Skip to main content

Showing 1–10 of 10 results for author: Gingl, Z

Searching in archive cs. Search in all archives.
.
  1. Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors

    Authors: Gergely Vadai, Robert Mingesz, Zoltan Gingl

    Abstract: The Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system has been introduced as a simple, very low cost and efficient classical physical alternative to quantum key distribution systems. The ideal system uses only a few electronic components - identical resistor pairs, switches and interconnecting wires - to guarantee perfectly protected data transmission. We show that a generalized KLJN s… ▽ More

    Submitted 2 June, 2015; originally announced June 2015.

    Journal ref: Scientific Reports 5, 13653 (2015)

  2. Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system

    Authors: Laszlo B. Kish, Zoltan Gingl, Robert Mingesz, Gergely Vadai, Janusz Smulko, Claes-Goran Granqvist

    Abstract: A recent paper by Gunn-Allison-Abbott (GAA) [L.J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into… ▽ More

    Submitted 4 November, 2014; originally announced November 2014.

    Comments: Accepted for publication in Fluctuation and Noise Letters, on November 3, 2014

    Journal ref: Fluct. Noise Lett. 14 (2015) 1550011

  3. What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange?

    Authors: Robert Mingesz, Gergely Vadai, Zoltan Gingl

    Abstract: This article is a supplement to our recent one about the analysis of the noise properties in the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system [Gingl and Mingesz, PLOS ONE 9 (2014) e96109, doi:10.1371/journal.pone.0096109]. Here we use purely mathematical statistical derivations to prove that only normal distribution with special scaling can guarantee security. Our results are in a… ▽ More

    Submitted 6 May, 2014; originally announced May 2014.

    Journal ref: Fluctuation and Noise Letters 13:(3) E1450021 (2014)

  4. Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system

    Authors: Zoltan Gingl, Robert Mingesz

    Abstract: In this paper we determine the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis. It has already been shown using physical laws that resistors and Johnson-like noise sources provide unconditional security. However real implementations use artificial noise generators, therefore it is a… ▽ More

    Submitted 27 March, 2014; originally announced March 2014.

    Journal ref: PLoS ONE (2014) 9(4): e96109

  5. Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange

    Authors: Yessica Saez, Laszlo B. Kish, Robert Mingesz, Zoltan Gingl, Claes G. Granqvist

    Abstract: We classify and analyze bit errors in the current measurement mode of the Kirchhoff-law-Johnson-noise (KLJN) key distribution. The error probability decays exponentially with increasing bit exchange period and fixed bandwidth, which is similar to the error probability decay in the voltage measurement mode. We also analyze the combination of voltage and current modes for error removal. In this comb… ▽ More

    Submitted 13 February, 2014; v1 submitted 21 August, 2013; originally announced September 2013.

    Comments: 9 pages, accepted for publication in Journal of Computational Electronics

  6. arXiv:1206.2534  [pdf

    cs.ET physics.class-ph

    Information theoretic security by the laws of classical physics

    Authors: R. Mingesz, L. B. Kish, Z. Gingl, C. G. Granqvist, H. Wen, F. Peper, T. Eubank, G. Schmera

    Abstract: It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely b… ▽ More

    Submitted 16 June, 2012; v1 submitted 11 June, 2012; originally announced June 2012.

    Comments: Featured in MIT Technology Review http://www.technologyreview.com/view/428202/quantum-cryptography-outperformed-by-classical/ ; Plenary talk at the 5th IEEE Workshop on Soft Computing Applications, August 22-24, 2012, (SOFA 2012). Typos corrected

    Journal ref: in: V.E. Balas et al. (Eds.): Soft Computing Applications, AISC 195, pp. 11-25. (Springer, 2013)

  7. arXiv:1102.2256  [pdf

    cs.ET

    Noise-based information processing: Noise-based logic and computing: what do we have so far?

    Authors: Laszlo B. Kish, Sunil Khatri, Sergey Bezrukov, Ferdinand Peper, Zoltan Gingl, Tamas Horvath

    Abstract: We briefly introduce noise-based logic. After describing the main motivations we outline classical, instantaneous (squeezed and non-squeezed), continuum, spike and random-telegraph-signal based schemes with applications such as circuits that emulate the brain functioning and string verification via a slow communication channel.

    Submitted 10 February, 2011; originally announced February 2011.

    Comments: Invited talk at the 21st International Conference on Noise and Fluctuations, Toronto, Canada, June 12-16, 2011

  8. arXiv:1011.0168   

    quant-ph cs.CR

    Ultimate crack and lack of any security in the statistical key exchange protocol with random signals and feedback

    Authors: Zoltan Gingl, Laszlo B. Kish

    Abstract: We deterministically crack the secure, statistical key exchange protocol based on feedback proposed by Pao-Lo Liu [ J. Lightwave Techology 27 (2009) pp. 5230-34]. The crack is ultimate and absolute because it works under idealized conditions, and produces much higher data visibility for the eavesdropper than the protocol provides for Alice and Bob. Even with the most idealistic driving noise spect… ▽ More

    Submitted 30 December, 2010; v1 submitted 31 October, 2010; originally announced November 2010.

    Comments: We have to withdraw our earlier claim because errors have been identified in the calculation and computer simulations. However, we do believe that the protocol can be cracked in a similar fashion that needs only a few measurement, no statistics. Thus we hope that this new family of attacks can be developed into some efficient tool. However, the "how" is still an open question thus the Liu-protocol should be considered secure until such solution is found

  9. arXiv:1007.5282  [pdf

    physics.data-an cs.IT physics.gen-ph

    Noise-based deterministic logic and computing: a brief survey

    Authors: Laszlo B. Kish, Sunil P. Khatri, Sergey M. Bezrukov, Ferdinand Peper, Zoltan Gingl, Tamas Horvath

    Abstract: A short survey is provided about our recent explorations of the young topic of noise-based logic. After outlining the motivation behind noise-based computation schemes, we present a short summary of our ongoing efforts in the introduction, development and design of several noise-based deterministic multivalued logic schemes and elements. In particular, we describe classical, instantaneous, continu… ▽ More

    Submitted 29 July, 2010; originally announced July 2010.

    Comments: Invited paper

    Journal ref: International Journal of Unconventional Computing 7 (2011 February) 101-113

  10. arXiv:1003.3932  [pdf

    physics.gen-ph cs.OH

    Towards brain-inspired computing

    Authors: Zoltan Gingl, Sunil Khatri, Laszlo Kish

    Abstract: We present introductory considerations and analysis toward computing applications based on the recently introduced deterministic logic scheme with random spike (pulse) trains [Phys. Lett. A 373 (2009) 2338-2342]. Also, in considering the questions, "Why random?" and "Why pulses?", we show that the random pulse based scheme provides the advantages of realizing multivalued deterministic logic. Pulse… ▽ More

    Submitted 20 March, 2010; originally announced March 2010.

    Comments: 10 pages

    Journal ref: Fluctuation and Noise Letters 9 (2010) pp. 403-412