We show how weak non-linearities can be used in a device-independent quantum key distribution (QKD) protocol using generalized two-mode Schrödinger cat states. The QKD protocol is therefore shown to be secure against collective attacks and for some coherent attacks. We derive analytical formulas for the optimal values of the Bell parameter, the quantum bit error rate, and the deviceindependent secret key rate in the noiseless lossy bosonic channel. Additionally, we give the filters and measurements which achieve these optimal values. We find that over any distance in this channel the quantum bit error rate is identically zero, in principle, and the states in the protocol are always able to violate a Bell inequality. The protocol is found to be superior in some regimes to a device-independent QKD protocol based on polarization entangled states in a depolarizing channel. Finally, we propose an implementation for the optimal filters and measurements.The last two decades have seen a rise in the number and quality of quantum key distribution (QKD) protocols [1][2][3]. Some of these have been developed into successful commercial products currently deployed in telecommunications [4, 5]. These systems are designed on the principle of provably secure communication, in which, under certain assumptions, the security is guaranteed by the laws of physics, not the assumed difficulty of performing certain mathematical operations as in classical cryptography protocols. Unfortunately, practical implementations of QKD protocols have in many cases fallen short of their desired goal; due to rate ceilings, current QKD systems are used only to generate keys for use with standard cryptographic protocols. Additionally, in recent years both research and commercially developed QKD systems have been successfully hacked using side-channel information [6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21].In response to these limitations, there has been an effort to develop QKD protocols which are immune to the practical limitations of the devices in which they are implemented. These protocols are called deviceindependent QKD (diQKD) protocols and are based on violation of Bell and EPR-steering inequalities [22][23][24][25][26]. If a particular physical implementation of the deviceindependent QKD protocol is able to violate a Bell inequality, then the resulting key can be considered to be secure, regardless of the details of the physical implementation. Device-independent QKD protocols have been shown to be secure under collective attacks and in some instances are secure under coherent attacks [23,24,27,28].Though device-independence provides a way around the security limitations of previous QKD protocols, it further restricts the secret key generation rate which may be obtained. As a result, there is a growing interest in trying to implement diQKD in diverse systems in an attempt to increase the secret key generation rate. With that in mind, in this manuscript we present an alternative implementation of diQKD which makes use of highl...