constant, Δf is noise bandwidth and Rc is cable resistance. Clearly ΔKS scales with the square of the cable resistance, i.e., ΔKS ∝Rc 2.
U R 2(t)=4kT eff RΔf (19)
gives the difference between the powers supplied by the two cable ends; with the measured cable voltages and current (see
ΔP AB =P AB −P BA = [U cA(t)+U cB(t)]I c(t) (26)
ΔP HL =P HL(T eff)−P LH(βT eff)=0 (27)
The solution of the equation is
where α=(RL/RH). By substituting the above value for β, the nominator becomes zero so that
ΔKS(T eff ,βT eff)=| U cH 2(t,T eff)− U cL 2(t,βT eff)|=0 (30)
-
- connecting, to a voltage source, exactly one of the first resistor or the second resistor of a first host of the plurality of hosts, thereby producing a first-host enhanced Johnson noise voltage, which is transmitted to a second host of the plurality of hosts; and
- connecting, to a voltage source, exactly one of the first resistor or the second resistor of the second host, thereby producing a second-host enhanced Johnson noise voltage, which is transmitted to the first host.
-
- placing the KLJN filter in an inactive state by opening the first sub-filter to Johnson noise and closing the second sub-filter to Johnson noise; and
- placing the wherein the KLJN filter is in an active state, when the host having the KLJN filter is receiving a key, by closing the first sub-filter to Johnson noise and opening the second sub-filter to Johnson noise.
N=2n+1. (2)
N=2n. (10)
- Engleman E, Robertson J (2013) Obama to share cybersecurity priorities with congress; http://www.bloomberg.com/news/2013-02-27/obama-to-share-cybersecurity-priorities-with-congress.html
- Amin S M, Wollenberg B F (2008) Toward a smart grid. IEEE Power Energy Mag. 3: 114-122.
- Kezunovic M (2011) Smart Fault Location for Smart Grids. IEEE Trans. Smart Grid 2: 11-22.
- McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart Grid. IEEE Security & Privacy vol. 7: 75-77.
- Kundur D, Feng X, Mashayekh S, Liu S, Zourntos T, Butler-Perry K L (2011) Towards modeling the impact of cyber attacks on a smart grid. Int. J. Security and Networks 6: 2-13.
- Liang Y, Poor H V, Shamai S (2008) Information theoretic security. Foundations Trends, Commun. Inform. Theory 5: 355-580. doi: 10.1561/0100000036.
- Yuen H P (2012) On the Foundations of Quantum Key Distribution—Reply to Renner and Beyond. manuscript http://arxiv.org/abs/1210.2804.
- Gerhardt I, Liu Q, Lamas-Linares A, Skaar J, Kurtsiefer C, Makarov V (2011) Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
Nature Communications 2. doi:10.1038/ncomms1348. - Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, Makarov V (2010) Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics 4: 686-689. doi: 10.1038/nphoton.2010.214.
- Gerhardt I, Liu Q, Lamas-Linares A, Skaar J, Scarani V, Makarov V, Kurtsiefer C (2011) Experimentally faking the violation of Bell's inequalities. Physical Review Letters 107. doi: 10.1103/PhysRevLett.107.170404.
- Makarov V, Skaar J (2008) Fakes states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols. Quantum Information & Computation 8: 622-635.
- Wiechers C, Lydersen L, Wittmann C, Elser D, Skaar J, Marquardt C, Makarov V, Leuchs G (2011) Aftergate attack on a quantum cryptosystem. New Journal of Physics 13. doi: 10.1088/1367-2630/13/1/013043.
- Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, Makarov V (2010) Thermal blinding of gated detectors in quantum cryptography. Optics Express 18: 27938-27954. doi: 10.1364/oe.18.027938.
- Jain N, Wittmann C, Lydersen L, Wiechers C, Elser D, Marquardt C, Makarov V, Leuchs G (2011) Device calibration impacts security of quantum key distribution. Physical Review Letters 107. doi: 10.1103/PhysRevLett.107.11051.
- Lydersen L, Skaar J, Makarov V (2011) Tailored bright illumination attack on distributed-phase-reference protocols. Journal of Modern Optics 58: 680-685. doi: 10.1080/09500340.2011.565889.
- Lydersen L, Akhlaghi M K, Majedi A H, Skaar J, Makarov V (2011) Controlling a superconducting nanowire single-photon detector using tailored bright illumination. New Journal of Physics 13. doi: 10.1088/1367-2630/13/11/113042.
- Lydersen L, Makarov V, Skaar J (2011) Comment on “Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography” Appl. Phys. Lett. 98, 231104 (2011). Applied Physics Letters 99. doi: 10.1063/1.3658806.
- Sauge S, Lydersen L, Anisimov A, Skaar J, Makarov V (2011) Controlling an actively-quenched single photon detector with bright light. Optics Express 19: 23590-23600.
- Lydersen L, Jain N, Wittmann C, Maroy O, Skaar J, Marquardt C, Makarov V, Leuchs G (2011) Superlinear threshold detectors in quantum cryptography. Physical Review A 84. doi: 10.1103/PhysRevA.84.032320.
- Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, Makarov V (2010) Avoiding the blinding attack in QKD reply. Nature Photonics 4: 801-801. doi: 10.1038/nphoton.2010.278.
- Makarov V (2009) Controlling passively quenched single photon detectors by bright light. New Journal of Physics 11. doi: 10.1088/1367-2630/11/6/065003.
- Kish L B (2006) Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff s law. Physics Letters A 352: 178-182. doi: 10.1016/j.physleta.2005.11.062.
- Kish L B (2006) Protection against the man-in the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security. Fluctuation and Noise Letters 6: L57-L63. doi: 10.1142/s0219477506003148.
- Mingesz R, Kish L B, Gingl Z, Granqvist C G, Wen H, Peper F, Eubanks T, Schmera G (2013) Unconditional security by the laws of classical physics. Metrology and Measurement Systems 20:3-16; (open access) http://www.metrology.pg.gda.pl/full/2013/M&MS—2013—003.pdf
- Mingesz R, Gingl Z, Kish L B (2008) Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line. Physics Letters A 372: 978-984. doi: 10.1016/j.physleta.2007.67.086.
- Kish L B, Saidi O (2008) Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives. Fluctuation and Noise Letters 8: L95-L98. doi: 10.1142/s0219477508004362.
- Kish L B, Peper F (2012) Information networks secured by the laws of physics. Ieice Transactions on Communications. E95B: 1501-1507. doi: 10.1587/transcom.E95.B.1501.
- Kish L B, Mingez R (2006) Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise. Fluctuation and noise letters 6: L447-L447. doi: 10.1142/s0219477506003628.
- Balog R S, Krein P T (2013) Coupled Inductor Filters: A Basic Filter Building Block. IEEE Transactions on Power Electronics 28: 537-546.
- Kim S, Enjeti P N (2002) A new hybrid active power filter (APF) topology. IEEE Transactions on Power Electronics 17: 48-54.
- Kish L B (2013) Enhanced secure key exchange systems based on the Johnson-noise scheme; Metrology & Measurement Systems XX:191-204; open access: http://www.degruyter.com/view/j/mms.2013.20.issue-2/mms-2013-0017.xml?format=INT
- Kish L. B., Phys. Lett. A 352 (2006) 178-182.
- Kish L. B. and Granqvist C. G., Quantum Inf. Process., (2014), in press, doi: 10.1007/s11128-014-0729-7.
- Mingesz R., Gingl Z. and Kish L. B., Phys. Lett. A, 372 (2008) 978-984.
- Gingl Z. and Mingesz R., PLoS ONE, 9 (2014) e96109.
- Mingesz R., Vadai G. and Gingl Z., Fluct. Noise Lett. (2014), in press, arXiv:1405.1196.
- Bergou J., interviewed in: CHO A., Science 309 (2005) 2148.
- Scheuer J. and Yariv A., Phys. Lett. A, 359 (2006) 737-740.
- Kish L. B. and Scheuer J., Phys. Lett. A, 374 (2010) 2140-2142.
- Kish L. B., Metrol. Meas. Syst., 20 (2013) 191-204. DOI: 10.2478/mms-2013-0017.
- Mingesz R., Kish L. B., Gingl Z., Granqvist C. G., Wen H., Peper F., Eubanks T. and Schmera G., Metrol. Meas. Syst. 20 (2013) 3-16. doi: 10.2478/mms-2013-0001.
- Kish L. B., Mingesz R., Gingl Z. and Granqvist C. G., Metrol. Meas. Syst. 19 (2012) 653-658.
- Horvath T., Kish L. B. and Scheuer J., EPL 94 (2011) 28002.
- Hao F., IEE Proc. Inform. Soc. 153 (2006) 141-142.
- Smulko J., Fluct. Noise Lett. (2014), in press.
- Saez Y., Kish L. B., Mingesz R., Gingl Z. and Granqvist C. G., J. Comput. Electron. 13 (2014) 271-277.
- Kish L. B., Granqvist C. G., “Elimination of a Second-Law-attack, and all cable-resistance-based attacks, in the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system”, Jun. 27, 2014 (http://arxiv.org/ftp/arxiv/papers/1406/1406.5179.pdf)
- Kish L. B. and Granqvist C. G., Quantum Inf Process 13 (2014) 2213-2219.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/489,025 US9270448B2 (en) | 2014-03-11 | 2014-09-17 | Encryption key distribution system and method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201461951072P | 2014-03-11 | 2014-03-11 | |
US14/489,025 US9270448B2 (en) | 2014-03-11 | 2014-09-17 | Encryption key distribution system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
US20150263853A1 US20150263853A1 (en) | 2015-09-17 |
US9270448B2 true US9270448B2 (en) | 2016-02-23 |
Family
ID=54070176
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/489,025 Expired - Fee Related US9270448B2 (en) | 2014-03-11 | 2014-09-17 | Encryption key distribution system and method |
Country Status (1)
Country | Link |
---|---|
US (1) | US9270448B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11303447B2 (en) * | 2018-05-11 | 2022-04-12 | Syferex, LLC | Authentication system using paired, role reversing personal devices |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9270448B2 (en) * | 2014-03-11 | 2016-02-23 | The Texas A&M University System | Encryption key distribution system and method |
US10389526B2 (en) * | 2015-04-21 | 2019-08-20 | Massachusetts Institute Of Technology | Methods for quantum key distribution and related devices |
US11172359B2 (en) * | 2017-08-09 | 2021-11-09 | Lenovo (Singapore) Pte. Ltd. | Method and apparatus for attach procedure with security key exchange for restricted services for unauthenticated user equipment |
WO2024112296A1 (en) * | 2022-11-21 | 2024-05-30 | Koc Universitesi | A system and method for reliable bit detection in kirchhoff-law-johnson-noise secure key exchange schemes |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050097342A1 (en) * | 2001-05-21 | 2005-05-05 | Cyberscan Technology, Inc. | Trusted watchdog method and apparatus for securing program execution |
US20060059373A1 (en) * | 2004-09-10 | 2006-03-16 | International Business Machines Corporation | Integrated circuit chip for encryption and decryption using instructions supplied through a secure interface |
US20060230269A1 (en) * | 2003-07-07 | 2006-10-12 | Udo Doebrich | Method for encoded data transmission via a communication network |
US20100116630A1 (en) * | 2008-10-01 | 2010-05-13 | Pinkerton Joseph F | Nanoelectromechanical tunneling current switch systems |
US7907849B1 (en) * | 2007-03-15 | 2011-03-15 | Ramot At Tel-Aviv University Ltd. | Secure communication system and method for exchanging data units |
US8015597B2 (en) * | 1995-10-02 | 2011-09-06 | Corestreet, Ltd. | Disseminating additional data used for controlling access |
WO2012000755A1 (en) | 2010-06-30 | 2012-01-05 | Siemens Aktiengesellschaft | Absolutely secure signal transmission by means of thermal noise |
US8185947B2 (en) * | 2006-07-12 | 2012-05-22 | Avaya Inc. | System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network |
US20140115341A1 (en) * | 2012-10-23 | 2014-04-24 | Verizon Patent And Licensing Inc. | Method and system for enabling secure one-time password authentication |
US8862718B2 (en) * | 2006-07-12 | 2014-10-14 | Avaya Inc. | System, method and apparatus for troubleshooting an IP network |
US8904181B1 (en) * | 2001-03-23 | 2014-12-02 | David P. Felsher | System and method for secure three-party communications |
US20150134947A1 (en) * | 2012-05-23 | 2015-05-14 | University Of Leeds | Secure communication |
US20150263853A1 (en) * | 2014-03-11 | 2015-09-17 | The Texas A&M University System | Encryption key distribution system and method |
-
2014
- 2014-09-17 US US14/489,025 patent/US9270448B2/en not_active Expired - Fee Related
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8015597B2 (en) * | 1995-10-02 | 2011-09-06 | Corestreet, Ltd. | Disseminating additional data used for controlling access |
US8904181B1 (en) * | 2001-03-23 | 2014-12-02 | David P. Felsher | System and method for secure three-party communications |
US20050097342A1 (en) * | 2001-05-21 | 2005-05-05 | Cyberscan Technology, Inc. | Trusted watchdog method and apparatus for securing program execution |
US20060230269A1 (en) * | 2003-07-07 | 2006-10-12 | Udo Doebrich | Method for encoded data transmission via a communication network |
US20060059373A1 (en) * | 2004-09-10 | 2006-03-16 | International Business Machines Corporation | Integrated circuit chip for encryption and decryption using instructions supplied through a secure interface |
US8862718B2 (en) * | 2006-07-12 | 2014-10-14 | Avaya Inc. | System, method and apparatus for troubleshooting an IP network |
US8185947B2 (en) * | 2006-07-12 | 2012-05-22 | Avaya Inc. | System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network |
US7907849B1 (en) * | 2007-03-15 | 2011-03-15 | Ramot At Tel-Aviv University Ltd. | Secure communication system and method for exchanging data units |
US20100116630A1 (en) * | 2008-10-01 | 2010-05-13 | Pinkerton Joseph F | Nanoelectromechanical tunneling current switch systems |
WO2012000755A1 (en) | 2010-06-30 | 2012-01-05 | Siemens Aktiengesellschaft | Absolutely secure signal transmission by means of thermal noise |
US20150134947A1 (en) * | 2012-05-23 | 2015-05-14 | University Of Leeds | Secure communication |
US20140115341A1 (en) * | 2012-10-23 | 2014-04-24 | Verizon Patent And Licensing Inc. | Method and system for enabling secure one-time password authentication |
US20150263853A1 (en) * | 2014-03-11 | 2015-09-17 | The Texas A&M University System | Encryption key distribution system and method |
Non-Patent Citations (45)
Title |
---|
Amin, Massoud et al., "Toward a smart grid: Power delivery for the 21st century," IEEE Power Energy Magazine, 2008, 3:114-122. |
Balog, Robert et al., "Coupled Inductor Filters: A Basic Filter Building Block," IEEE Transactions on Power Electronics, 2013, 28:537-546. |
Bergou, János. Interviewed in Adrian Cho's "Cryptography: Simple Noise May Stymie Spies Without Quantum Weirdness," Science, 2005, 309:2148. |
Engleman, Eric et al., "Obama to share cybersecurity priorities with congress," 2013, http://www.bloomberg.com/news/2013-02-27/obama-to-share-cybersecurity-priorities-with-congress.html. |
Gerhardt, Ilja et al., "Full-field implementation of a perfect eavesdropper on a quantum cryptography system," Nature Communications, 2011, p. 1-8. |
Gerhardt, Ilja, et al., "Experimentally faking the violation of Bell's inequalities," Physical Review Letters, 2011, 107. doi: 10.1103/PhysRevLett.107.170404. |
Gingl, Zoltan et al., "Noise Properties in the Ideal Kirchoff-Law-Johnson-Noise Secure Communication System," PLoS ONE, 2014, e96109, doi: 10.1371/journal.pone.0096109. |
Gonzalez, Elias et al., "Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters," PLoS ONE, 2013, doi: 10.1371/journal.pone.0070206. |
Hao, Feng. "Kish's key exchange scheme is insecure," IEE Proc. Inform. Soc., 2006, 153:141-142. |
Horvath, Tamás et al., "Effective Privacy Amplification for Secure Classical Communications," EPL, 2011, 94:28002. |
Jain, Nitin et al., "Device calibration impacts security of quantum key distribution," Physical Review Letters, 2011, 107. doi: 10.1103/PhysRevLett.107.11051. |
Kezunovic, Mladen. "Smart Fault Location for Smart Grids," IEEE Transactions on Smart Grid, 2011, 2(1):11-22. |
Kim, Sangsun et al., "A new hybrid active power filter (APF) topology," IEEE Transactions on Power Electronics, 2002, 17:48-54. |
Kish, Laszlo B. "Absolutely Secure Communications by Johnson (-like) noise and Kirchhoff's laws," Phys. Lett. A, 2006, 352:178-182. |
Kish, Laszlo B. "Enhanced secure key exchange systems based on the Johnson-noise scheme," Metrology & Measurement Systems, 2013, p. 1-14. |
Kish, Laszlo B. "Methods of Using Existing and Currently Used Wire Lines (Power Lines, Phone Lines, Internet Lines) for Totally Secure Classical Communication Utilizing Kirchhoff's Law and Johnson-like Noise," Oct. 2, 2006, accessed from: http://arxiv.org/ftp/physics/papers/0610/0610014.pdf. |
Kish, Laszlo B. "Protection against the man-in-the-middle-attack for the Kirchhoff-Loop-Johnson (-like)-noise cipher and expansion by voltage-based security," Fluctuation and Noise Letters, 2006, 6: L57-L63. doi: 10.1142/s0219477506003148. |
Kish, Laszlo B. "Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law," Physics Letters A, 2006, 352: 178-182. doi: 10.1016/j.physleta.2005.11.062. |
Kish, Laszlo B. et al., "Elimination of a Second-Law-attack, and all cable-resistance-based attacks, in the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system," Jun. 27, 2014; accessed from: http://arxiv.org/ftp/arxiv/papers/1406/1406.5179.pdf. |
Kish, Laszlo B. et al., "Information networks secured by the laws of physics," Ieice Transactions on Communications, 2012, E95B: 1501-1507. doi: 10.1587/transcom.E95.B.1501. |
Kish, Laszlo B. et al., "Noise in the wire: the real impact of wire resistance for the Johnson (-like) noise based secure communicator," Phys. Lett. A, 2010, 374:2140-2142. |
Kish, Laszlo B. et al., "On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator," Quantum Inf. Process, 2014, in press, doi: 10.1007/s11128-014-0729-7. |
Kish, Laszlo B. et al., "Spectra for the Product of Gaussian Noises," Metrol. Meas. Syst., 2012, 19:653-658. |
Kish, Laszlo B. et al., "Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise," Fluctuation and Noise Letters, 6:L447-L447. doi: 10.1142/s0219477506003628. |
Kish, Laszlo B. et al., "Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives," Fluctuation and Noise Letters, 2008, 8:L95-L98, doi: 10.1142/s0219477508004362. |
Kundur, D. et al., "Towards modeling the impact of cyber attacks on a smart grid," Int. J. Security and Networks, 2011, 6:2-13. |
Lydersen, Lars et al., "Thermal blinding of gated detectors in quantum cryptography," Optics Express, 2010, 18: 27938-27954. doi: 10.1364/oe.18.027938. |
Lydersen, Lars, et al., "Comment on 'Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography'," Applied Physics Letters, 2011, 99. doi: 10.1063/1.3658806. |
Lydersen, Lars, et al., "Controlling a superconducting nanowire single-photon detector using tailored bright illumination," New Journal of Physics, 2011, 13. doi: 10.1088/1367-2630/13/11/113042. |
Lydersen, Lars, et al., "Hacking commercial quantum cryptography systems by tailored bright illumination," Nature Photonics, 2010, 4:686-689. |
Lydersen, Lars, et al., "Reply to 'Avoiding the Detector Blinding Attack on Quantum Cryptography'," Nature Photonics, 2010, 4: 801-801. doi: 10.1038/nphoton.2010.278. |
Lydersen, Lars, et al., "Superlinear threshold detectors in quantum cryptography," Physical Review A, 2011, 84. doi: 10.1103/PhysRevA.84.032320. |
Lydersen, Lars, et al., "Tailored bright illumination attack on distributed-phase-reference protocols," Journal of Modern Optics, 2011, 58: 680-685. doi: 10.1080/09500340.2011.565889. |
Makarov, Vadim et al., "Fakes states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols," Quantum Information & Computation, 2008, 8:622-635. |
Makarov, Vadim. "Controlling passively quenched single photon detectors by bright light," New Journal of Physics, 2009, 11. doi: 10.1088/1367-2630/11/6/065003. |
McDaniel, Patrick et al., "Security and privacy challenges in the smart Grid," IEEE Security & Privacy, 2009, 7:75-77. |
Mingesz, Robert et al., "Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line," Physics Letters A, 2008, 372:978-984. doi: 10.1016/j.physleta.2007.67.086. |
Mingesz, Robert et al., "Unconditional security by the laws of classical physics," Metrology and Measurement Systems, 2013, 20:3-16; (open access): http://www.metrology.pg.gda.pl/full/2013/M&MS-2013-003.pdf. |
Mingesz, Robert et al., "What Kind of Noise Guarantees Security for the Kirchhoff-Loop-Johnson-Noise Key Exchange?" Fluct. Noise Lett., 2014, in press, arXiv:1405.1196. |
Saez, Yessica et al., "Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange," J. Comput. Electron., 2014, 13:271-277. |
Sauge, Sebastien et al., "Controlling an actively-quenched single photon detector with bright light," Optics Express, 2011, 19: 23590-23600. |
Scheuer, Jacob et al., "A Classical Key-Distribution System based on Johnson (like) noise-How Secure?" Phys. Lett. A, 2006, 359:737-740. |
Smulko, Janusz. "Performance Analysis of the "Intelligent" Kirchhoff-Law-Johnson-Noise Secure Key Exchange," Fluct. Noise Lett., 2014, 13(3):1-8. |
Wiechers, C. et al., "Aftergate attack on a quantum cryptosystem," New Journal of Physics, 2011, 13. doi: 10.1088/1367-2630/13/1/013043. |
Yuen, Horace P., "On the Foundations of Quantum Key Distribution-Reply to Renner and Beyond," 2011, manuscript: http://arxiv.org/pdf/1210.2804v2.pdf. |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11303447B2 (en) * | 2018-05-11 | 2022-04-12 | Syferex, LLC | Authentication system using paired, role reversing personal devices |
Also Published As
Publication number | Publication date |
---|---|
US20150263853A1 (en) | 2015-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wen et al. | FedDetect: A novel privacy-preserving federated learning framework for energy theft detection in smart grid | |
Lyu et al. | PPFA: Privacy preserving fog-enabled aggregation in smart grid | |
US9270448B2 (en) | Encryption key distribution system and method | |
Gonzalez et al. | Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters | |
Kamto et al. | Light-weight key distribution and management for advanced metering infrastructure | |
Peivandizadeh et al. | Compatible Authentication and Key Agreement Protocol for Low Power and Lossy Network in Iot Environment. | |
Kish et al. | Critical analysis of the Bennett–Riedel attack on secure cryptographic key distributions via the Kirchhoff-law–Johnson-noise scheme | |
Mingesz et al. | Unconditional security by the laws of classical physics | |
Ni et al. | EDAT: Efficient data aggregation without TTP for privacy-assured smart metering | |
Saez et al. | Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange | |
Kish et al. | Information networks secured by the laws of physics | |
Zhang et al. | PARK: A privacy-preserving aggregation scheme with adaptive key management for smart grid | |
Erkin | Private data aggregation with groups for smart grids in a dynamic setting using CRT | |
Finster et al. | Elderberry: A peer-to-peer, privacy-aware smart metering protocol | |
Abbasinezhad-Mood et al. | Design of an enhanced message authentication scheme for smart grid and its performance analysis on an ARM Cortex-M3 microcontroller | |
Melhem et al. | Alternating (AC) loop current attacks against the KLJN secure key exchange scheme | |
Zhang et al. | A key agreement scheme for smart homes using the secret mismatch problem | |
Wang et al. | Research on data security of multicast transmission based on certificateless multi-recipient signcryption in AMI | |
Sui et al. | RESA: A robust and efficient secure aggregation scheme in smart grids | |
Mlaih et al. | Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks | |
Hayouni et al. | A data aggregation security enhancing scheme in WSNs using homomorphic encryption | |
Dimitriou | Secure and scalable aggregation in the smart grid | |
Vijayanand et al. | Bit masking based secure data aggregation technique for Advanced Metering Infrastructure in Smart Grid system | |
Zhang et al. | Wireless body area network identity authentication protocol based on physical unclonable function | |
Li | Enabling Secure and Privacy Preserving Communications in Smart Grids |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: THE TEXAS A&M UNIVERSITY SYSTEM, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GONZALEZ, ELIAS ELICEO;REEL/FRAME:034788/0818 Effective date: 20150115 Owner name: THE TEXAS A&M UNIVERSITY SYSTEM, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KISH, LASZLO B.;BALOG, ROBERT S.;SIGNING DATES FROM 20141217 TO 20141218;REEL/FRAME:034788/0801 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240223 |