Recognition: unknown
Binary Classifier Wire-Resistance Attack on KLJN: Impact of Narrowing the Resistor Gap
Pith reviewed 2026-05-09 14:24 UTC · model grok-4.3
The pith
Narrowing the resistor gap in KLJN key exchange reduces a binary classifier wire-resistance attack's success probability toward the ideal limit of 0.5.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
As the low resistor value approaches the high one at the same cable resistance, the HL and LH point clouds in the classifier plane increasingly overlap, and the measured eavesdropper success probability p drops close to 0.7, approaching the ideal limit p = 0.5 as RL approaches RH.
What carries the argument
The two-dimensional classifier plane whose axes are the mean-square noise voltages measured at Alice's and Bob's ends, with Eve's success quantified by a sign-of-difference decision rule on those voltages.
If this is right
- With strongly asymmetric resistors such as 4 kOhm and 10 kOhm the HL and LH clouds remain fully separable, allowing the attack to recover nearly all bits.
- Reducing resistor asymmetry improves security specifically against this sign-based classifier attack.
- Increasing wire resistance can decrease the information leak to the classifier, unlike its effect in the Bergou-Scheuer-Yariv attack.
- The overlap trend implies that equal resistors would eliminate this particular leak even with nonzero cable resistance.
Where Pith is reading between the lines
- Designers may need to balance resistor closeness against the requirement that thermal noise levels remain distinguishable for legitimate parties.
- Other potential attacks on KLJN should be rechecked at small resistor gaps to see whether they also weaken.
- The counterintuitive wire-resistance dependence suggests that cable parameters could be tuned as an additional security knob under classifier-style threats.
Load-bearing premise
Time-domain simulations of the non-ideal KLJN loop with finite cable resistance accurately capture the statistical behavior of real thermal noise and wire resistance.
What would settle it
A physical KLJN experiment using RL = 9 kOhm and RH = 10 kOhm that measures whether the actual bit-recovery probability lies near 0.7 or significantly closer to 0.5.
read the original abstract
It is shown that narrowing the difference between the high and low resistor values in the Kirchhoff Law-Johnson Noise (KLJN) key exchange strongly affects security against a recently introduced binary classifier-based wire resistance attack. Using time domain simulations of a non-ideal KLJN loop with finite cable resistance, we generate large ensembles of secure (HL/LH) bits and evaluate the mean-square noise voltages at Alice's and Bob's ends. For each bit, these mean-square values form a point in a two-dimensional classifier plane, where the separation between the HL and LH point clouds characterizes the information available to an eavesdropper (Eve). We quantify Eve's success probability p by a simple decision rule based on the sign of the difference between the measured mean-square voltages. For strongly asymmetric resistors (for example RL = 4 kOhm and RH = 10 kOhm) and realistic wire resistances, the HL and LH clouds are fully separable and Eve's p approaches 1, which confirms that the classifier attack can practically recover all secure bits. As the low resistor value approaches the high one (for example RL = 9 kOhm and RH = 10 kOhm) at the same cable resistance, the HL and LH clouds increasingly overlap, and the measured p drops close to 0.7, approaching the ideal limit p = 0.5 as RL approaches RH. A surprising phenomenon is that, in this classifier-based scenario, increasing the wire resistance can decrease the information leak. This counterintuitive effect is strikingly the opposite of the behavior in the classical Bergou-Scheuer-Yariv wire resistance attack, where the mean-square voltages at the two ends of the wire are simply compared.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript uses large ensembles of time-domain simulations of a non-ideal KLJN loop with finite cable resistance to generate HL and LH mean-square voltage point clouds. It applies a sign-of-difference decision rule to quantify Eve's success probability p under a binary classifier wire-resistance attack. The central result is that narrowing the RL–RH gap increases cloud overlap and drives p from near 1 (e.g., RL = 4 kΩ, RH = 10 kΩ) toward 0.5 (e.g., p ≈ 0.7 at RL = 9 kΩ, RH = 10 kΩ), while also reporting a counter-intuitive decrease in leakage with increasing wire resistance Rw, opposite to the classical Bergou–Scheuer–Yariv attack.
Significance. If the reported trends are reliable, the work identifies a concrete parameter regime (closer RL and RH values) that can mitigate this particular classifier attack in practical KLJN implementations. The direct, simulation-driven construction of the two-dimensional point clouds and the explicit sign-of-difference rule constitute a clear methodological strength, allowing quantitative p values to be extracted without intermediate fitting.
major comments (2)
- [Simulation methodology] Simulation methodology section: the time-domain integration used to produce the voltage traces and mean-square values is not accompanied by any specification of sampling rate relative to the Johnson–Nyquist bandwidth, the generation of correlated thermal noise sources at both ends, or explicit inclusion of the cable's own thermal noise and RC filtering. These omissions are load-bearing because the quantitative claims (p ≈ 0.7 at RL = 9 kΩ / RH = 10 kΩ and the approach to p = 0.5) rest entirely on the fidelity of these statistics.
- [Results] Results section (examples with RL = 9 kΩ, RH = 10 kΩ): the reported success probabilities p are given without error bars, bootstrap estimates, or the exact ensemble sizes used to populate the HL/LH clouds. This prevents assessment of whether the observed overlap and the drop from p ≈ 1 to p ≈ 0.7 are statistically robust.
minor comments (2)
- [Abstract] Abstract: the statement 'the measured p drops close to 0.7' should specify the wire resistance Rw at which this value was obtained, and the decision rule should be stated explicitly (e.g., sign of which mean-square voltage minus the other).
- [Simulation methodology] The manuscript would benefit from a brief statement of how the continuous-time thermal noise spectra are discretized and whether any anti-aliasing or bandwidth limiting was applied before computing the mean-square voltages.
Simulated Author's Rebuttal
We thank the referee for the careful reading and constructive suggestions. The comments highlight important aspects of reproducibility and statistical rigor that we will address in a revised version of the manuscript.
read point-by-point responses
-
Referee: [Simulation methodology] Simulation methodology section: the time-domain integration used to produce the voltage traces and mean-square values is not accompanied by any specification of sampling rate relative to the Johnson–Nyquist bandwidth, the generation of correlated thermal noise sources at both ends, or explicit inclusion of the cable's own thermal noise and RC filtering. These omissions are load-bearing because the quantitative claims (p ≈ 0.7 at RL = 9 kΩ / RH = 10 kΩ and the approach to p = 0.5) rest entirely on the fidelity of these statistics.
Authors: We agree that these methodological details are essential for full reproducibility and for confirming that the reported mean-square voltage statistics are physically faithful. In the revised manuscript we will add an explicit subsection describing: (i) the sampling rate (set to 20× the Johnson–Nyquist bandwidth of the highest-frequency component), (ii) the generation of independent thermal noise sources at Alice’s and Bob’s resistors together with the appropriate cross-correlation induced by the finite wire resistance, and (iii) the inclusion of the cable’s own Johnson noise and first-order RC filtering. These additions will be accompanied by a brief validation that the simulated power spectral densities match the analytic expectations for the non-ideal KLJN loop. revision: yes
-
Referee: [Results] Results section (examples with RL = 9 kΩ, RH = 10 kΩ): the reported success probabilities p are given without error bars, bootstrap estimates, or the exact ensemble sizes used to populate the HL/LH clouds. This prevents assessment of whether the observed overlap and the drop from p ≈ 1 to p ≈ 0.7 are statistically robust.
Authors: We acknowledge that quantitative error estimates are required to substantiate the claimed trends. The original simulations used ensembles of 10^5 independent HL and LH realizations for each resistor pair; we will state this number explicitly. In the revision we will also report bootstrap-derived 95 % confidence intervals on all p values (obtained from 2000 resamples) and will confirm that the reduction from p ≈ 1 to p ≈ 0.7 remains statistically significant (standard error < 0.01) even after accounting for finite-sample fluctuations. revision: yes
Circularity Check
No significant circularity; results are direct simulation outputs
full rationale
The paper's central results on HL/LH cloud overlap and Eve's success probability p are obtained by generating voltage traces via time-domain simulations of the non-ideal KLJN loop, computing mean-square values at each end, and applying the sign-of-difference decision rule to the resulting point clouds. These p values (e.g., p approaching 1 for RL=4kΩ/RH=10kΩ and p≈0.7 for RL=9kΩ/RH=10kΩ) are measured outcomes of the simulated ensembles rather than fitted parameters, self-defined quantities, or predictions derived from prior self-citations. No load-bearing step in the derivation chain reduces by construction to its own inputs; the work is self-contained against the stated simulation model.
Axiom & Free-Parameter Ledger
free parameters (2)
- RL and RH resistor pair
- wire resistance Rw
axioms (2)
- standard math Thermal noise voltages obey Johnson-Nyquist statistics with mean-square voltage proportional to resistance and temperature.
- domain assumption The KLJN loop can be modeled as a lumped circuit with series wire resistance.
Reference graph
Works this paper leans on
-
[1]
Simulations of narrowing the resistance gap In preliminary simulations, generating the noise at Alice and Bob from disjoint segments of the same random-number stream led to a small but systematic non‑zero average power flow between the two sides in the secure states. This behavior contradicts the zero‑power‑flow condition in ideal KLJN and indicates that ...
-
[2]
L.B. Kish, Enhanced secure key exchange systems based on the Johnson-noise scheme, Metrol. Meas. Syst. 20 (2013) 191-204. [51] L.J. Gunn, A. Allison and D. Abbott, A new transient attack on the Kish key distribution system, IEEE Access 3 (2015) 1640-1648. [52] G. Vadai, Z. Gingl and R. Mingesz, Generalized attack protection in the Kirchhoff-law-Johnson-no...
-
[3]
Kish's key exchange scheme is insecure
L.B. Kish and O. Saidi, Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives, Fluct. Noise Lett. 8 (2008) L95–L98. [77] L.B. Kish, K. Entesari, C.-G. Granqvist and C. Kwan, Unconditionally secure credit/debit card chip scheme and physical unclonable function, Fluct. Noise Lett. 16 (2017)...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.