Details Details PDF BIBTEX RIS Title Comments on “A New Transient Attack on the Kish Key Distribution System” Journal title Metrology and Measurement Systems Yearbook 2016 Volume vol. 23 Issue No 3 Authors Kish, Laszlo B. ; Granqvist, Claes G. Keywords measurement theory ; information security ; foundations of physics ; engineering over-simplifications Divisions of PAS Nauki Techniczne Coverage 321-331 Publisher Polish Academy of Sciences Committee on Metrology and Scientific Instrumentation Date 2016.09.30 Type Artykuły / Articles Identifier DOI: 10.1515/mms-2016-0039 ; ISSN 2080-9050, e-ISSN 2300-1941 Source Metrology and Measurement Systems; 2016; vol. 23; No 3; 321-331 References Saez (2014), Bit errors in the Kirchhoff - law - Johnson - noise secure key exchange of Modern Physics : Conference Series, International Journal, 33, 1460367. ; Chen (2015), Cable capacitance attack against the KLJN secure key exchange, Information, 6, 719, doi.org/10.3390/info6040719 ; Kish (2006), Response to Scheuer - Yariv : A classical key - distribution system based on Johnson like ) noise - how secure A, Physics Letters, 359. ; Cho (2005), Simple noise may stymie spies without quantum weirdness, Science, 309. ; Kish (2015), Analysis of an attenuator artifact in an experimental attack by Gunn Abbott against the Kirchhoff - law - Johnson - noise KLJN secure key exchange system Fluctuation and Noise, Letters, 14, 1550011. ; Liu (2009), A new look at the classical key exchange system based on amplified Johnson noise A, Physics Letters, 373. ; Kish (2016), Random - resistor - random - temperature KLJN key exchange Metrol Meas, Syst, 23, 3. ; Gilbert (2002), Secrecy , computational loads and rates in practical quantum cryptography, Algorithmica, 34, 314, doi.org/10.1007/s00453-002-0977-2 ; Kish (2014), Elimination of a second - law - attack , and all cable - resistance - based attacks , in the Kirchhoff - law - Johnson - noise KLJN secure key exchange system, Entropy, 16, 5223, doi.org/10.3390/e16105223 ; Mingesz (2008), Johnson - like ) noise Kirchhoff - loop based secure classical communicator characteristics , for ranges of two to two thousand kilometers , via model - line A, Physics Letters, 372. ; Kish (2006), Totally secure classical networks with multipoint telecloning ( teleporation ) of classical bits through loops with Johnson - like noise Fluctuation and Noise, Letters, 6. ; Kish (2006), Response to Feng Hao s paper Kish s key exchange scheme is insecure Fluctuation and Noise, Letters, 6. ; Horváth (2011), Effective privacy amplification for secure classical communications EPL ), Europhysics Letters, 94. ; Scheuer (2006), A classical key - distribution system based on Johnson like ) noise - how secure A, Physics Letters, 359. ; Kish (2006), Totally secure classical communication utilizing Johnson - like ) noise and Kirchoff s law A, Physics Letters, 352. ; Shannon (1949), Communication theory of secrecy systems Bell Systems Technical, Journal, 28, 656. ; Hao (2006), Kish s key exchange scheme is insecure IEE Proceedings, Information Security, 153. ; Smulko (2014), Performance analysis of the intelligent Kirchhoff - law - Johnson - noise secure key exchange Fluctuation and Noise, Letters, 13, 1450024. ; Kish (2009), Notes on recent approaches concerning the Kirchhoff - law - Johnson - noisebased secure key exchange A, Physics Letters, 373. ; Chen (2014), On the cracking scheme in the paper A directional coupler attack against the Kish key distribution system by Gunn Allison and Abbott Metrol Meas, Syst, 21, 389. ; Wyner (1975), The wire - tap channel Bell Systems Technology, Journal, 54, 1355. ; Mingesz (2013), Experimental study of the Kirchhoff - law - Johnson - noise secure key exchange of Modern Physics : Conference, International Journal, 33, 1460365, doi.org/10.1142/S2010194514603652 ; Kish (2006), Protection against the man - in - the - middle - attack for the Kirchhoff - loop - like ) - noise cipher and expansion by voltage - based security Fluctuation and Noise, Letters, 6. ; Kish (2013), Enhanced secure key exchange systems based on the Johnson - noise scheme Metrol Meas, Syst, 20, 191. ; Chen (2016), Current injection attack against the KLJN secure key exchange , accepted for publication Metrol Meas, Syst, 23, 173. ; Kish (2014), On the security of the Kirchhoff - law - Johnson - noise KLJN communicator Processing, Quantum Information, 13, 2213, doi.org/10.1007/s11128-014-0729-7 ; Liu (2009), A key agreement protocol using band - limited random signals and feedback of Technology, Journal Lightwave, 27, 5230, doi.org/10.1109/JLT.2009.2031421 ; Mayers (2001), Unconditional security in quantum cryptography of the ACM, Journal, 48, 351. ; Kish (2010), Noise in the wire : The real impact of wire resistance for the Johnson - like ) noise based secure communicator A, Physics Letters, 374.