8,828 research outputs found
Johnson(-like)-Noise-Kirchhoff-Loop Based Secure Classical Communicator Characteristics, for Ranges of Two to Two Thousand Kilometers, via Model-Line
A pair of Kirchhoff-Loop-Johnson(-like)-Noise communicators, which is able to
work over variable ranges, was designed and built. Tests have been carried out
on a model-line performance characteristics were obtained for ranges beyond the
ranges of any known direct quantum communication channel and they indicate
unrivalled signal fidelity and security performance of the exchanged raw key
bits. This simple device has single-wire secure key generation and sharing
rates of 0.1, 1, 10, and 100 bit/second for corresponding copper wire
diameters/ranges of 21 mm / 2000 km, 7 mm / 200 km, 2.3 mm / 20 km, and 0.7 mm
/ 2 km, respectively and it performs with 0.02% raw-bit error rate (99.98 %
fidelity). The raw-bit security of this practical system significantly
outperforms raw-bit quantum security. Current injection breaking tests show
zero bit eavesdropping ability without triggering the alarm signal, therefore
no multiple measurements are needed to build an error statistics to detect the
eavesdropping as in quantum communication. Wire resistance based breaking tests
of Bergou-Scheuer-Yariv type give an upper limit of eavesdropped raw bit ratio
of 0.19 % and this limit is inversely proportional to the sixth power of cable
diameter. Hao's breaking method yields zero (below measurement resolution)
eavesdropping information.Comment: Featured in New Scientist, Jason Palmer, May 23, 2007.
http://www.ece.tamu.edu/%7Enoise/news_files/KLJN_New_Scientist.pdf
Corresponding Plenary Talk at the 4th International Symposium on Fluctuation
and Noise, Florence, Italy (May 23, 2007
Long Response to Scheuer-Yariv: "A Classical Key-Distribution System based on Johnson (like) noise - How Secure?", physics/0601022
This is the longer (partially unpublished) version of response; the shorter
version (http://arxiv.org/abs/physics/0605013) is published in Physics Letters
A. We point out that the claims in the comment-paper of Scheuer and Yariv are
either irrelevant or incorrect. We first clarify what the security of a
physically secure layer means. The idealized Kirchoff-loop-Johnson-like-noise
(KLJN) scheme is totally secure therefore it is more secure than idealized
quantum communication schemes which can never be totally secure because of the
inherent noise processes in those communication schemes and the statistical
nature of eavesdropper detection based on error statistics. On the other hand,
with sufficient resources, a practical/non-ideal realization of the KLJN cipher
can arbitrarily approach the idealized limit and outperform even the idealized
quantum communicator schemes because the non-ideality-effects are determined
and controlled by the design. The cable resistance issue analyzed by Scheuer
and Yariv is a good example for that because the eavesdropper has insufficient
time window to build a sufficient statistics and the actual information leak
can be designed. We show that Scheuer's and Yariv's numerical result of 1%
voltage drop supports higher security than that of quantum communicators.
Moreover, choosing thicker or shorter wires can arbitrarily reduce this voltage
drop further; the same conclusion holds even according to the equations of
Scheuer and Yariv.Comment: The older long response and the newer brief response (in press, PLA)
with modelling data are fuse
Noise-based logic: Binary, multi-valued, or fuzzy, with optional superposition of logic states
A new type of deterministic (non-probabilistic) computer logic system
inspired by the stochasticity of brain signals is shown. The distinct values
are represented by independent stochastic processes: independent voltage (or
current) noises. The orthogonality of these processes provides a natural way to
construct binary or multi-valued logic circuitry with arbitrary number N of
logic values by using analog circuitry. Moreover, the logic values on a single
wire can be made a (weighted) superposition of the N distinct logic values.
Fuzzy logic is also naturally represented by a two-component superposition
within the binary case (N=2). Error propagation and accumulation are
suppressed. Other relevant advantages are reduced energy dissipation and
leakage current problems, and robustness against circuit noise and background
noises such as 1/f, Johnson, shot and crosstalk noise. Variability problems are
also nonexistent because the logic value is an AC signal. A similar logic
system can be built with orthogonal sinusoidal signals (different frequency or
orthogonal phase) however that has an extra 1/N type slowdown compared to the
noise-based logic system with increasing number of N furthermore it is less
robust against time delay effects than the noise-based counterpart.Comment: Accepted for publication by Physics Letters A, on December 23, 200
Totally Secure Classical Communication Utilizing Johnson (-like) Noise and Kirchoff's Law
An absolutely secure, fast, inexpensive, robust, maintenance-free and
low-power- consumption communication is proposed. The states of the information
bit are represented by two resistance values. The sender and the receiver have
such resistors available and they randomly select and connect one of them to
the channel at the beginning of each clock period. The thermal noise voltage
and current can be observed but Kirchoff's law provides only a second-order
equation. A secure bit is communicated when the actual resistance values at the
sender's side and the receiver's side differ. Then the second order equation
yields the two resistance values but the eavesdropper is unable to determine
the actual locations of the resistors and to find out the state of the sender's
bit. The receiver knows that the sender has the inverse of his bit, similarly
to quantum entanglement. The eavesdropper can decode the message if, for each
bits, she inject current in the wire and measures the voltage change and the
current changes in the two directions. However, in this way she gets discovered
by the very first bit she decodes. Instead of thermal noise, proper external
noise generators should be used when the communication is not aimed to be
stealth.Comment: Physics Letters A, in press; Manuscript featured by Science, vol.
309, p. 2148 (2005, September 30
Enhanced secure key exchange systems based on the Johnson-noise scheme
We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise
(KLJN) classical physical secure key exchange scheme and a new transient
protocol for practically-perfect security. While these practical improvements
offer progressively enhanced security and/or speed for the non-ideal
conditions, the fundamental physical laws providing the security remain the
same.
In the "intelligent" KLJN (iKLJN) scheme, Alice and Bob utilize the fact that
they exactly know not only their own resistor value but also the stochastic
time function of their own noise, which they generate before feeding it into
the loop.
In the "multiple" KLJN (MKLJN) system, Alice and Bob have publicly known
identical sets of different resistors with a proper, publicly known truth table
about the bit-interpretation of their combination. In the "keyed" KLJN (KKLJN)
system, by using secure communication with a formerly shared key, Alice and Bob
share a proper time-dependent truth table for the bit-interpretation of the
resistor situation for each secure bit exchange step during generating the next
key.
The remaining four KLJN schemes are the combinations of the above protocols
to synergically enhance the security properties. These are: the
"intelligent-multiple" (iMKLJN), the "intelligent-keyed" (iKKLJN), the
"keyed-multiple" (KMKLJN) and the "intelligent-keyed-multiple" (iKMKLJN) KLJN
key exchange systems.
Finally, we introduce a new transient-protocol offering practically-perfect
security without privacy amplification, which is not needed at practical
applications but it is shown for the sake of ongoing discussions.Comment: This version is accepted for publicatio
Stealth Communication: Zero-Power Classical Communication, Zero-Quantum Quantum Communication and Environmental-Noise Communication
An alternative physical way of communication, communication by the inherent
background noise, is proposed which does not need net energy transfer in the
information channel. The communicator devices do dissipate energy; however,
they do not emit net energy into the channel, instead of that, they modulate
the parameters of inherent spontaneous fluctuations in the channel. The method
can use two different mechanisms, thermal noise (Johnson-Nyquist noise) for
classical communication, and vacuum fluctuations/zero point energy (quantum
uncertainty noise) for quantum communication. The strongest advantage of the
method that this is apparently the most hidden (stealth) way of communication,
because it is using the inherent background noise for communication, therefore
it is extremely difficult or impossible to discover its presence. With proper
wave-based arrangements and specific conditions, the sender and the receiver
can easily detect eavesdropper activities, so that the eavesdropper is detected
as soon as she extracts a single bit of information, thus the security of the
method is comparable to the security of quantum communication/quantum key
distribution schemes. Finally, concerning practical applications, environmental
noise, out of the fundamental/inherent fluctuations, can also be used for this
kind of communication provided that is sufficiently stationary.Comment: Applied Physics Letters, in pres
- …
