Johnson(-Iike)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line

被引:70
作者
Mingesz, Robert [1 ]
Gingl, Zoltan [1 ]
Kish, Laszlo B. [2 ]
机构
[1] Univ Szeged, Dept Expt Phys, H-6720 Szeged, Hungary
[2] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
基金
匈牙利科学研究基金会;
关键词
D O I
10.1016/j.physleta.2007.07.086
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A pair of Kirchhoff-loop-Johnson(-Iike)-Noise communicators, which is able to work over variable ranges, was designed and built. Tests have been carried out on a model-line performance characteristics were obtained for ranges beyond the ranges of any known direct quantum communication channel and they indicate unrivalled signal fidelity and security performance of the exchanged raw key bits. This simple device has sin-le-wire secure key generation and sharing rates of 0.1, 1, 10, and 100 bit/second for corresponding copper wire diameters/ranges of 21 mm/2000 km, 7 mm/200 km, 2.3 mm/20 km, and 0.7 mm/2 km, respectively and it performs with 0.02% raw-bit error rate (99.98% fidelity). The raw-bit security of this practical system significantly outperforms raw-bit quantum security. Current injection breaking tests show zero bit eavesdropping ability without triggering the alarm signal, therefore no multiple measurements are needed to build an error statistics to detect the eavesdropping as in quantum communication. Wire resistance based breaking tests of Bergou-Scheuer-Yariv type give an upper limit of eavesdropped raw-bit ratio of 0.19% and this limit is inversely proportional to the sixth power of cable diameter. Hao's breaking method yields zero (below measurement resolution) eavesdropping information. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:978 / 984
页数:7
相关论文
共 14 条
[1]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[2]  
BERZANSKIS A, 2005, APPL QUANTUM CRYPTOG
[3]  
Cho A, 2005, SCIENCE, V309, P2148
[4]  
Hao F., 2006, IEE Proc. Inf. Secur., V153, P141, DOI DOI 10.1049/IP-IFS:20060068
[5]   Response to Feng Hao's paper "Kish's key exchange scheme is insecure"' [J].
Kish, L. B. .
FLUCTUATION AND NOISE LETTERS, 2006, 6 (04) :C37-C41
[6]   Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise [J].
Kish, Laszlo B. ;
Mingesz, Robert .
FLUCTUATION AND NOISE LETTERS, 2006, 6 (02) :C9-C21
[7]   Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law [J].
Kish, LB .
PHYSICS LETTERS A, 2006, 352 (03) :178-182
[8]   Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security [J].
Kish, LB .
FLUCTUATION AND NOISE LETTERS, 2006, 6 (01) :L57-L63
[9]  
KISH LB, PHYSICS0610014
[10]  
KISH LB, 2007, P 4 SPIE S FLUCT NOI, V6600, P66003