@ARTICLE{Kish_Laszlo_B._Random-Resistor-Random-Temperature_2016,
author={Kish, Laszlo B. and Granqvist, Claes G.},
volume={vol. 23},
number={No 1},
journal={Metrology and Measurement Systems},
pages={3-11},
howpublished={online},
year={2016},
publisher={Polish Academy of Sciences Committee on Metrology and Scientific Instrumentation},
abstract={We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.},
type={ArtykuĹ‚y / Articles},
title={Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange},
URL={http://rhis.czasopisma.pan.pl/Content/90375/PDF/10.1515-2016-0007-paper_01.pdf},
doi={10.1515/mms-2016-0007},
keywords={KLJN key exchange, information theoretic security, unconditional security},
}