Comments On "A New Transient Attack On The Kish Key Distribution System"
Reads0
Chats0
TLDR
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system.Abstract:
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These deficiencies are clarified in our present paper, wherein we also emphasize that a new version of the KLJN system is immune against all existing attacks, including the one by GAA.read more
Citations
More filters
Journal ArticleDOI
Current Injection Attack against the KLJN Secure Key Exchange
TL;DR: Two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the Kirchhoff-law-Johnson-noise system's unconditional security.
Journal ArticleDOI
A Static-loop-current Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System
Mutaz Y. Melhem,Laszlo B. Kish +1 more
TL;DR: This study investigates the DC ground loop situation when no AC or EMI effects are present and investigates the usual current/voltage comparison-based defense method that exposes active attacks or parasitic features does not function here.
Posted Content
Current Injection Attack Against the KLJN Secure Key Exchange
TL;DR: In this paper, two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system's unconditional security.
Posted ContentDOI
Generalized DC loop current attack against the KLJN secure key exchange scheme.
Mutaz Y. Melhem,Laszlo B. Kish +1 more
TL;DR: A new attack against the Kirchhoff Law Johnson Noise (KLJN) secure key distribution system is studied with unknown parasitic DC voltage sources at both Alices and Bobs ends, utilizing the current generated by the parasitic dc voltage sources.
Journal ArticleDOI
Comments on the “Generalized” KJLN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security
TL;DR: In this article, the authors investigated the power flow and thermal equilibrium issues of the VMG-KLJN system with 4 arbitrary resistors and introduced a new KLJN protocol that allows the arbitrary choice of 3 resistors from the 4, while it still operates with zero power flow during the exchange of single bits by utilizing a specific value of the 4th resistor and a binary temperature set for the exchanged (HL and LH) bit values.
References
More filters
Book
Theory of elasticity
TL;DR: The theory of the slipline field is used in this article to solve the problem of stable and non-stressed problems in plane strains in a plane-strain scenario.
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book
Electrodynamics of continuous media
TL;DR: In this article, the propagation of electromagnetic waves and X-ray diffraction of X rays in crystals are discussed. But they do not consider the effects of superconductivity on superconducting conductors.
Journal ArticleDOI
The classical theory of fields
TL;DR: The principle of relativity Relativistic mechanics Electromagnetic fields electromagnetic waves as discussed by the authors The propagation of light The field of moving charges Radiation of electromagnetic waves Particle in a gravitational field The gravitational field equation
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Related Papers (4)
Elimination of a Second-Law Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System
Man in the Middle and Current Injection Attacks Against the KLJN Key Exchanger Compromised by DC Sources
Mutaz Y. Melhem,Laszlo B. Kish +1 more