scispace - formally typeset
Open AccessJournal ArticleDOI

Comments On "A New Transient Attack On The Kish Key Distribution System"

Reads0
Chats0
TLDR
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system.
Abstract
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These deficiencies are clarified in our present paper, wherein we also emphasize that a new version of the KLJN system is immune against all existing attacks, including the one by GAA.

read more

Citations
More filters
Journal ArticleDOI

Current Injection Attack against the KLJN Secure Key Exchange

TL;DR: Two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the Kirchhoff-law-Johnson-noise system's unconditional security.
Journal ArticleDOI

A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System

TL;DR: This study investigates the DC ground loop situation when no AC or EMI effects are present and investigates the usual current/voltage comparison-based defense method that exposes active attacks or parasitic features does not function here.
Posted Content

Current Injection Attack Against the KLJN Secure Key Exchange

TL;DR: In this paper, two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system's unconditional security.
Posted ContentDOI

Generalized DC loop current attack against the KLJN secure key exchange scheme.

TL;DR: A new attack against the Kirchhoff Law Johnson Noise (KLJN) secure key distribution system is studied with unknown parasitic DC voltage sources at both Alices and Bobs ends, utilizing the current generated by the parasitic dc voltage sources.
Journal ArticleDOI

Comments on the “Generalized” KJLN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security

TL;DR: In this article, the authors investigated the power flow and thermal equilibrium issues of the VMG-KLJN system with 4 arbitrary resistors and introduced a new KLJN protocol that allows the arbitrary choice of 3 resistors from the 4, while it still operates with zero power flow during the exchange of single bits by utilizing a specific value of the 4th resistor and a binary temperature set for the exchanged (HL and LH) bit values.
References
More filters
Book

Theory of elasticity

TL;DR: The theory of the slipline field is used in this article to solve the problem of stable and non-stressed problems in plane strains in a plane-strain scenario.
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book

Electrodynamics of continuous media

TL;DR: In this article, the propagation of electromagnetic waves and X-ray diffraction of X rays in crystals are discussed. But they do not consider the effects of superconductivity on superconducting conductors.
Journal ArticleDOI

The classical theory of fields

TL;DR: The principle of relativity Relativistic mechanics Electromagnetic fields electromagnetic waves as discussed by the authors The propagation of light The field of moving charges Radiation of electromagnetic waves Particle in a gravitational field The gravitational field equation
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.