Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Granqvist, C. G." wg kryterium: Autor


Wyświetlanie 1-6 z 6
Tytuł:
Comments on “A New Transient Attack on the Kish Key Distribution System”
Autorzy:
Kish, L. B.
Granqvist, C. G.
Powiązania:
https://bibliotekanauki.pl/articles/221426.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
measurement theory
information security
foundations of physics
engineering over-simplifications
Opis:
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA’s paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These deficiencies are clarified in our present paper, wherein we also emphasize that a new version of the KLJN system is immune against all existing attacks, including the one by GAA.
Źródło:
Metrology and Measurement Systems; 2016, 23, 3; 321-331
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange
Autorzy:
Kish, L. B.
Granqvist, C. G.
Powiązania:
https://bibliotekanauki.pl/articles/221212.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
KLJN key exchange
information theoretic security
unconditional security
Opis:
We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.
Źródło:
Metrology and Measurement Systems; 2016, 23, 1; 3-11
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Spectra for the product of Gaussian noises
Autorzy:
Kish, L. B.
Mingesz, R.
Gingl, Z.
Granqvist, C.-G.
Powiązania:
https://bibliotekanauki.pl/articles/221180.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
fluctuation-enhanced sensing
correlation detectors
indoor and environmental air quality sensing
Opis:
Products of Gaussian noises often emerge as the result of non-linear detection techniques or as parasitic effects, and their proper handling is important in many practical applications, including fluctuation-enhanced sensing, indoor air or environmental quality monitoring, etc. We use Rice's random phase oscillator formalism to calculate the power density spectra variance for the product of two Gaussian band-limited white noises with zero-mean and the same bandwidth W. The ensuing noise spectrum is found to decrease linearly from zero frequency to 2W, and it is zero for frequencies greater than 2W. Analogous calculations performed for the square of a single Gaussian noise confirm earlier results. The spectrum at non-zero frequencies, and the variance of the square of a noise, is amplified by a factor two as a consequence of correlation effects between frequency products. Our analytic results are corroborated by computer simulations.
Źródło:
Metrology and Measurement Systems; 2012, 19, 4; 653-658
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the “cracking” scheme in the paper “A directional coupler attack against the Kish key distribution system” by Gunn, Allison and Abbott
Autorzy:
Chen, H.-P.
Kish, L. B.
Granqvist, C. G.
Schmera, G.
Powiązania:
https://bibliotekanauki.pl/articles/221413.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
KLJN key exchange
information theoretic security
unconditional security
Opis:
Recently, Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf] proposed a new scheme to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law-Johnson-noise (KLJN) secure key distribution. We proved in a former paper [Fluct. Noise Lett. 13 (2014) 1450016] that GAA’s mathematical model is unphysical. Here we analyze GAA’s cracking scheme and show that, in the case of a loss-free cable, it provides less eavesdropping information than in the earlier (Bergou)-Scheuer-Yariv mean-square-based attack [Kish LB, Scheuer J, Phys. Lett. A 374:2140-2142 (2010)], while it offers no information in the case of a lossy cable. We also investigate GAA’s claim to be experimentally capable of distinguishing - using statistics over a few correlation times only - the distributions of two Gaussian noises with a relative variance difference of less than 10-8. Normally such distinctions would require hundreds of millions of correlations times to be observable. We identify several potential experimental artifacts as results of poor KLJN design, which can lead to GAA’s assertions: deterministic currents due to spurious harmonic components caused by ground loops, DC offset, aliasing, non-Gaussian features including non-linearities and other non-idealities in generators, and the timederivative nature of GAA’s scheme which tends to enhance all of these artifacts.
Źródło:
Metrology and Measurement Systems; 2014, 21, 3; 389-400
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Determination Of Gas Mixture Components Using Fluctuation Enhanced Sensing And The LS-SVM Regression Algorithm
Autorzy:
Lentka, Ł.
Smulko, J. M.
Ionescu, R.
Granqvist, C. G.
Kish, L. B.
Powiązania:
https://bibliotekanauki.pl/articles/221708.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
LS-SVM algorithm
resistance gas sensor
fluctuation enhanced sensing
gas detection
Opis:
This paper analyses the effectiveness of determining gas concentrations by using a prototype WO3 resistive gas sensor together with fluctuation enhanced sensing. We have earlier demonstrated that this method can determine the composition of a gas mixture by using only a single sensor. In the present study, we apply Least-Squares Support-Vector-Machine-based (LS-SVM-based) nonlinear regression to determine the gas concentration of each constituent in a mixture. We confirmed that the accuracy of the estimated gas concentration could be significantly improved by applying temperature change and ultraviolet irradiation of the WO3 layer. Fluctuation-enhanced sensing allowed us to predict the concentration of both component gases.
Źródło:
Metrology and Measurement Systems; 2015, 22, 3; 341-350
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Unconditional security by the laws of classical physics
Autorzy:
Mingesz, R.
Kish, L. B.
Gingl, Z.
Granqvist, C.-G.
Wen, H.
Peper, F.
Eubanks, T.
Schmera, G.
Powiązania:
https://bibliotekanauki.pl/articles/220876.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information theoretic security
unconditional security
secure key exchange
secure key distribution
quantum encryption
Opis:
There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often misunderstood. It has been shown recently that the use of two pairs of resistors with enhanced Johnsonnoise and a Kirchhoff-loop - i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol . for secure key distribution leads to information theoretic security levels superior to those of today's quantum key distribution. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. The KLJN system is briefly surveyed here with discussions about the essential questions such as (i) perfect and imperfect security characteristics of the key distribution, and (ii) how these two types of securities can be unconditional (or information theoretical).
Źródło:
Metrology and Measurement Systems; 2013, 20, 1; 3-16
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-6 z 6

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies