Misplaced Pages

KLJN Secure Key Exchange

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Cryptographic key exchange methodology
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
This article is an orphan, as no other articles link to it. Please introduce links to this page from related articles; try the Find link tool for suggestions. (September 2023)
The topic of this article may not meet Misplaced Pages's general notability guideline. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be merged, redirected, or deleted.
Find sources: "KLJN Secure Key Exchange" – news · newspapers · books · scholar · JSTOR (December 2019) (Learn how and when to remove this message)
(Learn how and when to remove this message)

Random-resistor-random-temperature Kirchhoff-law-Johnson-noise key exchange, also known as RRRT-KLJN or simply KLJN, is an approach for distributing cryptographic keys between two parties that claims to offer unconditional security. This claim, which has been contested, is significant, as the only other key exchange approach claiming to offer unconditional security is Quantum key distribution.

The KLJN secure key exchange scheme was proposed in 2005 by Laszlo Kish and Granqvist. It has the advantage over quantum key distribution in that it can be performed over a metallic wire with just four resistors, two noise generators, and four voltage measuring devices---equipment that is low-priced and can be readily manufactured. It has the disadvantage that several attacks against KLJN have been identified which must be defended against.

"Given that the amount of effort and funding that goes into Quantum Cryptography is substantial (some even mock it as a distraction from the ultimate prize which is quantum computing), it seems to me that the fact that classic thermodynamic resources allow for similar inherent security should give one pause," wrote Henning Dekant, the founder of the Quantum Computing Meetup, in April 2013.

The Cybersecurity Curricula 2017, a joint project of the Association for Computing Machinery, the IEEE Computer Society, the Association for Information Systems, and the International Federation for Information Processing Technical Committee on Information Security Education (IFIP WG 11.8) recommends teaching the KLJN Scheme as part of teaching "Advanced concepts" in its knowledge unit on cryptography.

See Also/Further Reading

References

  1. Kish, Laszlo B.; Granqvist, Claes G. (18 January 2014). "On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator". Quantum Information Processing. 13 (10). Springer Science+Business Media: 2213–2219. arXiv:1309.4112. Bibcode:2014QuIP...13.2213K. doi:10.1007/s11128-014-0729-7. eISSN 1573-1332. ISSN 1570-0755. S2CID 27918.
  2. "Quantum Cryptography Made Obsolete?". 2 April 2013.
  3. Burley, Diana L.; Bishop, Matt; Buck, Scott; Ekstrom, Joseph J.; Futcher, Lynn; et al. (31 December 2017). Cybersecurity Curricula 2017 - Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. ACM, IEEE-CS, AIS SIGSEC, and IFIP WG. p. 25. doi:10.1145/3184594. ISBN 978-1-4503-5278-9. Advanced recent developments: fully homomorphic encryption, obfuscation, quantum cryptography, and KLJN scheme.
Category: