Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "unconditional security" wg kryterium: Temat


Wyświetlanie 1-8 z 8
Tytuł:
Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange
Autorzy:
Kish, L. B.
Granqvist, C. G.
Powiązania:
https://bibliotekanauki.pl/articles/221212.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
KLJN key exchange
information theoretic security
unconditional security
Opis:
We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.
Źródło:
Metrology and Measurement Systems; 2016, 23, 1; 3-11
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the “cracking” scheme in the paper “A directional coupler attack against the Kish key distribution system” by Gunn, Allison and Abbott
Autorzy:
Chen, H.-P.
Kish, L. B.
Granqvist, C. G.
Schmera, G.
Powiązania:
https://bibliotekanauki.pl/articles/221413.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
KLJN key exchange
information theoretic security
unconditional security
Opis:
Recently, Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf] proposed a new scheme to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law-Johnson-noise (KLJN) secure key distribution. We proved in a former paper [Fluct. Noise Lett. 13 (2014) 1450016] that GAA’s mathematical model is unphysical. Here we analyze GAA’s cracking scheme and show that, in the case of a loss-free cable, it provides less eavesdropping information than in the earlier (Bergou)-Scheuer-Yariv mean-square-based attack [Kish LB, Scheuer J, Phys. Lett. A 374:2140-2142 (2010)], while it offers no information in the case of a lossy cable. We also investigate GAA’s claim to be experimentally capable of distinguishing - using statistics over a few correlation times only - the distributions of two Gaussian noises with a relative variance difference of less than 10-8. Normally such distinctions would require hundreds of millions of correlations times to be observable. We identify several potential experimental artifacts as results of poor KLJN design, which can lead to GAA’s assertions: deterministic currents due to spurious harmonic components caused by ground loops, DC offset, aliasing, non-Gaussian features including non-linearities and other non-idealities in generators, and the timederivative nature of GAA’s scheme which tends to enhance all of these artifacts.
Źródło:
Metrology and Measurement Systems; 2014, 21, 3; 389-400
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Unconditional security by the laws of classical physics
Autorzy:
Mingesz, R.
Kish, L. B.
Gingl, Z.
Granqvist, C.-G.
Wen, H.
Peper, F.
Eubanks, T.
Schmera, G.
Powiązania:
https://bibliotekanauki.pl/articles/220876.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information theoretic security
unconditional security
secure key exchange
secure key distribution
quantum encryption
Opis:
There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often misunderstood. It has been shown recently that the use of two pairs of resistors with enhanced Johnsonnoise and a Kirchhoff-loop - i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol . for secure key distribution leads to information theoretic security levels superior to those of today's quantum key distribution. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. The KLJN system is briefly surveyed here with discussions about the essential questions such as (i) perfect and imperfect security characteristics of the key distribution, and (ii) how these two types of securities can be unconditional (or information theoretical).
Źródło:
Metrology and Measurement Systems; 2013, 20, 1; 3-16
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Current Injection Attack against the KLJN Secure Key Exchange
Autorzy:
Chen, H.-P.
Mohammad, M.
Kish, L. B.
Powiązania:
https://bibliotekanauki.pl/articles/220991.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
KLJN
current injection attack
secure key exchange
unconditional security
privacy amplification
Opis:
The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show that two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system’s unconditional security.
Źródło:
Metrology and Measurement Systems; 2016, 23, 2; 173-181
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The problem of information leak due to parasitic loop currents and voltages in the KLJN secure key exchange scheme
Autorzy:
Melhem, Mutaz Y.
Kish, Laszlo B.
Powiązania:
https://bibliotekanauki.pl/articles/220471.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
unconditional security
key exchange
parasitic loop currents and voltages
information leak
Opis:
The Kirchhoff-law-Johnson-noise (KLJN) secure key exchange scheme offers unconditional security, however it can approach the perfect security limit only in the case when the practical system’s parameters approach the ideal behavior of its core circuitry. In the case of non-ideal features, non-zero information leak is present. The study of such leaks is important for a proper design of practical KLJN systems and their privacy amplifications in order to eliminate these problems.
Źródło:
Metrology and Measurement Systems; 2019, 26, 1; 37-40
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Generalized DC loop current attack against the KLJN secure key exchange scheme
Autorzy:
Melhem, Mutaz Y.
Kish, Laszlo B.
Powiązania:
https://bibliotekanauki.pl/articles/221184.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
unconditional security
secure key exchange
parasitic loop currents and voltages
information leak
Opis:
A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system is studied with unknown parasitic DC-voltage sources at both Alice’s and Bob’s ends. This paper is the generalization of our earlier investigation with a single-end parasitic source. Under the assumption that Eve does not know the values of the parasitic sources, a new attack, utilizing the current generated by the parasitic dc-voltage sources, is introduced. The attack is mathematically analyzed and demonstrated by computer simulations. Simple defense methods against the attack are shown. The earlier defense method based solely on the comparison of current/voltage data at Alice’s and Bob’s terminals is useless here since the wire currents and voltages are equal at both ends. However, the more expensive version of the earlier defense method, which is based on in-situ system simulation and comparison with measurements, works efficiently.
Źródło:
Metrology and Measurement Systems; 2019, 26, 4; 607-616
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Enhanced secure key exchange systems based on the Johnson - Noise scheme
Autorzy:
Kish, L. B.
Powiązania:
https://bibliotekanauki.pl/articles/221578.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information theoretic security
unconditional security
practically perfect security
secure key distribution via wire
secure smart power grid
Opis:
We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically-perfect security. While these practical improvements offer progressively enhanced security and/or speed for non-ideal conditions, the fundamental physical laws providing the security remain the same. In the “intelligent” KLJN (iKLJN) scheme, Alice and Bob utilize the fact that they exactly know not only their own resistor value but also the stochastic time function of their own noise, which they generate before feeding it into the loop. By using this extra information, they can reduce the duration of exchanging a single bit and in this way they achieve not only higher speed but also an enhanced security because Eve's information will significantly be reduced due to smaller statistics. In the “multiple” KLJN (MKLJN) system, Alice and Bob have publicly known identical sets of different resistors with a proper, publicly known truth table about the bit-interpretation of their combination. In this new situation, for Eve to succeed, it is not enough to find out which end has the higher resistor. Eve must exactly identify the actual resistor values at both sides. In the “keyed” KLJN (KKLJN) system, by using secure communication with a formerly shared key, Alice and Bob share a proper time-dependent truth table for the bit-interpretation of the resistor situation for each secure bit exchange step during generating the next key. In this new situation, for Eve to succeed, it is not enough to find out the resistor values at the two ends. Eve must also know the former key. The remaining four KLJN schemes are the combinations of the above protocols to synergically enhance the security properties. These are: the “intelligent-multiple” (iMKLJN), the “intelligent-keyed” (iKKLJN), the “keyed-multiple” (KMKLJN) and the “intelligent-keyed-multiple” (iKMKLJN) KLJN key exchange systems. Finally, we introduce a new transient-protocol offering practically-perfect security without privacy amplification, which is not needed in practical applications but it is shown for the sake of ongoing discussions.
Źródło:
Metrology and Measurement Systems; 2013, 20, 2; 191-204
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Rosnąca rola warunkowości pomocy społecznej a dochód powszechny
The rise of conditional cash transfers and the basic income
Autorzy:
Szarfenberg, Ryszard
Powiązania:
https://bibliotekanauki.pl/articles/1009875.pdf
Data publikacji:
2014-01-01
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
social assistance
conditional cash transfers
unconditional cash transfers
unconditional basic income
universal basic income
universal income
social security
bezwarunkowy dochód podstawowy
dochód powszechny
pomoc społeczna
powszechny dochód podstawowy
świadczenia bezwarunkowe
świadczenia warunkowe
zabezpieczenie społeczne
Opis:
Kluczowa dla koncepcji dochodu powszechnego jest jego bezwarunkowość. W ostatnich kilku dekadach mamy do czynienia z rozwojem warunkowości w zastosowaniu do niektórych świadczeń pieniężnych w krajach rozwiniętych i rozwijających się. Napięcie między ekspansywną warunkowością a postulatem usunięcia wszelkich warunków będzie przedmiotem tego artykułu. Temat zostanie przedstawiony poprzez naszkicowanie teorii warunkowości z uwzględnieniem sankcji socjalnych w odniesieniu do pomocy społecznej i w kontekście zabezpieczenia społecznego dochodu. Na tym tle rozważone zostaną stanowiska krytyczne w stosunku do warunkowości, w tym zwolenników dochodu powszechnego takich jak Guy Standing. Przedstawione zostaną też wnioski o charakterze praktycznym, co do wzmacniania strategii zwolenników bezwarunkowości.
Unconditionality is the main feature of the idea of basic income. What we saw in last decades is development of conditional cash transfers in developed and especially in developing countries. The tension between expansive conditionality and proposals of unconditional basic income is the main interest of this article. First, author develops understanding of conditionality distinguishing three types of it with the consideration of the definition, role and effectiveness of social sanctions. The context for presentation of this topics is the classical construct of social security system with main social insurance pillar dependent on labour market participation and supplemental social assistance one for those without social insurance entitlements and poor. Against this background author assess some weaknesses of the case for the basic income supported by Guy Standing and some possibilities of making them less persuasive.
Źródło:
Praktyka Teoretyczna; 2014, 12, 2; 19-39
2081-8130
Pojawia się w:
Praktyka Teoretyczna
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-8 z 8

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies