PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2019 | Vol. 26, nr 1 | 37--40
Tytuł artykułu

The problem of information leak due to parasitic loop currents and voltages in the KLJN secure key exchange scheme

Treść / Zawartość
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The Kirchhoff-law-Johnson-noise (KLJN) secure key exchange scheme offers unconditional security, however it can approach the perfect security limit only in the case when the practical system’s parameters approach the ideal behavior of its core circuitry. In the case of non-ideal features, non-zero information leak is present. The study of such leaks is important for a proper design of practical KLJN systems and their privacy amplifications in order to eliminate these problems.
Wydawca

Rocznik
Strony
37--40
Opis fizyczny
Bibliogr. 15 poz., rys., wykr.
Twórcy
  • Texas A&M University, Department of Electrical and Computer Engineering, College Station, TX 77843-3128, USA, yar111@tamu.edu
  • Texas A&M University, Department of Electrical and Computer Engineering, College Station, TX 77843-3128, USA, Laszlokish@tamu.edu
Bibliografia
  • [1] Kish, L.B. (2017). The Kish Cypher- The story of KLJN for unconditional security. World Scientific.
  • [2] Kish, L.B., Granqvist, C.G. (2014). On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator. Quant. Inform. Proc., 13, 2213-2219.
  • [3] Kish, L.B. (2006). Totally secure classical communication utilizing Johnson(-like) noise and Kirchoff’s law. Phys. Lett. A, 352, 178-182.
  • [4] Mingesz, R., Kish, L.B., Gingl, Z. (2008). Johnson(-like)-noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line. Phys. Lett. A, 372, 978-984.
  • [5] Kish, L.B., Abbott D., Granqvist C.G. (2013). Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme. PLoS ONE 8:e81810/1-e81810/15.
  • [6] Smulko, J. (2014). Performance analysis of the “intelligent” Kirchhoff’s-law-Johnson-noise secure key exchange. Fluct. Noise Lett., 13, 1450024.
  • [7] Gingl, Z., Mingesz R. (2014). Noise properties in the ideal Kirchhoff-law-Johnson-noise secure communication system. PLoS ONE 9:e96109/1-e96109/4.
  • [8] Mingesz, R., Vadai G., Gingl Z. (2014). What kind of noise guarantees security for the Kirchhoff-loop-Johnson-noise key exchange? Fluct. Noise Lett., 13, 1450021.
  • [9] Vadai, G., Gingl, Z., Mingesz, R. (2014). Generalized attack protection in the Kirchhoff-law-Johnson-noise secure key exchanger. IEEE Access, 4(1).
  • [10] Mingesz, R., Kish, L.B., Gingl Z., Granqvist, C.G., Wen H., Peper, F., Eubanks, T., Schmera, G. (2013). Unconditional security by the laws of classical physics. Metrol. Meas. Syst., 20(3), 16.
  • [11] Kish, L.B. (2013). Enhanced secure key exchange systems based on the Johnson-noise scheme. Metrol. Meas. Syst., 20(2), 191-204.
  • [12] Kish, L.B., Horvath, T. (2009). Notes on recent approaches concerning the Kirchhoff-law–Johnson-noise-based secure key exchange. Phys. Lett. A, 373, 2858-2868.
  • [13] Horvath, T., Kish, L.B., Scheuer, J. (2011). Effective privacy amplification for secure classical communications.EPL94:28002/1-28002/6.
  • [14] Chen, H.P., Kish, L.B., Granqvist, C.G. (2014). On the “Cracking” Scheme in the Paper “A Directional Coupler Attack Against the Kish Key Distribution System” by Gunn, Allison and Abbott. Metrol. Meas. Syst., 21(4), 389-400.
  • [15] Melhem, M.Y., Kish, L.B. (2018). A Static-Loop-Current Attack against the KLJN Secure Key Exhange System. arXiv:1806.05596
Uwagi
EN
1. Journal version of the paper presented at the 8th International Conference on Unsolved Problems of Noise (UPoN-2018, chaired by Janusz Smulko), Gdańsk, Poland, 9–13 July 2018. The meeting was dedicated to the 70th birthday of Michael F. Shlesinger.
PL
2. Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2019).
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.baztech-5f0d73e6-3a00-46a4-a7b3-6950b971bb8f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.