-
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors
Abstract: The Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system has been introduced as a simple, very low cost and efficient classical physical alternative to quantum key distribution systems. The ideal system uses only a few electronic components - identical resistor pairs, switches and interconnecting wires - to guarantee perfectly protected data transmission. We show that a generalized KLJN s… ▽ More
Submitted 2 June, 2015; originally announced June 2015.
Journal ref: Scientific Reports 5, 13653 (2015)
-
Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system
Abstract: A recent paper by Gunn-Allison-Abbott (GAA) [L.J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into… ▽ More
Submitted 4 November, 2014; originally announced November 2014.
Comments: Accepted for publication in Fluctuation and Noise Letters, on November 3, 2014
Journal ref: Fluct. Noise Lett. 14 (2015) 1550011
-
What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange?
Abstract: This article is a supplement to our recent one about the analysis of the noise properties in the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system [Gingl and Mingesz, PLOS ONE 9 (2014) e96109, doi:10.1371/journal.pone.0096109]. Here we use purely mathematical statistical derivations to prove that only normal distribution with special scaling can guarantee security. Our results are in a… ▽ More
Submitted 6 May, 2014; originally announced May 2014.
Journal ref: Fluctuation and Noise Letters 13:(3) E1450021 (2014)
-
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system
Abstract: In this paper we determine the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis. It has already been shown using physical laws that resistors and Johnson-like noise sources provide unconditional security. However real implementations use artificial noise generators, therefore it is a… ▽ More
Submitted 27 March, 2014; originally announced March 2014.
Journal ref: PLoS ONE (2014) 9(4): e96109
-
Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange
Abstract: We classify and analyze bit errors in the current measurement mode of the Kirchhoff-law-Johnson-noise (KLJN) key distribution. The error probability decays exponentially with increasing bit exchange period and fixed bandwidth, which is similar to the error probability decay in the voltage measurement mode. We also analyze the combination of voltage and current modes for error removal. In this comb… ▽ More
Submitted 13 February, 2014; v1 submitted 21 August, 2013; originally announced September 2013.
Comments: 9 pages, accepted for publication in Journal of Computational Electronics
-
Information theoretic security by the laws of classical physics
Abstract: It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely b… ▽ More
Submitted 16 June, 2012; v1 submitted 11 June, 2012; originally announced June 2012.
Comments: Featured in MIT Technology Review http://www.technologyreview.com/view/428202/quantum-cryptography-outperformed-by-classical/ ; Plenary talk at the 5th IEEE Workshop on Soft Computing Applications, August 22-24, 2012, (SOFA 2012). Typos corrected
Journal ref: in: V.E. Balas et al. (Eds.): Soft Computing Applications, AISC 195, pp. 11-25. (Springer, 2013)
-
Noise-based information processing: Noise-based logic and computing: what do we have so far?
Abstract: We briefly introduce noise-based logic. After describing the main motivations we outline classical, instantaneous (squeezed and non-squeezed), continuum, spike and random-telegraph-signal based schemes with applications such as circuits that emulate the brain functioning and string verification via a slow communication channel.
Submitted 10 February, 2011; originally announced February 2011.
Comments: Invited talk at the 21st International Conference on Noise and Fluctuations, Toronto, Canada, June 12-16, 2011
-
Ultimate crack and lack of any security in the statistical key exchange protocol with random signals and feedback
Abstract: We deterministically crack the secure, statistical key exchange protocol based on feedback proposed by Pao-Lo Liu [ J. Lightwave Techology 27 (2009) pp. 5230-34]. The crack is ultimate and absolute because it works under idealized conditions, and produces much higher data visibility for the eavesdropper than the protocol provides for Alice and Bob. Even with the most idealistic driving noise spect… ▽ More
Submitted 30 December, 2010; v1 submitted 31 October, 2010; originally announced November 2010.
Comments: We have to withdraw our earlier claim because errors have been identified in the calculation and computer simulations. However, we do believe that the protocol can be cracked in a similar fashion that needs only a few measurement, no statistics. Thus we hope that this new family of attacks can be developed into some efficient tool. However, the "how" is still an open question thus the Liu-protocol should be considered secure until such solution is found
-
Noise-based deterministic logic and computing: a brief survey
Abstract: A short survey is provided about our recent explorations of the young topic of noise-based logic. After outlining the motivation behind noise-based computation schemes, we present a short summary of our ongoing efforts in the introduction, development and design of several noise-based deterministic multivalued logic schemes and elements. In particular, we describe classical, instantaneous, continu… ▽ More
Submitted 29 July, 2010; originally announced July 2010.
Comments: Invited paper
Journal ref: International Journal of Unconventional Computing 7 (2011 February) 101-113
-
Towards brain-inspired computing
Abstract: We present introductory considerations and analysis toward computing applications based on the recently introduced deterministic logic scheme with random spike (pulse) trains [Phys. Lett. A 373 (2009) 2338-2342]. Also, in considering the questions, "Why random?" and "Why pulses?", we show that the random pulse based scheme provides the advantages of realizing multivalued deterministic logic. Pulse… ▽ More
Submitted 20 March, 2010; originally announced March 2010.
Comments: 10 pages
Journal ref: Fluctuation and Noise Letters 9 (2010) pp. 403-412