Details

Title

Comments on “A New Transient Attack on the Kish Key Distribution System”

Journal title

Metrology and Measurement Systems

Yearbook

2016

Numer

No 3

Publication authors

Divisions of PAS

Nauki Techniczne

Publisher

Polish Academy of Sciences Committee on Metrology and Scientific Instrumentation

Date

2016

Identifier

ISSN 0860-8229

References

Saez (2014), Bit errors in the Kirchhoff - law - Johnson - noise secure key exchange of Modern Physics : Conference Series, International Journal, 33, 1460367. ; Chen (2015), Cable capacitance attack against the KLJN secure key exchange, Information, 6, 719, doi.org/10.3390/info6040719 ; Kish (2006), Response to Scheuer - Yariv : A classical key - distribution system based on Johnson like ) noise - how secure A, Physics Letters, 359. ; Cho (2005), Simple noise may stymie spies without quantum weirdness, Science, 309. ; Kish (2015), Analysis of an attenuator artifact in an experimental attack by Gunn Abbott against the Kirchhoff - law - Johnson - noise KLJN secure key exchange system Fluctuation and Noise, Letters, 14, 1550011. ; Liu (2009), A new look at the classical key exchange system based on amplified Johnson noise A, Physics Letters, 373. ; Kish (2016), Random - resistor - random - temperature KLJN key exchange Metrol Meas, Syst, 23, 3. ; Gilbert (2002), Secrecy , computational loads and rates in practical quantum cryptography, Algorithmica, 34, 314, doi.org/10.1007/s00453-002-0977-2 ; Kish (2014), Elimination of a second - law - attack , and all cable - resistance - based attacks , in the Kirchhoff - law - Johnson - noise KLJN secure key exchange system, Entropy, 16, 5223, doi.org/10.3390/e16105223 ; Mingesz (2008), Johnson - like ) noise Kirchhoff - loop based secure classical communicator characteristics , for ranges of two to two thousand kilometers , via model - line A, Physics Letters, 372. ; Kish (2006), Totally secure classical networks with multipoint telecloning ( teleporation ) of classical bits through loops with Johnson - like noise Fluctuation and Noise, Letters, 6. ; Kish (2006), Response to Feng Hao s paper Kish s key exchange scheme is insecure Fluctuation and Noise, Letters, 6. ; Horváth (2011), Effective privacy amplification for secure classical communications EPL ), Europhysics Letters, 94. ; Scheuer (2006), A classical key - distribution system based on Johnson like ) noise - how secure A, Physics Letters, 359. ; Kish (2006), Totally secure classical communication utilizing Johnson - like ) noise and Kirchoff s law A, Physics Letters, 352. ; Shannon (1949), Communication theory of secrecy systems Bell Systems Technical, Journal, 28, 656. ; Hao (2006), Kish s key exchange scheme is insecure IEE Proceedings, Information Security, 153. ; Smulko (2014), Performance analysis of the intelligent Kirchhoff - law - Johnson - noise secure key exchange Fluctuation and Noise, Letters, 13, 1450024. ; Kish (2009), Notes on recent approaches concerning the Kirchhoff - law - Johnson - noisebased secure key exchange A, Physics Letters, 373. ; Chen (2014), On the cracking scheme in the paper A directional coupler attack against the Kish key distribution system by Gunn Allison and Abbott Metrol Meas, Syst, 21, 389. ; Wyner (1975), The wire - tap channel Bell Systems Technology, Journal, 54, 1355. ; Mingesz (2013), Experimental study of the Kirchhoff - law - Johnson - noise secure key exchange of Modern Physics : Conference, International Journal, 33, 1460365, doi.org/10.1142/S2010194514603652 ; Kish (2006), Protection against the man - in - the - middle - attack for the Kirchhoff - loop - like ) - noise cipher and expansion by voltage - based security Fluctuation and Noise, Letters, 6. ; Kish (2013), Enhanced secure key exchange systems based on the Johnson - noise scheme Metrol Meas, Syst, 20, 191. ; Chen (2016), Current injection attack against the KLJN secure key exchange , accepted for publication Metrol Meas, Syst, 23, 173. ; Kish (2014), On the security of the Kirchhoff - law - Johnson - noise KLJN communicator Processing, Quantum Information, 13, 2213, doi.org/10.1007/s11128-014-0729-7 ; Liu (2009), A key agreement protocol using band - limited random signals and feedback of Technology, Journal Lightwave, 27, 5230, doi.org/10.1109/JLT.2009.2031421 ; Mayers (2001), Unconditional security in quantum cryptography of the ACM, Journal, 48, 351. ; Kish (2010), Noise in the wire : The real impact of wire resistance for the Johnson - like ) noise based secure communicator A, Physics Letters, 374.

DOI

10.1515/mms-2016-0039

×