2,074 research outputs found

    Computation using Noise-based Logic: Efficient String Verification over a Slow Communication Channel

    Full text link
    Utilizing the hyperspace of noise-based logic, we show two string verification methods with low communication complexity. One of them is based on continuum noise-based logic. The other one utilizes noise-based logic with random telegraph signals where a mathematical analysis of the error probability is also given. The last operation can also be interpreted as computing universal hash functions with noise-based logic and using them for string comparison. To find out with 10^-25 error probability that two strings with arbitrary length are different (this value is similar to the error probability of an idealistic gate in today's computer) Alice and Bob need to compare only 83 bits of the noise-based hyperspace.Comment: Accepted for publication in European Journal of Physics B (November 10, 2010

    Resource requirements and speed versus geometry of unconditionally secure physical key exchanges

    Get PDF
    The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information theoretically secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise (KLJN). However, these concepts require a dedicated connection between hosts in peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A practical and cost effective method is to have each host share their respective cable(s) with other hosts such that two remote hosts can realize a secure key exchange without the need of an additional cable or key exchanger. In this article we analyze the cost complexities of cable, key exchangers, and time required in the star network. We mentioned the reliability of the star network and compare it with other network geometries. We also conceived a protocol and equation for the number of secure bit exchange periods needed in a star network. We then outline other network geometries and trade-off possibilities that seem interesting to explore.Comment: 13 pages, 7 figures, MDPI Entrop

    Vibration-Induced Conductivity Fluctuation (VICOF) Testing of Soils

    Full text link
    In this Letter, we propose and experimentally demonstrate a simple method to provide additional in-formation by conductivity measurements of soils. The AC electrical conductance of the soil is measured while it is exposed to a periodic vibration. The vibration-induced density fluctuation implies a corresponding conductivity fluctuation that can be seen as combination frequency components, the sum and the difference of the mean AC frequency and the double of vibration frequency, in the current response. The method is demonstrated by measurements on clayey and sandy soils

    Information theoretic security by the laws of classical physics

    Full text link
    It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.Comment: Featured in MIT Technology Review http://www.technologyreview.com/view/428202/quantum-cryptography-outperformed-by-classical/ ; Plenary talk at the 5th IEEE Workshop on Soft Computing Applications, August 22-24, 2012, (SOFA 2012). Typos correcte

    Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme

    Get PDF
    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law–Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.Laszlo B. Kish, Derek Abbott, Claes G. Granqvis

    Energy Requirement of Control: Comments on Szilard's Engine and Maxwell's Demon

    Get PDF
    In mathematical physical analyses of Szilard's engine and Maxwell's demon, a general assumption (explicit or implicit) is that one can neglect the energy needed for relocating the piston in Szilard's engine and for driving the trap door in Maxwell's demon. If this basic assumption is wrong, then the conclusions of a vast literature on the implications of the Second Law of Thermodynamics and of Landauer's erasure theorem are incorrect too. Our analyses of the fundamental information physical aspects of various type of control within Szilard's engine and Maxwell's demon indicate that the entropy production due to the necessary generation of information yield much greater energy dissipation than the energy Szilard's engine is able to produce even if all sources of dissipation in the rest of these demons (due to measurement, decision, memory, etc) are neglected.Comment: New, simpler and more fundamental approach utilizing the physical meaning of control-information and the related entropy production. Criticism of recent experiments adde

    Why We Read Wikipedia

    Get PDF
    Wikipedia is one of the most popular sites on the Web, with millions of users relying on it to satisfy a broad range of information needs every day. Although it is crucial to understand what exactly these needs are in order to be able to meet them, little is currently known about why users visit Wikipedia. The goal of this paper is to fill this gap by combining a survey of Wikipedia readers with a log-based analysis of user activity. Based on an initial series of user surveys, we build a taxonomy of Wikipedia use cases along several dimensions, capturing users' motivations to visit Wikipedia, the depth of knowledge they are seeking, and their knowledge of the topic of interest prior to visiting Wikipedia. Then, we quantify the prevalence of these use cases via a large-scale user survey conducted on live Wikipedia with almost 30,000 responses. Our analyses highlight the variety of factors driving users to Wikipedia, such as current events, media coverage of a topic, personal curiosity, work or school assignments, or boredom. Finally, we match survey responses to the respondents' digital traces in Wikipedia's server logs, enabling the discovery of behavioral patterns associated with specific use cases. For instance, we observe long and fast-paced page sequences across topics for users who are bored or exploring randomly, whereas those using Wikipedia for work or school spend more time on individual articles focused on topics such as science. Our findings advance our understanding of reader motivations and behavior on Wikipedia and can have implications for developers aiming to improve Wikipedia's user experience, editors striving to cater to their readers' needs, third-party services (such as search engines) providing access to Wikipedia content, and researchers aiming to build tools such as recommendation engines.Comment: Published in WWW'17; v2 fixes caption of Table

    Characteristics and Motivational Factors of Effective Extension Advisory Leaders: Implications for Building Strong Extension Advisory Councils

    Get PDF
    The purpose of this study was to determine the characteristics and motivational factors of effective Extension advisory leaders. This Delphi study was conducted with a selected group of County Extension Directors and a group of Extension State Advisory Leaders. The study identified 10 characteristics that distinguish an effective Extension advisory leader. Some of these characteristics are explicit and easy to observe, while others are implicit and difficult to directly observe. Therefore, it is practical to use directly observable characteristics of effective advisory leaders when selecting volunteers. Once potential volunteers are spotted in the community, implicit characteristics of effective advisory leaders should be used to further screen them before they are selected. The study also identified the eight most important factors motivating individuals to volunteer as effective advisory leaders. Understanding these motivational factors is helpful for creating an environment for attracting and retaining effective volunteers. Understanding their motivation for volunteer work and creating an environment for them to meet the motivating factors for volunteering will lead to volunteer satisfaction and retention. The findings of this study can be used to build strong Extension advisory councils
    • …
    corecore