-
Unconditionally Secure Wireless-Wired Ground-Satellite-Ground Communication Networks Utilizing Classical and Quantum Noise
Authors:
Lucas Truax,
Sandip Roy,
Laszlo B. Kish
Abstract:
In this paper, we introduce the Kirchhoff-Law-Johnson-Noise (KLJN) as an approach to securing satellite communications. KLJN has the potential to revolutionize satellite communication security through its combination of simplicity, cost-effectiveness, and resilience with unconditional security. Unlike quantum key distribution (QKD), which requires complex, fragile, and expensive infrastructure lik…
▽ More
In this paper, we introduce the Kirchhoff-Law-Johnson-Noise (KLJN) as an approach to securing satellite communications. KLJN has the potential to revolutionize satellite communication security through its combination of simplicity, cost-effectiveness, and resilience with unconditional security. Unlike quantum key distribution (QKD), which requires complex, fragile, and expensive infrastructure like photon detectors and dedicated optical links, KLJN operates using standard electronic components and wires, significantly reducing implementation costs and logistical hurdles. KLJN's security, grounded in the fundamental laws of classical physics, is impervious to environmental and radiation-induced noise, making it highly reliable in the harsh conditions of satellite communications. This robustness, coupled with its ability to integrate seamlessly with existing infrastructure, positions KLJN as a revolutionary alternative to quantum solutions for ensuring secure, resilient satellite communications. The authors explore the value of achieving unconditionally secure communications in strategic ground-to-satellite networks which address vulnerabilities posed by advanced computational threats, including quantum computing. Our team has examined two leading approaches to unconditional security - the KLJN scheme and QKD - and analyzed the potential use of each for space systems. While QKD leverages quantum mechanics for security, it faces challenges related to cost, complexity, and environmental sensitivity. In contrast, the KLJN scheme utilizes classical physics principles to provide a simpler, more cost-effective, and resilient alternative, particularly for ground-based systems. The study concludes that KLJN offers significant advantages in simplicity, cost-efficiency, and robustness, making it a practical choice for many secure communication applications.
△ Less
Submitted 11 June, 2025;
originally announced June 2025.
-
"Quantum supremacy" challenged. Instantaneous noise-based logic with benchmark demonstrations
Authors:
Nasir Kenarangui,
Arthur Powalka,
Laszlo B. Kish
Abstract:
Instantaneous Noise-Based Logic (INBL) represents a computational paradigm that offers a deterministic alternative to quantum computing. INBL encodes logical information in orthogonal stochastic processes ("noise-bits") and exploits their superpositions and nonlinear interactions to achieve an exponentially large computational space of dimension 2^M, where M corresponds to the number of noise-bits…
▽ More
Instantaneous Noise-Based Logic (INBL) represents a computational paradigm that offers a deterministic alternative to quantum computing. INBL encodes logical information in orthogonal stochastic processes ("noise-bits") and exploits their superpositions and nonlinear interactions to achieve an exponentially large computational space of dimension 2^M, where M corresponds to the number of noise-bits analogous to qubits in quantum computing. This approach enables an exponential increase in computational throughput, with a computational speedup scaling on the order of O(2^M), while maintaining hardware complexity comparable to quantum systems. Unlike quantum computers, INBL operates without decoherence, error correction, or probabilistic measurement, yielding deterministic outputs with low error probability. Demonstrated applications include exponential-time phonebook searches (for number or name lookup) and the implementation of the Deutsch-Jozsa algorithm, illustrating INBL's capability to perform special-purpose computations with quantum-like exponential speedup using classical-physical noise-based hardware. We present an experimental comparison between the execution speeds of a Classical Turing machine algorithm - which changes the values of odd numbers in an exponentially large set to their next lower even numbers - and its INBL counterpart. Our results demonstrate that, in practical scenarios, the INBL algorithm's speed increases exponentially relative to the classical algorithm for values of M greater than 4, and it surpasses the Classical algorithm for M>8. At the highest tested value, M=20, the INBL algorithm achieved a speedup of approximately 4,000 times over the classical approach. Extrapolating to M=32 - the upper limit for our 64-bit system emulating the INBL scheme - the anticipated speedup would reach roughly 16 million.
△ Less
Submitted 29 May, 2025;
originally announced June 2025.
-
Simple Cracking of (Noise-Based) Dynamic Watermarking in Smart Grids
Authors:
Mehmet Yildirim,
Nasir Kenarangui,
Robert Balog,
Laszlo B. Kish,
Chanan Singh
Abstract:
Previous research employing a conceptual approach with a digital twin has demonstrated that (noise-based) dynamic watermarking is incapable of providing unconditional security in smart electrical grid systems. However, the implementation of digital twins can be prohibitively costly or infeasible due to limited available data on critical infrastructure. In this study, we first analyze the spectral…
▽ More
Previous research employing a conceptual approach with a digital twin has demonstrated that (noise-based) dynamic watermarking is incapable of providing unconditional security in smart electrical grid systems. However, the implementation of digital twins can be prohibitively costly or infeasible due to limited available data on critical infrastructure. In this study, we first analyze the spectral properties of dynamic watermarking and its associated protocol. Subsequently, we present a straightforward attack inspired by the digital twin method, which extracts and utilizes the grid noises and completely breaches the security of dynamic watermarking without requiring knowledge of the private watermarking signal. The attacker can fully expose the grid while evading detection by the controller. Our findings indicate that in the absence of secure and authenticated communications, dynamic watermarking offers neither conditional nor unconditional security. Conversely, when communication lines, sensors, and communicators are equipped with tamper-resistant and secure/authenticated links, dynamic watermarking becomes redundant for grid security.
△ Less
Submitted 20 April, 2025; v1 submitted 18 June, 2024;
originally announced June 2024.
-
Smart Grids Secured By Dynamic Watermarking: How Secure?
Authors:
Kate Davis,
Laszlo B. Kish,
Chanan Singh
Abstract:
Unconditional security for smart grids is defined. Cryptanalyses of the watermarked security of smart grids indicate that watermarking cannot guarantee unconditional security unless the communication within the grid system is unconditionally secure. The successful attack against the dynamically watermarked smart grid remains valid even with the presence of internal noise from the grid. An open que…
▽ More
Unconditional security for smart grids is defined. Cryptanalyses of the watermarked security of smart grids indicate that watermarking cannot guarantee unconditional security unless the communication within the grid system is unconditionally secure. The successful attack against the dynamically watermarked smart grid remains valid even with the presence of internal noise from the grid. An open question arises: if unconditionally authenticated secure communications within the grid, together with tamper resistance of the critical elements, are satisfactory conditions to provide unconditional security for the grid operation.
△ Less
Submitted 5 March, 2024;
originally announced April 2024.
-
Non-invasive deep-brain stimulations by spatio-temporal fourier synthesis
Authors:
Laszlo B. Kish,
Andrea Antal
Abstract:
A new type of non-invasive deep-brain stimulation is conceived and demonstrated by computer simulations. The process is based on spatio-temporal Fourier synthesis using multiple electrode pairs with sinusoidal current drive to limit skin sensations and concentrate the stimulus power to a small spatial volume and into large rare spikes in the times domain, while the signal power at the skin is stea…
▽ More
A new type of non-invasive deep-brain stimulation is conceived and demonstrated by computer simulations. The process is based on spatio-temporal Fourier synthesis using multiple electrode pairs with sinusoidal current drive to limit skin sensations and concentrate the stimulus power to a small spatial volume and into large rare spikes in the times domain, while the signal power at the skin is steady and small. Exotic time signals are also shown, such as the cases of high-frequency prime harmonics, quasi-random and chirping stimulations. The first one is able to generate sharp spikes with low frequency while its carriers are high-frequency harmonics that easily conducts via the skin and brain tissue. Open questions are, among others, the best shapes and timing of spikes. The answers require experimental tests and explorations in animal models and human subjects.
△ Less
Submitted 11 April, 2024; v1 submitted 2 April, 2024;
originally announced April 2024.
-
Crypto analysis of the key distribution scheme using noise-free resistances
Authors:
Laszlo B. Kish
Abstract:
Known key exchange schemes offering information-theoretic (unconditional) security are complex and costly to implement. Nonetheless, they remain the only known methods for achieving unconditional security in key exchange. Therefore, the explorations for simpler solutions for information-theoretic security are highly justified. Lin et al. [1] proposed an interesting hardware key distribution scheme…
▽ More
Known key exchange schemes offering information-theoretic (unconditional) security are complex and costly to implement. Nonetheless, they remain the only known methods for achieving unconditional security in key exchange. Therefore, the explorations for simpler solutions for information-theoretic security are highly justified. Lin et al. [1] proposed an interesting hardware key distribution scheme that utilizes thermal-noise-free resistances and DC voltages.
A crypto analysis of this system is presented. It is shown that, if Eve gains access to the initial shared secret at any time in the past or future, she can successfully crack all the generated keys in the past and future, even retroactively, using passively obtained and recorded voltages and currents. Therefore, the scheme is not a secure key exchanger, but it is rather a key expander with no more information entropy than the originally shared secret at the beginning.
We also point out that the proposed defense methods against active attacks do not function when the original shared secret is compromised because then the communication cannot be efficiently authenticated. However, they do work when an unconditionally secure key exchanger is applied to enable the authenticated communication protocol.
△ Less
Submitted 18 November, 2023;
originally announced December 2023.
-
Contrast detection is enhanced by deterministic, high-frequency transcranial alternating current stimulation with triangle and sine waveform
Authors:
Weronika Potok,
Onno van der Groen,
Sahana Sivachelvam,
Marc Bächinger,
Flavio Fröhlich,
Laszlo B. Kish,
Nicole Wenderoth
Abstract:
Stochastic Resonance (SR) describes a phenomenon where an additive noise (stochastic carrier-wave) enhances the signal transmission in a nonlinear system. In the nervous system, nonlinear properties are present from the level of single ion channels all the way to perception and appear to support the emergence of SR. For example, SR has been repeatedly demonstrated for visual detection tasks, also…
▽ More
Stochastic Resonance (SR) describes a phenomenon where an additive noise (stochastic carrier-wave) enhances the signal transmission in a nonlinear system. In the nervous system, nonlinear properties are present from the level of single ion channels all the way to perception and appear to support the emergence of SR. For example, SR has been repeatedly demonstrated for visual detection tasks, also by adding noise directly to cortical areas via transcranial random noise stimulation (tRNS). When dealing with nonlinear physical systems, it has been suggested that resonance can be induced not only by adding stochastic signals (i.e., noise) but also by adding a large class of signals that are not stochastic in nature which cause "deterministic amplitude resonance" (DAR). Here we mathematically show that high-frequency, deterministic, periodic signals can yield resonance-like effects with linear transfer and infinite signal-to-noise ratio at the output. We tested this prediction empirically and investigated whether non-random, high-frequency, transcranial alternating current stimulation applied to visual cortex could induce resonance-like effects and enhance performance of a visual detection task. We demonstrated in 28 participants that applying 80 Hz triangular-waves or sine-waves with tACS reduced visual contrast detection threshold for optimal brain stimulation intensities. The influence of tACS on contrast sensitivity was equally effective to tRNS-induced modulation, demonstrating that both tACS and tRNS can reduce contrast detection thresholds. Our findings suggest that a resonance-like mechanism can also emerge when deterministic electrical waveforms are applied via tACS.
△ Less
Submitted 28 September, 2023;
originally announced October 2023.
-
Transient Attacks against the VMG-KLJN Secure Key Exchanger
Authors:
Shahriar Ferdous,
Laszlo B. Kish
Abstract:
The security vulnerability of the Vadai, Mingesz, and Gingl (VMG) Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger, as presented in the publication "Nature, Science Report 5 (2015) 13653," has been exposed to transient attacks. Recently an effective defense protocol was introduced (Appl. Phys. Lett. 122 (2023) 143503) to counteract mean-square voltage-based (or mean-square current-based) transient…
▽ More
The security vulnerability of the Vadai, Mingesz, and Gingl (VMG) Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger, as presented in the publication "Nature, Science Report 5 (2015) 13653," has been exposed to transient attacks. Recently an effective defense protocol was introduced (Appl. Phys. Lett. 122 (2023) 143503) to counteract mean-square voltage-based (or mean-square current-based) transient attacks targeted at the ideal KLJN framework.
In the present study, this same mitigation methodology has been employed to fortify the security of the VMG-KLJN key exchanger. It is worth noting that the protective measures need to be separately implemented for the HL and LH scenarios. This conceptual framework is corroborated through computer simulations, demonstrating that the application of this defensive technique substantially mitigates information leakage to a point of insignificance.
△ Less
Submitted 29 September, 2023; v1 submitted 9 September, 2023;
originally announced September 2023.
-
Ternary Instantaneous Noise-based Logic
Authors:
Laszlo B. Kish
Abstract:
One of the possible representations of three-valued instantaneous noise-based logic is proposed. The third value is an uncertain bit value, which can be useful in artificial intelligence applications. There is a forth value, too, that can represent a non-existing bit (vacuum-state) that is the same (1 numeric value) for all bits, however that is a squeezed state common for all bits. Some logic gat…
▽ More
One of the possible representations of three-valued instantaneous noise-based logic is proposed. The third value is an uncertain bit value, which can be useful in artificial intelligence applications. There is a forth value, too, that can represent a non-existing bit (vacuum-state) that is the same (1 numeric value) for all bits, however that is a squeezed state common for all bits. Some logic gates are explored. A ternary Universe has a significant advantage compared to the standard binary one: its amplitude is never zero during any clock period. All the known binary logic gates work for the binary bit values in the same way as earlier therefore the former binary algorithms can be run in the ternary system with no change and without the problems posed by zero values of the Universe.
△ Less
Submitted 9 May, 2023; v1 submitted 30 April, 2023;
originally announced May 2023.
-
XOR and XNOR gates in instantaneous noise based logic
Authors:
Mohammad B. Khreishah,
Walter C. Daugherity,
Laszlo B. Kish
Abstract:
In this paper, we propose a new method of applying the XOR and XNOR gates on exponentially large superpositions in Instantaneous Noise-Based Logic. These new gates are repeatable, and they can achieve an exponential speed up in computation with a polynomial requirement in hardware complexity.
In this paper, we propose a new method of applying the XOR and XNOR gates on exponentially large superpositions in Instantaneous Noise-Based Logic. These new gates are repeatable, and they can achieve an exponential speed up in computation with a polynomial requirement in hardware complexity.
△ Less
Submitted 10 February, 2023;
originally announced February 2023.
-
Transient Attack against the KLJN Secure Key Exchanger
Authors:
Shahriar Ferdous,
Laszlo B. Kish
Abstract:
We demonstrate the security vulnerability of the ideal Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger against transient attacks. Transients start when Alice and Bob connect the wire to their chosen resistor at the beginning of each clock cycle. A transient attack takes place during a short duration of time, before the transients reflected from the end of Alice and Bob mix together. The informati…
▽ More
We demonstrate the security vulnerability of the ideal Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger against transient attacks. Transients start when Alice and Bob connect the wire to their chosen resistor at the beginning of each clock cycle. A transient attack takes place during a short duration of time, before the transients reflected from the end of Alice and Bob mix together. The information leak arises from the fact that Eve (the eavesdropper) monitors the cable, and analyzes the transients during this time period. We will demonstrate such a transient attack, and, then we introduce a defense protocol to protect against the attack. Computer simulations demonstrate that after applying the defense method the information leak becomes negligible.
△ Less
Submitted 11 February, 2023;
originally announced February 2023.
-
"Quantum supremacy" revisited: Low-complexity, deterministic solutions of the original Deutsch-Jozsa problem in classical physical systems
Authors:
Laszlo B. Kish
Abstract:
The original Deutsch-Jozsa (oDJ) problem is for an oracle (realized here as a database) of size N, where, according to their claim, the deterministic solution of the problem on a classical Turing computer requires O(N) computational complexity. They produced the famous Deutsch-Jozsa quantum algorithm that offered an exponential speedup over the classical computer, namely O[log(N)] complexity for t…
▽ More
The original Deutsch-Jozsa (oDJ) problem is for an oracle (realized here as a database) of size N, where, according to their claim, the deterministic solution of the problem on a classical Turing computer requires O(N) computational complexity. They produced the famous Deutsch-Jozsa quantum algorithm that offered an exponential speedup over the classical computer, namely O[log(N)] complexity for the solution in a quantum computer. In this paper, the problem is implemented on an instantaneous noise-based logic processor. It is shown that, similarly to the quantum algorithm, the oDJ problem can deterministically be solved with O[log(N)] complexity. The implication is that by adding a truly random coin to a classical Turing machine and using this classical-physical algorithm can also speed up the deterministic solution of the Deutsch-Jozsa problem exponentially, similarly to the quantum algorithm. Then it is realized that the same database and the solution of the Deutsch-Jozsa problem can also be realized by using an identical algorithmic structure in a simpler way, even without noise/random coin. The only lost function in this new system, as compared to noise-based logic, is the ability to do generic parallel logic operations over the whole database. As the latter feature is not needed for the oDJ problem, it is concluded that the problem can be solved on a classical computer with O[log(N)] complexity even without a random coin. Therefore, while the oDJ algorithm is historically important step in the developments of quantum computers, it is insufficient to prove quantum supremacy. Note, there is also simplified Deutsch-Jozsa problem proposed later, which is more popular in the field, however it is irrelevant for the present paper.
△ Less
Submitted 8 February, 2023; v1 submitted 11 October, 2022;
originally announced October 2022.
-
Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger
Authors:
Shahriar Ferdous,
Christiana Chamon,
Laszlo B. Kish
Abstract:
In this paper, the vulnerability of the Vadai, Mingesz and Gingl (VMG)- Kirchhoff-Law-Johnson-Noise (KLJN) Key Exchanger (Nature, Science Report 5 (2015) 13653) against two active attacks is demonstrated. The security vulnerability arises from the fact that the effective driving impedances are different between the HL and LH cases for the VMG-KLJN scheme; whereas for the ideal KLJN scheme they are…
▽ More
In this paper, the vulnerability of the Vadai, Mingesz and Gingl (VMG)- Kirchhoff-Law-Johnson-Noise (KLJN) Key Exchanger (Nature, Science Report 5 (2015) 13653) against two active attacks is demonstrated. The security vulnerability arises from the fact that the effective driving impedances are different between the HL and LH cases for the VMG-KLJN scheme; whereas for the ideal KLJN scheme they are same. Two defense schemes are shown against these attacks but each of them can protect against only one of the attack types; but not against the two attacks simultaneously. The theoretical results are confirmed by computer simulations.
△ Less
Submitted 13 November, 2022; v1 submitted 10 October, 2022;
originally announced October 2022.
-
Time synchronization protocol for the KLJN secure key exchange scheme
Authors:
Laszlo B. Kish
Abstract:
The information theoretically secure Kirchhoff-law-Johnson-noise (KLJN) key exchange scheme, similarly to quantum key distribution (QKD), is also potentially vulnerable against clock attacks, where Eve takes over the control of clock synchronization in the channel. This short note aims to introduce a time synchronization protocol scheme for Alice and Bob, which is resistant against arbitrary time…
▽ More
The information theoretically secure Kirchhoff-law-Johnson-noise (KLJN) key exchange scheme, similarly to quantum key distribution (QKD), is also potentially vulnerable against clock attacks, where Eve takes over the control of clock synchronization in the channel. This short note aims to introduce a time synchronization protocol scheme for Alice and Bob, which is resistant against arbitrary time delay attacks, both symmetric and asymmetric ones. We propose and explore various ways of clock synchronization for the KLJN system and propose an ultimate protocol that preserves time and hardware integrity under arbitrary attacks.
△ Less
Submitted 13 July, 2022; v1 submitted 3 July, 2022;
originally announced July 2022.
-
Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Authors:
Christiana Chamon,
Shahriar Ferdous,
Laszlo B. Kish
Abstract:
This paper introduces and demonstrates four new statistical attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks utilize compromised random number generators at Alice's/Bob's site(s). The case of partial correlations between Alice's/Bob's and Eve's probing noises is explored, that is, Eve's knowledge of Alice's and Bob's noises is limited but not zero. We…
▽ More
This paper introduces and demonstrates four new statistical attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks utilize compromised random number generators at Alice's/Bob's site(s). The case of partial correlations between Alice's/Bob's and Eve's probing noises is explored, that is, Eve's knowledge of Alice's and Bob's noises is limited but not zero. We explore the bilateral situation where Eve has partial knowledge of Alice's and Bob's random number generators. It is shown that in this situation Eve can crack the secure key bit by taking the highest cross-correlation between her probing noises and the measured voltage noise in the wire. She can also crack the secure key bit by taking the highest cross-correlation between her noise voltages and her evaluation of Alice's/Bob's noise voltages. We then explore the unilateral situation in which Eve has partial knowledge of only Alice's random number generator thus only those noises (of Alice and Eve) are correlated. In this situation Eve can still crack the secure key bit, but for sufficiently low error probability, she needs to use the whole bit exchange period for the attack. The security of the KLJN key exchange scheme, similarly to other protocols, necessitates that the random number generator outputs are truly random for Eve.
△ Less
Submitted 6 October, 2021;
originally announced October 2021.
-
From cold resistor to secure key exchanger
Authors:
Jiaao Song,
Laszlo B. Kish
Abstract:
Utilizing a formerly published cold resistor circuitry, a secure key exchange system is conceived and explored. A circuit realization of the system is constructed and simulated. Similarly to the Pao-Lo key exchanger, this system is secure in the steady-state limit but crackable in the transient situations.
Utilizing a formerly published cold resistor circuitry, a secure key exchange system is conceived and explored. A circuit realization of the system is constructed and simulated. Similarly to the Pao-Lo key exchanger, this system is secure in the steady-state limit but crackable in the transient situations.
△ Less
Submitted 3 October, 2021;
originally announced October 2021.
-
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Authors:
Christiana Chamon,
Laszlo B. Kish
Abstract:
This paper introduces a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attack is based on the nonlinearity of the noise generators. We explore the effect of total distortion (TD) at the second order (D2), third order (D3), and a combination of the second and third orders (D2,3) on the security of the KLJN scheme. It is demonstrated that a as little as 1%…
▽ More
This paper introduces a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attack is based on the nonlinearity of the noise generators. We explore the effect of total distortion (TD) at the second order (D2), third order (D3), and a combination of the second and third orders (D2,3) on the security of the KLJN scheme. It is demonstrated that a as little as 1% results in a notable power flow along the information channel, which leads to a significant information leak. We also show that decreasing the effective temperature (that is, the wire voltage) and, in this way reducing nonlinearity, results in the KLJN scheme approaching perfect security.
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security
Authors:
Shahriar Ferdous,
Christiana Chamon,
Laszlo B. Kish
Abstract:
In (Nature) Science Report 5 (2015) 13653, Vadai, Mingesz and Gingl (VMG) introduce a new Kirchhoff-law-Johnson-noise (KLJN) secure key exchanger that operates with 4 arbitrary resistors (instead of 2 arbitrary resistance values forming 2 identical resistor pairs in the original system). They state that in this new, VMG-KLJN, non-equilibrium system with nonzero power flow, the security during the…
▽ More
In (Nature) Science Report 5 (2015) 13653, Vadai, Mingesz and Gingl (VMG) introduce a new Kirchhoff-law-Johnson-noise (KLJN) secure key exchanger that operates with 4 arbitrary resistors (instead of 2 arbitrary resistance values forming 2 identical resistor pairs in the original system). They state that in this new, VMG-KLJN, non-equilibrium system with nonzero power flow, the security during the exchange of the two (HL and LH) bit values is as strong as in the original KLJN scheme. Moreover, they claim that, at practical conditions, their VMG-KLJN protocol "supports more robust protection against attacks". First, we investigate the power flow and thermal equilibrium issues of the VMG-KLJN system with 4 arbitrary resistors. Then we introduce a new KLJN protocol that allows the arbitrary choice of 3 resistors from the 4, while it still operates with zero power flow during the exchange of single bits by utilizing a specific value of the 4th resistor and a binary temperature set for the exchanged (HL and LH) bit values. Then we show that, in general, the KLJN schemes with more than 2 arbitrary resistors (including our new protocol mentioned above) are prone to 4 new passive attacks utilizing the parasitic capacitance and inductance in the cable, while the original KLJN scheme is naturally immune against these new attacks. The core of the security vulnerability exploited by these attacks is the different line resistances in the HL and LH cases. Therefore, on the contrary of the statement and claim cited above, the practical VMG-KLJN system is less secure than the original KLJN scheme. We introduce another 2, modified, non-equilibrium KLJN systems to eliminate the vulnerability against some - but not all - of these attacks. However the price for that is the loss of arbitrariness of the selection of the 4th resistor and the information leak still remains greater than zero.
△ Less
Submitted 8 October, 2020;
originally announced October 2020.
-
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
Authors:
Mutaz Melhem,
Christiana Chamon,
Shahriar Ferdous,
Laszlo B. Kish
Abstract:
A new attack against the Kirchhoff-Law-Johnson-Noise(KLJN) secure key exchange scheme is introduced. The attack exploits a parasitic (periodic) AC voltage-source at either Alice or Bob ends. Such situations exist due to AC ground loops and electromagnetic interference (EMI). In the low-frequency case, the procedure is the generalized form of the former DC ground loop based attack. In the high-freq…
▽ More
A new attack against the Kirchhoff-Law-Johnson-Noise(KLJN) secure key exchange scheme is introduced. The attack exploits a parasitic (periodic) AC voltage-source at either Alice or Bob ends. Such situations exist due to AC ground loops and electromagnetic interference (EMI). In the low-frequency case, the procedure is the generalized form of the former DC ground loop based attack. In the high-frequency case, the power spectrum of the wire voltage is utilized. The attack is demonstrated in both the low and the high-frequency situations. Defense protocols against the attack are also discussed.
△ Less
Submitted 22 May, 2020;
originally announced May 2020.
-
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Authors:
Christiana Chamon,
Shahriar Ferdous,
Laszlo B. Kish
Abstract:
This paper introduces and demonstrates two new attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks are based on random number generators with compromised security. First we explore the situation in which Eve knows the seed of both Alice's and Bob's random number generators. We show that in this situation Eve can crack the secure key bit within a fraction…
▽ More
This paper introduces and demonstrates two new attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks are based on random number generators with compromised security. First we explore the situation in which Eve knows the seed of both Alice's and Bob's random number generators. We show that in this situation Eve can crack the secure key bit within a fraction of the bit exchange period even if her current and voltage measurements have only a single bit of resolution. In the second attack, we explore the situation in which Eve knows the seed of only Alice's random number generator. We show that in this situation Eve can still crack the secure key bit but she needs to use the whole bit exchange period for the attack. The security of the KLJN key exchange scheme, similarly to other protocols, necessitates that the random number generator outputs are truly random for Eve.
△ Less
Submitted 20 May, 2020;
originally announced May 2020.
-
Fluctuation-Enhanced Sensing: Review of Practical Issues
Authors:
Graziella Scandurra,
Janusz Smulko,
Laszlo B. Kish
Abstract:
We discuss some of the fundamental practical limitations of the Fluctuation-Enhanced Sensing of odors and gases. We address resolution, measurement speed, reproducibility, memory and other problems such as humidity. Various techniques and ideas are presented to overcome these problems. Circuit solutions are also discussed.
We discuss some of the fundamental practical limitations of the Fluctuation-Enhanced Sensing of odors and gases. We address resolution, measurement speed, reproducibility, memory and other problems such as humidity. Various techniques and ideas are presented to overcome these problems. Circuit solutions are also discussed.
△ Less
Submitted 2 March, 2020;
originally announced April 2020.
-
Ternary Fingerprints with Reference Odor for Fluctuation-Enhanced Sensing
Authors:
X. You,
L. B. Kish,
J. -L. Seguin,
M. D. King
Abstract:
An improved method for Fluctuation Enhanced Sensing (FES) is introduced. We enhanced the old binary fingerprinting method, where the fingerprint bit values were +/- 1, by introducing ternary fingerprints utilizing a reference odor. In the ternary method, the fingerprint bit values are -1, 0, and +1 where the 0 value stands for the situation where the slope of the spectrum is identical to that of t…
▽ More
An improved method for Fluctuation Enhanced Sensing (FES) is introduced. We enhanced the old binary fingerprinting method, where the fingerprint bit values were +/- 1, by introducing ternary fingerprints utilizing a reference odor. In the ternary method, the fingerprint bit values are -1, 0, and +1 where the 0 value stands for the situation where the slope of the spectrum is identical to that of the reference odor. The application of the reference odor spectrum makes the fingerprint relative to the reference. This feature increases the information entropy of the fingerprints. The method is briefly illustrated by sensing bacterial odor in cow manure isolates.
△ Less
Submitted 30 January, 2020;
originally announced February 2020.
-
Generalized DC loop current attack against the KLJN secure key exchange scheme
Authors:
Mutaz Y. Melhem,
Laszlo B. Kish
Abstract:
A new attack against the Kirchhoff Law Johnson Noise (KLJN) secure key distribution system is studied with unknown parasitic DC voltage sources at both Alices and Bobs ends. This paper is the generalization of our earlier investigation with a single end parasitic source. Under the assumption that Eve does not know the values of the parasitic sources, a new attack, utilizing the current generated b…
▽ More
A new attack against the Kirchhoff Law Johnson Noise (KLJN) secure key distribution system is studied with unknown parasitic DC voltage sources at both Alices and Bobs ends. This paper is the generalization of our earlier investigation with a single end parasitic source. Under the assumption that Eve does not know the values of the parasitic sources, a new attack, utilizing the current generated by the parasitic dc voltage sources, is introduced. The attack is mathematically analyzed and demonstrated by computer simulations. Simple defense methods against the attack are shown. The earlier defense method based solely on the comparison of current/voltage data at Alice's and Bob's terminals is useless here since the wire currents and voltages are equal at both ends. However, the more expensive version of the earlier defense method, which is based on in situ system simulation and comparison with measurements, works efficiently.
△ Less
Submitted 30 September, 2019;
originally announced October 2019.
-
Entanglement, and unsorted database search in noise-based logic
Authors:
Laszlo B. Kish,
Walter Daugherity
Abstract:
We explore the collapse of "wavefunction" and the measurement of entanglement in the superpositions of hyperspace vectors in classical physical instantaneous-noise-based logic (INBL). We find both similarities with and major differences from the related properties of quantum systems. Two search algorithms utilizing the observed features are introduced. For the first one we assume an unsorted names…
▽ More
We explore the collapse of "wavefunction" and the measurement of entanglement in the superpositions of hyperspace vectors in classical physical instantaneous-noise-based logic (INBL). We find both similarities with and major differences from the related properties of quantum systems. Two search algorithms utilizing the observed features are introduced. For the first one we assume an unsorted names database set up by Alice that is a superposition (unknown by Bob) of up to n=2^N strings; those we call names. Bob has access to the superposition wave and to the 2N reference noises of the INBL system of N noise bits. For Bob, to decide if a given name x is included in the superposition, once the search has begun, it takes N switching operations followed by a single measurement of the superposition wave. Thus the time and hardware complexity of the search algorithm is O[log(n)] which indicates an exponential speedup compared to Grover's quantum algorithm in a corresponding setting. An extra advantage is that the error probability of the search is zero. Moreover, the scheme can also check the existence of a fraction of a string, or several separate string fractions embedded in an arbitrarily long, arbitrary string. In the second algorithm, we expand the above scheme to a phonebook with n names and s phone numbers. When the names and numbers have the same bit resolution, once the search has begun, the time and hardware complexity of this search algorithm is O[log(n)]. In the case of one-to-one correspondence between names and phone numbers (n=s), the algorithm offers inverse phonebook search too. The error probability of this search algorithm is also zero.
△ Less
Submitted 23 July, 2019; v1 submitted 30 April, 2019;
originally announced May 2019.
-
A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
Authors:
Mutaz Y. Melhem,
Laszlo B. Kish
Abstract:
A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic dc-voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, due to a ground loop and/or electromagnetic interference (EMI). Surprisingly, the usual curr…
▽ More
A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic dc-voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, due to a ground loop and/or electromagnetic interference (EMI). Surprisingly, the usual current/voltage comparison based defense method that exposes active attacks or parasitic features (such as wire resistance allowing information leak) does not function here. The attack is successfully demonstrated. Proposed defense methods against it are shown.
△ Less
Submitted 3 October, 2018; v1 submitted 14 June, 2018;
originally announced June 2018.
-
Does a standalone, "cold" (low-thermal-noise), linear resistor exist without cooling?
Authors:
Jiaao Song,
Laszlo B. Kish
Abstract:
Classical ways of cooling require some of these elements: phase transition, compressor, non-linearity, valve, and/or switch. A recent example is the 2018 patent of Linear Technology Corporation; they utilize the shot noise of a diode to produce a standalone nonlinear resistor that has T/2 noise temperature (about 150 Kelvin). While such "resistor" can cool its environment when it is AC coupled to…
▽ More
Classical ways of cooling require some of these elements: phase transition, compressor, non-linearity, valve, and/or switch. A recent example is the 2018 patent of Linear Technology Corporation; they utilize the shot noise of a diode to produce a standalone nonlinear resistor that has T/2 noise temperature (about 150 Kelvin). While such "resistor" can cool its environment when it is AC coupled to a resistor, the thermally cooling effect is only academically interesting. The importance of the invention is of another nature: In low-noise electronics, it is essential to have resistors with low noise temperature to improve the signal-to-noise ratio. A natural question is raised: can we use a linear system with feedback to cool and, most importantly, to show reduced noise temperature? Exploring this problem, were able to produce standalone linear resistors showing strongly reduced thermal noise. Our must successful test shows T/100 (about 3 Kelvin) noise temperature, as if the resistor would have been immersed in liquid helium. We also found that there is an old solution offering similar results utilizing the virtual ground of an inverting amplifier at negative feedback. There the "cold" resistor is generated at the input of an amplifier. On the other hand, our system generates the "cold" resistance at the output, which can have practical advantages.
△ Less
Submitted 15 May, 2018;
originally announced May 2018.
-
Noise-based logic gates by operations on the reference system
Authors:
Laszlo B. Kish,
Walter Daugherity
Abstract:
We propose a new, low-complexity solution to realize multi-input-bit gates acting on exponentially large superpositions in noise-based logic processors. Two examples are shown, the NOT gate and the CNOT gate. The operations can be executed and repeated with polynomial time and hardware complexity. The lack of a solution of this problem had been one of the major issues prohibiting the efficient rea…
▽ More
We propose a new, low-complexity solution to realize multi-input-bit gates acting on exponentially large superpositions in noise-based logic processors. Two examples are shown, the NOT gate and the CNOT gate. The operations can be executed and repeated with polynomial time and hardware complexity. The lack of a solution of this problem had been one of the major issues prohibiting the efficient realization of Shor's algorithm by Instantaneous Noise-Based Logic, which runs on a classical Turing computer with a true random number generator. With the method described in this paper, we are one step closer to this goal.
△ Less
Submitted 14 September, 2018; v1 submitted 26 March, 2018;
originally announced March 2018.
-
Information entropy and thermal entropy: apples and oranges
Authors:
Laszlo B. Kish,
David K. Ferry
Abstract:
The frequent misunderstanding of information entropy is pointed out. It is shown that, contrary to fortuitous situations and common beliefs, there is no general interrelation between the information entropy and the thermodynamical entropy. We point out that the change of information entropy during measurement is determined by the resolution of the measurement instrument and these changes do not ha…
▽ More
The frequent misunderstanding of information entropy is pointed out. It is shown that, contrary to fortuitous situations and common beliefs, there is no general interrelation between the information entropy and the thermodynamical entropy. We point out that the change of information entropy during measurement is determined by the resolution of the measurement instrument and these changes do not have a general and clear-cut interrelation with the change of thermal entropy. Moreover, these changes can be separated in space and time. We show classical physical considerations and examples to support this conclusion. Finally, we show that information entropy can violate the Third Law of Thermodynamics which is another indication of major differences from thermal entropy.
△ Less
Submitted 17 July, 2017; v1 submitted 5 June, 2017;
originally announced June 2017.
-
Second Law based definition of passivity/activity of devices
Authors:
Kyle Sundqvist,
David K. Ferry,
Laszlo B. Kish
Abstract:
Recently, our efforts to clarify the old question, if a memristor is a passive or active device [1], triggered debates between engineers, who have had advanced definitions of passivity/activity of devices, and physicists with significantly different views about this seemingly simple question. This debate triggered our efforts to test the well-known engineering concepts about passivity/activity in…
▽ More
Recently, our efforts to clarify the old question, if a memristor is a passive or active device [1], triggered debates between engineers, who have had advanced definitions of passivity/activity of devices, and physicists with significantly different views about this seemingly simple question. This debate triggered our efforts to test the well-known engineering concepts about passivity/activity in a deeper way, challenging them by statistical physics. It is shown that the advanced engineering definition of passivity/activity of devices is self-contradictory when a thermodynamical system executing Johnson-Nyquist noise is present. A new, statistical physical, self-consistent definition based on the Second Law of Thermodynamics is introduced. It is also shown that, in a system with uniform temperature distribution, any rectifier circuitry that can rectify thermal noise must contain an active circuit element, according to both the engineering and statistical physical definitions.
△ Less
Submitted 25 August, 2017; v1 submitted 22 May, 2017;
originally announced May 2017.
-
Memristor equations: incomplete physics and undefined passivity/activity
Authors:
Kyle Sundqvist,
David K. Ferry,
Laszlo B. Kish
Abstract:
In his seminal paper, Chua presented a fundamental physical claim by introducing the memristor, "The missing circuit element". The memristor equations were originally supposed to represent a passive circuit element because, with active circuitry, arbitrary elements can be realized without limitations. Therefore, if the memristor equations do not guarantee that the circuit element can be realized b…
▽ More
In his seminal paper, Chua presented a fundamental physical claim by introducing the memristor, "The missing circuit element". The memristor equations were originally supposed to represent a passive circuit element because, with active circuitry, arbitrary elements can be realized without limitations. Therefore, if the memristor equations do not guarantee that the circuit element can be realized by a passive system, the fundamental physics claim about the memristor as "missing circuit element" loses all its weight. The question of passivity/activity belongs to physics thus we incorporate thermodynamics into the study of this problem. We show that the memristor equations are physically incomplete regarding the problem of passivity/activity. As a consequence, the claim that the present memristor functions describe a passive device lead to unphysical results, such as violating the Second Law of thermodynamics, in infinitely large number of cases. The seminal memristor equations cannot introduce a new physical circuit element without making the model more physical such as providing the Fluctuation Dissipation Theory of memristors.
△ Less
Submitted 25 August, 2017; v1 submitted 23 March, 2017;
originally announced March 2017.
-
Comments on "sub-KBT micro-electromechanical irreversible logic gate"
Authors:
Laszlo B. Kish
Abstract:
In a recent article, Nature Communications 7 (2016) 12068, the authors claimed that they demonstrated sub-kBT energy dissipation at elementary logic operations. However, the argumentation is invalid because it neglects the dominant source of energy dissipation, namely, the charging energy of the capacitance of the input electrode, which totally dissipates during the full (0-1-0) cycle of logic val…
▽ More
In a recent article, Nature Communications 7 (2016) 12068, the authors claimed that they demonstrated sub-kBT energy dissipation at elementary logic operations. However, the argumentation is invalid because it neglects the dominant source of energy dissipation, namely, the charging energy of the capacitance of the input electrode, which totally dissipates during the full (0-1-0) cycle of logic values. The neglected dissipation phenomenon is identical with the mechanism that leads to the lower physical limit of dissipation (70-100 kBT) in today's microprocessors (CMOS logic) and in any other system with thermally activated errors thus the same limit holds for the new scheme, too.
△ Less
Submitted 20 July, 2016; v1 submitted 30 June, 2016;
originally announced June 2016.
-
Comments On "A New Transient Attack On The Kish Key Distribution System"
Authors:
Laszlo Bela Kish,
Claes Goran Granqvist
Abstract:
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These de…
▽ More
A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These deficiencies are clarified in our present paper, wherein we also emphasize that a new version of the KLJN system is immune against all existing attacks, including the one by GAA.
△ Less
Submitted 27 May, 2016;
originally announced June 2016.
-
Unconditionally secure credit/debit card chip scheme and physical unclonable function
Authors:
Laszlo Bela Kish,
Kamran Entesari,
Claes-Goran Granqvist,
Chiman Kwan
Abstract:
The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths b…
▽ More
The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions.
△ Less
Submitted 20 July, 2016; v1 submitted 8 May, 2016;
originally announced May 2016.
-
Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'"
Authors:
Laszlo B. Kish,
Claes-G. Granqvist,
Sunil P. Khatri,
Ferdinand Peper
Abstract:
We prove that statistical information theoretic quantities, such as information entropy, cannot generally be interrelated with the lower limit of energy dissipation during information erasure. We also point out that, in deterministic and error-free computers, the information entropy of memories does not change during erasure because its value is always zero. On the other hand, for information-theo…
▽ More
We prove that statistical information theoretic quantities, such as information entropy, cannot generally be interrelated with the lower limit of energy dissipation during information erasure. We also point out that, in deterministic and error-free computers, the information entropy of memories does not change during erasure because its value is always zero. On the other hand, for information-theoretic erasure - i.e., "thermalization" / randomization of the memory - the originally zero information entropy (with deterministic data in the memory) changes after erasure to its maximum value, 1 bit / memory bit, while the energy dissipation is still positive, even at parameters for which the thermodynamic entropy within the memory cell does not change. Information entropy does not convert to thermodynamic entropy and to the related energy dissipation; they are quantities of different physical nature. Possible specific observations (if any) indicating convertibility are at most fortuitous and due to the disregard of additional processes that are present.
△ Less
Submitted 5 February, 2016;
originally announced February 2016.
-
Current Injection Attack against the KLJN Secure Key Exchange
Authors:
Hsien-Pu Chen,
Muneer Mohammad,
Laszlo B. Kish
Abstract:
The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show th…
▽ More
The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show that two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system's unconditional security.
△ Less
Submitted 1 April, 2016; v1 submitted 9 December, 2015;
originally announced December 2015.
-
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange
Authors:
Elias Gonzalez,
Laszlo B. Kish
Abstract:
As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given se…
▽ More
As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.
△ Less
Submitted 20 November, 2015;
originally announced November 2015.
-
Drawing from hats by noise-based logic
Authors:
Bruce Zhang,
Laszlo B. Kish,
Claes-Goran Granqvist
Abstract:
We utilize the asymmetric random telegraph wave-based instantaneous noise-base logic scheme to represent the problem of drawing numbers from a hat, and we consider two identical hats with the first 2^N integer numbers. In the first problem, Alice secretly draws an arbitrary number from one of the hats, and Bob must find out which hat is missing a number. In the second problem, Alice removes a know…
▽ More
We utilize the asymmetric random telegraph wave-based instantaneous noise-base logic scheme to represent the problem of drawing numbers from a hat, and we consider two identical hats with the first 2^N integer numbers. In the first problem, Alice secretly draws an arbitrary number from one of the hats, and Bob must find out which hat is missing a number. In the second problem, Alice removes a known number from one of the hats and another known number from the other hat, and Bob must identify these hats. We show that, when the preparation of the hats with the numbers is accounted for, the noise-based logic scheme always provides an exponential speed-up and/or it requires exponentially smaller computational complexity than deterministic alternatives. Both the stochasticity and the ability to superpose numbers are essential components of the exponential improvement.
△ Less
Submitted 9 January, 2016; v1 submitted 11 November, 2015;
originally announced November 2015.
-
Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange
Authors:
Laszlo Bela Kish,
Claes-Goran Granqvist
Abstract:
We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can…
▽ More
We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random-Resistor-Random-Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.
△ Less
Submitted 1 October, 2015; v1 submitted 27 September, 2015;
originally announced September 2015.
-
Cable Capacitance Attack against the KLJN Secure Key Exchange
Authors:
Hsien-Pu Chen,
Elias Gonzalez,
Yessica Saez,
Laszlo B. Kish
Abstract:
The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the Fluctuation-Dissipation-Theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small information leak, which can be mitigated by privacy amplification or other techniques so that the uncon…
▽ More
The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the Fluctuation-Dissipation-Theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small information leak, which can be mitigated by privacy amplification or other techniques so that the unconditional (information theoretic) security is preserved. In this paper, the industrial cable and circuit simulator LTSPICE is used to validate the information leak due to one of the non-idealities in KLJN, the parasitic (cable) capacitance. Simulation results show that privacy amplification and/or capacitor killer (capacitance compensation) arrangements can effectively eliminate the leak.
△ Less
Submitted 26 October, 2015; v1 submitted 11 August, 2015;
originally announced August 2015.
-
Zero and negative energy dissipation at information-theoretic erasure
Authors:
Laszlo B. Kish,
Claes G. Granqvist,
Sunil P. Khatri,
Ferdinand Peper
Abstract:
We introduce information-theoretic erasure based on Shannon's binary channel formula. It is pointed out that this type of erasure is a natural energy-dissipation-free way in which information is lost in double-potential-well memories, and it may be the reason why the brain can forget things effortlessly. We also demonstrate a new non-volatile, charge-based memory scheme wherein the erasure can be…
▽ More
We introduce information-theoretic erasure based on Shannon's binary channel formula. It is pointed out that this type of erasure is a natural energy-dissipation-free way in which information is lost in double-potential-well memories, and it may be the reason why the brain can forget things effortlessly. We also demonstrate a new non-volatile, charge-based memory scheme wherein the erasure can be associated with even negative energy dissipation; this implies that the memory's environment is cooled during information erasure and contradicts Landauer's principle of erasure dissipation. On the other hand, writing new information into the memory always requires positive energy dissipation in our schemes. Finally, we show a simple system where even a classical erasure process yields negative energy dissipation of arbitrarily large energy.
△ Less
Submitted 23 September, 2015; v1 submitted 30 July, 2015;
originally announced July 2015.
-
Waves in a short cable at low frequencies, or just hand-waving?
Authors:
L. B. Kish,
S. P. Chen,
C. G. Granqvist,
J. M. Smulko
Abstract:
We address the question of low-frequency signals in a short cable, which are often considered as waves in engineering calculations. Such an assumption violates several laws of physics, but exact calculations can be carried out via linear network theory.
We address the question of low-frequency signals in a short cable, which are often considered as waves in engineering calculations. Such an assumption violates several laws of physics, but exact calculations can be carried out via linear network theory.
△ Less
Submitted 16 April, 2015;
originally announced May 2015.
-
Zero-point term and quantum effects in the Johnson noise of resistors: A critical appraisal
Authors:
Laszlo B. Kish,
Gunnar A. Niklasson,
Claes G. Granqvist
Abstract:
There is a longstanding debate about the zero-point term in the Johnson noise voltage of a resistor. This term originates from a quantum-theoretical treatment of the Fluctuation-Dissipation Theorem (FDT). Is the zero-point term really there, or is it only an experimental artefact, due to the uncertainty principle, for phase-sensitive amplifiers? Could it be removed by renormalization of theories?…
▽ More
There is a longstanding debate about the zero-point term in the Johnson noise voltage of a resistor. This term originates from a quantum-theoretical treatment of the Fluctuation-Dissipation Theorem (FDT). Is the zero-point term really there, or is it only an experimental artefact, due to the uncertainty principle, for phase-sensitive amplifiers? Could it be removed by renormalization of theories? We discuss some historical measurement schemes that do not lead to the effect predicted by the FDT, and we analyse new features that emerge when the consequences of the zero-point term are measured via the mean energy and force in a capacitor shunting the resistor. If these measurements verify the existence of a zero-point term in the noise, then two types of perpetual motion machines can be constructed. Further investigation with the same approach shows that, in the quantum limit, the Johnson-Nyquist formula is also invalid under general conditions even though it is valid for a resistor-antenna system. Therefore we conclude that and a satisfactory quantum theory of the Johnson noise, the Fluctuation-Dissipation Theorem, must, as a minimum, include also the measurement system used to evaluate the observed quantities. Issues concerning the zero-point term may also have implications for phenomena in advanced nanotechnology.
△ Less
Submitted 20 December, 2015; v1 submitted 22 April, 2015;
originally announced April 2015.
-
Resource requirements and speed versus geometry of unconditionally secure physical key exchanges
Authors:
Elias Gonzalez,
Robert S. Balog,
Laszlo B. Kish
Abstract:
The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information theoretically secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise (KLJN). However, these concepts require a dedicated connection between hosts in peer-to-pee…
▽ More
The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information theoretically secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise (KLJN). However, these concepts require a dedicated connection between hosts in peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A practical and cost effective method is to have each host share their respective cable(s) with other hosts such that two remote hosts can realize a secure key exchange without the need of an additional cable or key exchanger. In this article we analyze the cost complexities of cable, key exchangers, and time required in the star network. We mentioned the reliability of the star network and compare it with other network geometries. We also conceived a protocol and equation for the number of secure bit exchange periods needed in a star network. We then outline other network geometries and trade-off possibilities that seem interesting to explore.
△ Less
Submitted 24 April, 2015;
originally announced April 2015.
-
Critical Remarks on Landauer's principle of erasure-dissipation
Authors:
Laszlo B. Kish,
Claes-Goran Granqvist,
Sunil P. Khatri,
Janusz Smulko
Abstract:
We briefly address Landauer's Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer's derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, dampi…
▽ More
We briefly address Landauer's Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer's derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, damping and the fluctuation-dissipation theorem. We also point out that bit erasure is typically not needed or used for the functioning of computers or engines (except for secure erasure).
△ Less
Submitted 31 March, 2015; v1 submitted 22 September, 2014;
originally announced December 2014.
-
Lognormal distribution of firing time and rate from a single neuron?
Authors:
Eszter A. Kish,
Claes-Goran Granqvist,
Andras Der,
Laszlo B. Kish
Abstract:
Even a single neuron may be able to produce significant lognormal features in its firing statistics due to noise in the charging ion current. A mathematical scheme introduced in advanced nanotechnology is relevant for the analysis of this mechanism in the simplest case, the integrate-and-fire model with white noise in the charging ion current.
Even a single neuron may be able to produce significant lognormal features in its firing statistics due to noise in the charging ion current. A mathematical scheme introduced in advanced nanotechnology is relevant for the analysis of this mechanism in the simplest case, the integrate-and-fire model with white noise in the charging ion current.
△ Less
Submitted 19 January, 2015; v1 submitted 14 November, 2014;
originally announced December 2014.
-
Resistance noise at the metal-insulator transition in thermochromic VO2 films
Authors:
Zareh Topalian,
Shu-Yi Li,
Gunnar Niklasson,
Claes-Goran Granqvist,
Laszlo B. Kish
Abstract:
Thermochromic VO2 films were prepared by reactive DC magnetron sputtering onto heated sapphire substrates and were used to make 100-nm-thick samples that were 10 μm wide and 100 micron long. The resistance of these samples changed by a factor of about 2000 in the 50 < Ts < 70 C range of temperature Ts around the "critical" temperature Tc between a low-temperature semiconducting phase and a high-te…
▽ More
Thermochromic VO2 films were prepared by reactive DC magnetron sputtering onto heated sapphire substrates and were used to make 100-nm-thick samples that were 10 μm wide and 100 micron long. The resistance of these samples changed by a factor of about 2000 in the 50 < Ts < 70 C range of temperature Ts around the "critical" temperature Tc between a low-temperature semiconducting phase and a high-temperature metallic-like phase of VO2. Power density spectra S(f) were extracted for resistance noise around Tc and demonstrated unambiguous 1/f behavior. Data on S(10Hz)/Rs^2 scaled as Rs^x, where Rs is sample resistance; the noise exponent x was -2.6 for Ts < Tc and +2.6 for Ts > Tc. These exponents can be reconciled with the Pennetta-Trefan-Reggiani theory [C. Pennetta, G. Trefanan, and L. Reggiani, Phys. Rev. Lett. 85, 5238 (2000)] for lattice percolation with switching disorder ensuing from random defect generation and healing in steady state. Our work hence highlights the dynamic features of the percolating semiconducting and metallic-like regions around Tc in thermochromic VO2 films.
△ Less
Submitted 7 November, 2014;
originally announced November 2014.
-
Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system
Authors:
Laszlo B. Kish,
Zoltan Gingl,
Robert Mingesz,
Gergely Vadai,
Janusz Smulko,
Claes-Goran Granqvist
Abstract:
A recent paper by Gunn-Allison-Abbott (GAA) [L.J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into…
▽ More
A recent paper by Gunn-Allison-Abbott (GAA) [L.J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an incorrect operation since the single loop is essential for the security in the KLJN system, and hence GAA's asserted information leak is trivial. Another consequence is that a fully defended KLJN system would not be able to function due to its built-in current-comparison defense against active (invasive) attacks. In this paper we crack GAA's scheme via an elementary current comparison attack which yields negligible error probability for Eve even without averaging over the correlation time of the noise.
△ Less
Submitted 4 November, 2014;
originally announced November 2014.
-
On KLJN-based secure key distribution in vehicular communication networks
Authors:
X. Cao,
Y. Saez,
G. Pesti,
L. B. Kish
Abstract:
In a former paper [Fluct. Noise Lett., 13 (2014) 1450020] we introduced a vehicular communication system with unconditionally secure key exchange based on the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution scheme. In this paper, we address the secure KLJN key donation to vehicles. This KLJN key donation solution is performed lane-by-lane by using roadside key provider equipment embedded in th…
▽ More
In a former paper [Fluct. Noise Lett., 13 (2014) 1450020] we introduced a vehicular communication system with unconditionally secure key exchange based on the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution scheme. In this paper, we address the secure KLJN key donation to vehicles. This KLJN key donation solution is performed lane-by-lane by using roadside key provider equipment embedded in the pavement. A method to compute the lifetime of the KLJN key is also given. This key lifetime depends on the car density and gives an upper limit of the lifetime of the KLJN key for vehicular communication networks.
△ Less
Submitted 7 January, 2015; v1 submitted 20 September, 2014;
originally announced September 2014.
-
Enhanced usage of keys obtained by physical, unconditionally secure distributions
Authors:
Laszlo B. Kish
Abstract:
Unconditionally secure physical key distribution schemes are very slow, and it is practically impossible to use a one-time-pad based cipher to guarantee unconditional security for the encryption of data because using the key bits more than once gives out statistical information, for example via the known-plain-text-attack or by utilizing known components of the protocol and language statistics. He…
▽ More
Unconditionally secure physical key distribution schemes are very slow, and it is practically impossible to use a one-time-pad based cipher to guarantee unconditional security for the encryption of data because using the key bits more than once gives out statistical information, for example via the known-plain-text-attack or by utilizing known components of the protocol and language statistics. Here we outline a protocol that reduces this speed problem and allows almost-one-time-pad based communication with an unconditionally secure physical key of finite length. The physical, unconditionally secure key is not used for data encryption but is employed in order to generate and share a new software-based key without any known-plain-text component. The software-only-based key distribution is then changed from computationally secure to unconditionally secure, because the communicated key-exchange data (algorithm parameters, one-way functions of random numbers, etc.) are encrypted in an unconditionally secure way with a one-time-pad. For practical applications, this combined physical/software key distribution based communication looks favorable compared to the software-only and physical-only key distribution based communication whenever the speed of the physical key distribution is much lower than that of the software-based key distribution. A mathematical security proof of this new scheme remains an open problem.
△ Less
Submitted 5 May, 2015; v1 submitted 21 August, 2014;
originally announced August 2014.
-
Brain: Biological noise-based logic
Authors:
Laszlo B. Kish,
Claes-Goran Granqvist,
Sergey M. Bezrukov,
Tamas Horvath
Abstract:
Neural spikes in the brain form stochastic sequences, i.e., belong to the class of pulse noises. This stochasticity is a counterintuitive feature because extracting information - such as the commonly supposed neural information of mean spike frequency - requires long times for reasonably low error probability. The mystery could be solved by noise-based logic, wherein randomness has an important fu…
▽ More
Neural spikes in the brain form stochastic sequences, i.e., belong to the class of pulse noises. This stochasticity is a counterintuitive feature because extracting information - such as the commonly supposed neural information of mean spike frequency - requires long times for reasonably low error probability. The mystery could be solved by noise-based logic, wherein randomness has an important function and allows large speed enhancements for special-purpose tasks, and the same mechanism is at work for the brain logic version of this concept.
△ Less
Submitted 18 August, 2014;
originally announced August 2014.