Skip to main content

Showing 1–50 of 124 results for author: Kish, L B

.
  1. Unconditionally Secure Wireless-Wired Ground-Satellite-Ground Communication Networks Utilizing Classical and Quantum Noise

    Authors: Lucas Truax, Sandip Roy, Laszlo B. Kish

    Abstract: In this paper, we introduce the Kirchhoff-Law-Johnson-Noise (KLJN) as an approach to securing satellite communications. KLJN has the potential to revolutionize satellite communication security through its combination of simplicity, cost-effectiveness, and resilience with unconditional security. Unlike quantum key distribution (QKD), which requires complex, fragile, and expensive infrastructure lik… ▽ More

    Submitted 11 June, 2025; originally announced June 2025.

    Journal ref: Fluctuation and Noise Letters Vol. 24, No. 3 (2025)

  2. arXiv:2506.00063  [pdf

    physics.gen-ph

    "Quantum supremacy" challenged. Instantaneous noise-based logic with benchmark demonstrations

    Authors: Nasir Kenarangui, Arthur Powalka, Laszlo B. Kish

    Abstract: Instantaneous Noise-Based Logic (INBL) represents a computational paradigm that offers a deterministic alternative to quantum computing. INBL encodes logical information in orthogonal stochastic processes ("noise-bits") and exploits their superpositions and nonlinear interactions to achieve an exponentially large computational space of dimension 2^M, where M corresponds to the number of noise-bits… ▽ More

    Submitted 29 May, 2025; originally announced June 2025.

    Comments: Invited Talk at the 27th International Conference on Noise and Fluctuations (ICNF-2025), June 16-20, Taormina, Sicily, Italy

  3. Simple Cracking of (Noise-Based) Dynamic Watermarking in Smart Grids

    Authors: Mehmet Yildirim, Nasir Kenarangui, Robert Balog, Laszlo B. Kish, Chanan Singh

    Abstract: Previous research employing a conceptual approach with a digital twin has demonstrated that (noise-based) dynamic watermarking is incapable of providing unconditional security in smart electrical grid systems. However, the implementation of digital twins can be prohibitively costly or infeasible due to limited available data on critical infrastructure. In this study, we first analyze the spectral… ▽ More

    Submitted 20 April, 2025; v1 submitted 18 June, 2024; originally announced June 2024.

    Comments: Published in Fluctuation and Noise Letters

    ACM Class: J.2.5

    Journal ref: Fluctuation and Noise Letters, Vol. 23, No. 06, 2450059 (2024)

  4. Smart Grids Secured By Dynamic Watermarking: How Secure?

    Authors: Kate Davis, Laszlo B. Kish, Chanan Singh

    Abstract: Unconditional security for smart grids is defined. Cryptanalyses of the watermarked security of smart grids indicate that watermarking cannot guarantee unconditional security unless the communication within the grid system is unconditionally secure. The successful attack against the dynamically watermarked smart grid remains valid even with the presence of internal noise from the grid. An open que… ▽ More

    Submitted 5 March, 2024; originally announced April 2024.

    Comments: Accepted for publication in Fluct. Noise Lett

  5. Non-invasive deep-brain stimulations by spatio-temporal fourier synthesis

    Authors: Laszlo B. Kish, Andrea Antal

    Abstract: A new type of non-invasive deep-brain stimulation is conceived and demonstrated by computer simulations. The process is based on spatio-temporal Fourier synthesis using multiple electrode pairs with sinusoidal current drive to limit skin sensations and concentrate the stimulus power to a small spatial volume and into large rare spikes in the times domain, while the signal power at the skin is stea… ▽ More

    Submitted 11 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: Accepted for publication in Fluctuation and Noise Letters. US patent was filed

    Journal ref: Fluctuation and Noise Letters, Vol. 23, No. 3 (2024) 2450049 (10 pages)

  6. Crypto analysis of the key distribution scheme using noise-free resistances

    Authors: Laszlo B. Kish

    Abstract: Known key exchange schemes offering information-theoretic (unconditional) security are complex and costly to implement. Nonetheless, they remain the only known methods for achieving unconditional security in key exchange. Therefore, the explorations for simpler solutions for information-theoretic security are highly justified. Lin et al. [1] proposed an interesting hardware key distribution scheme… ▽ More

    Submitted 18 November, 2023; originally announced December 2023.

    Comments: submitted for publication

    Journal ref: Fluctuation and Noise Letters (2024)

  7. arXiv:2310.03763  [pdf

    eess.SP q-bio.NC

    Contrast detection is enhanced by deterministic, high-frequency transcranial alternating current stimulation with triangle and sine waveform

    Authors: Weronika Potok, Onno van der Groen, Sahana Sivachelvam, Marc Bächinger, Flavio Fröhlich, Laszlo B. Kish, Nicole Wenderoth

    Abstract: Stochastic Resonance (SR) describes a phenomenon where an additive noise (stochastic carrier-wave) enhances the signal transmission in a nonlinear system. In the nervous system, nonlinear properties are present from the level of single ion channels all the way to perception and appear to support the emergence of SR. For example, SR has been repeatedly demonstrated for visual detection tasks, also… ▽ More

    Submitted 28 September, 2023; originally announced October 2023.

    Comments: accepted for publication in J. Neurophysiology

    Journal ref: Journal of Neurophysiology 130, 458-473, 2023

  8. arXiv:2309.04899  [pdf

    cs.CR

    Transient Attacks against the VMG-KLJN Secure Key Exchanger

    Authors: Shahriar Ferdous, Laszlo B. Kish

    Abstract: The security vulnerability of the Vadai, Mingesz, and Gingl (VMG) Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger, as presented in the publication "Nature, Science Report 5 (2015) 13653," has been exposed to transient attacks. Recently an effective defense protocol was introduced (Appl. Phys. Lett. 122 (2023) 143503) to counteract mean-square voltage-based (or mean-square current-based) transient… ▽ More

    Submitted 29 September, 2023; v1 submitted 9 September, 2023; originally announced September 2023.

  9. arXiv:2305.00984  [pdf

    cs.ET cs.AI

    Ternary Instantaneous Noise-based Logic

    Authors: Laszlo B. Kish

    Abstract: One of the possible representations of three-valued instantaneous noise-based logic is proposed. The third value is an uncertain bit value, which can be useful in artificial intelligence applications. There is a forth value, too, that can represent a non-existing bit (vacuum-state) that is the same (1 numeric value) for all bits, however that is a squeezed state common for all bits. Some logic gat… ▽ More

    Submitted 9 May, 2023; v1 submitted 30 April, 2023; originally announced May 2023.

    Comments: submitted for publication, new reference added, small corrections

  10. arXiv:2302.06449  [pdf

    cs.ET

    XOR and XNOR gates in instantaneous noise based logic

    Authors: Mohammad B. Khreishah, Walter C. Daugherity, Laszlo B. Kish

    Abstract: In this paper, we propose a new method of applying the XOR and XNOR gates on exponentially large superpositions in Instantaneous Noise-Based Logic. These new gates are repeatable, and they can achieve an exponential speed up in computation with a polynomial requirement in hardware complexity.

    Submitted 10 February, 2023; originally announced February 2023.

  11. arXiv:2302.05607  [pdf

    cs.CR

    Transient Attack against the KLJN Secure Key Exchanger

    Authors: Shahriar Ferdous, Laszlo B. Kish

    Abstract: We demonstrate the security vulnerability of the ideal Kirchhoff-Law-Johnson-Noise (KLJN) key exchanger against transient attacks. Transients start when Alice and Bob connect the wire to their chosen resistor at the beginning of each clock cycle. A transient attack takes place during a short duration of time, before the transients reflected from the end of Alice and Bob mix together. The informati… ▽ More

    Submitted 11 February, 2023; originally announced February 2023.

  12. arXiv:2210.07088  [pdf

    physics.gen-ph

    "Quantum supremacy" revisited: Low-complexity, deterministic solutions of the original Deutsch-Jozsa problem in classical physical systems

    Authors: Laszlo B. Kish

    Abstract: The original Deutsch-Jozsa (oDJ) problem is for an oracle (realized here as a database) of size N, where, according to their claim, the deterministic solution of the problem on a classical Turing computer requires O(N) computational complexity. They produced the famous Deutsch-Jozsa quantum algorithm that offered an exponential speedup over the classical computer, namely O[log(N)] complexity for t… ▽ More

    Submitted 8 February, 2023; v1 submitted 11 October, 2022; originally announced October 2022.

    Comments: Revised version: original DJ problem

    Journal ref: Royal Society Open Science 10:221327 (March 1, 2023)

  13. arXiv:2210.05121  [pdf

    cs.CR

    Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger

    Authors: Shahriar Ferdous, Christiana Chamon, Laszlo B. Kish

    Abstract: In this paper, the vulnerability of the Vadai, Mingesz and Gingl (VMG)- Kirchhoff-Law-Johnson-Noise (KLJN) Key Exchanger (Nature, Science Report 5 (2015) 13653) against two active attacks is demonstrated. The security vulnerability arises from the fact that the effective driving impedances are different between the HL and LH cases for the VMG-KLJN scheme; whereas for the ideal KLJN scheme they are… ▽ More

    Submitted 13 November, 2022; v1 submitted 10 October, 2022; originally announced October 2022.

  14. arXiv:2207.05675  [pdf

    cs.CR quant-ph

    Time synchronization protocol for the KLJN secure key exchange scheme

    Authors: Laszlo B. Kish

    Abstract: The information theoretically secure Kirchhoff-law-Johnson-noise (KLJN) key exchange scheme, similarly to quantum key distribution (QKD), is also potentially vulnerable against clock attacks, where Eve takes over the control of clock synchronization in the channel. This short note aims to introduce a time synchronization protocol scheme for Alice and Bob, which is resistant against arbitrary time… ▽ More

    Submitted 13 July, 2022; v1 submitted 3 July, 2022; originally announced July 2022.

    Comments: In press at Fluctuation and Noise Letters. Coming out in the October 2022 issue

  15. arXiv:2110.03088  [pdf

    cs.CR

    Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol

    Authors: Christiana Chamon, Shahriar Ferdous, Laszlo B. Kish

    Abstract: This paper introduces and demonstrates four new statistical attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks utilize compromised random number generators at Alice's/Bob's site(s). The case of partial correlations between Alice's/Bob's and Eve's probing noises is explored, that is, Eve's knowledge of Alice's and Bob's noises is limited but not zero. We… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.10429, arXiv:2012.02848

  16. arXiv:2110.01137  [pdf

    cs.CR

    From cold resistor to secure key exchanger

    Authors: Jiaao Song, Laszlo B. Kish

    Abstract: Utilizing a formerly published cold resistor circuitry, a secure key exchange system is conceived and explored. A circuit realization of the system is constructed and simulated. Similarly to the Pao-Lo key exchanger, this system is secure in the steady-state limit but crackable in the transient situations.

    Submitted 3 October, 2021; originally announced October 2021.

  17. arXiv:2108.09370  [pdf

    cs.CR

    Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol

    Authors: Christiana Chamon, Laszlo B. Kish

    Abstract: This paper introduces a new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attack is based on the nonlinearity of the noise generators. We explore the effect of total distortion (TD) at the second order (D2), third order (D3), and a combination of the second and third orders (D2,3) on the security of the KLJN scheme. It is demonstrated that a as little as 1%… ▽ More

    Submitted 20 August, 2021; originally announced August 2021.

    Comments: 11 pages, 5 figures

  18. Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security

    Authors: Shahriar Ferdous, Christiana Chamon, Laszlo B. Kish

    Abstract: In (Nature) Science Report 5 (2015) 13653, Vadai, Mingesz and Gingl (VMG) introduce a new Kirchhoff-law-Johnson-noise (KLJN) secure key exchanger that operates with 4 arbitrary resistors (instead of 2 arbitrary resistance values forming 2 identical resistor pairs in the original system). They state that in this new, VMG-KLJN, non-equilibrium system with nonzero power flow, the security during the… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

    Journal ref: Fluctuation and Noise Letter 20 (2021) 2130002 , (open access)

  19. AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme

    Authors: Mutaz Melhem, Christiana Chamon, Shahriar Ferdous, Laszlo B. Kish

    Abstract: A new attack against the Kirchhoff-Law-Johnson-Noise(KLJN) secure key exchange scheme is introduced. The attack exploits a parasitic (periodic) AC voltage-source at either Alice or Bob ends. Such situations exist due to AC ground loops and electromagnetic interference (EMI). In the low-frequency case, the procedure is the generalized form of the former DC ground loop based attack. In the high-freq… ▽ More

    Submitted 22 May, 2020; originally announced May 2020.

    Comments: 17 pages, 6 figures

  20. arXiv:2005.10429  [pdf, other

    cs.CR eess.SY

    Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol

    Authors: Christiana Chamon, Shahriar Ferdous, Laszlo B. Kish

    Abstract: This paper introduces and demonstrates two new attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme. The attacks are based on random number generators with compromised security. First we explore the situation in which Eve knows the seed of both Alice's and Bob's random number generators. We show that in this situation Eve can crack the secure key bit within a fraction… ▽ More

    Submitted 20 May, 2020; originally announced May 2020.

    Comments: 14 pages, 11 figures

  21. Fluctuation-Enhanced Sensing: Review of Practical Issues

    Authors: Graziella Scandurra, Janusz Smulko, Laszlo B. Kish

    Abstract: We discuss some of the fundamental practical limitations of the Fluctuation-Enhanced Sensing of odors and gases. We address resolution, measurement speed, reproducibility, memory and other problems such as humidity. Various techniques and ideas are presented to overcome these problems. Circuit solutions are also discussed.

    Submitted 2 March, 2020; originally announced April 2020.

    Comments: submitted for publication

    Journal ref: Appl. Sci. 10 (2020) 5818

  22. arXiv:2002.04062  [pdf

    eess.SP physics.bio-ph

    Ternary Fingerprints with Reference Odor for Fluctuation-Enhanced Sensing

    Authors: X. You, L. B. Kish, J. -L. Seguin, M. D. King

    Abstract: An improved method for Fluctuation Enhanced Sensing (FES) is introduced. We enhanced the old binary fingerprinting method, where the fingerprint bit values were +/- 1, by introducing ternary fingerprints utilizing a reference odor. In the ternary method, the fingerprint bit values are -1, 0, and +1 where the 0 value stands for the situation where the slope of the spectrum is identical to that of t… ▽ More

    Submitted 30 January, 2020; originally announced February 2020.

    Comments: submitted for publication

  23. Generalized DC loop current attack against the KLJN secure key exchange scheme

    Authors: Mutaz Y. Melhem, Laszlo B. Kish

    Abstract: A new attack against the Kirchhoff Law Johnson Noise (KLJN) secure key distribution system is studied with unknown parasitic DC voltage sources at both Alices and Bobs ends. This paper is the generalization of our earlier investigation with a single end parasitic source. Under the assumption that Eve does not know the values of the parasitic sources, a new attack, utilizing the current generated b… ▽ More

    Submitted 30 September, 2019; originally announced October 2019.

    Comments: 11 pages, 6 Figures, and Journal paper

    Journal ref: Metrol. Meas. Syst., Vol. 26 (2019) No. 4, pp. 607-616

  24. arXiv:1905.03162  [pdf

    cs.ET quant-ph

    Entanglement, and unsorted database search in noise-based logic

    Authors: Laszlo B. Kish, Walter Daugherity

    Abstract: We explore the collapse of "wavefunction" and the measurement of entanglement in the superpositions of hyperspace vectors in classical physical instantaneous-noise-based logic (INBL). We find both similarities with and major differences from the related properties of quantum systems. Two search algorithms utilizing the observed features are introduced. For the first one we assume an unsorted names… ▽ More

    Submitted 23 July, 2019; v1 submitted 30 April, 2019; originally announced May 2019.

    Comments: minor revisions following reviewers' comments

    Journal ref: Appl. Sci. 9 (2019) 3029

  25. arXiv:1806.05596  [pdf

    cs.CR

    A Static-Loop-Current Attack against the KLJN Secure Key Exchange System

    Authors: Mutaz Y. Melhem, Laszlo B. Kish

    Abstract: A new attack against the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution system is explored. The attack is based on utilizing a parasitic dc-voltage-source in the loop. Relevant situations often exist in the low-frequency limit in practical systems, especially when the communication is over a distance, due to a ground loop and/or electromagnetic interference (EMI). Surprisingly, the usual curr… ▽ More

    Submitted 3 October, 2018; v1 submitted 14 June, 2018; originally announced June 2018.

    Comments: after major revision

  26. Does a standalone, "cold" (low-thermal-noise), linear resistor exist without cooling?

    Authors: Jiaao Song, Laszlo B. Kish

    Abstract: Classical ways of cooling require some of these elements: phase transition, compressor, non-linearity, valve, and/or switch. A recent example is the 2018 patent of Linear Technology Corporation; they utilize the shot noise of a diode to produce a standalone nonlinear resistor that has T/2 noise temperature (about 150 Kelvin). While such "resistor" can cool its environment when it is AC coupled to… ▽ More

    Submitted 15 May, 2018; originally announced May 2018.

    Comments: accepted for publication

    Journal ref: Vol. 17, No. 4 (2018) 1850030

  27. Noise-based logic gates by operations on the reference system

    Authors: Laszlo B. Kish, Walter Daugherity

    Abstract: We propose a new, low-complexity solution to realize multi-input-bit gates acting on exponentially large superpositions in noise-based logic processors. Two examples are shown, the NOT gate and the CNOT gate. The operations can be executed and repeated with polynomial time and hardware complexity. The lack of a solution of this problem had been one of the major issues prohibiting the efficient rea… ▽ More

    Submitted 14 September, 2018; v1 submitted 26 March, 2018; originally announced March 2018.

    Comments: published

    Journal ref: Fluctuation and Noise Letters Vol. 17, No. 4 (2018) 1850033

  28. arXiv:1706.01459  [pdf

    physics.gen-ph

    Information entropy and thermal entropy: apples and oranges

    Authors: Laszlo B. Kish, David K. Ferry

    Abstract: The frequent misunderstanding of information entropy is pointed out. It is shown that, contrary to fortuitous situations and common beliefs, there is no general interrelation between the information entropy and the thermodynamical entropy. We point out that the change of information entropy during measurement is determined by the resolution of the measurement instrument and these changes do not ha… ▽ More

    Submitted 17 July, 2017; v1 submitted 5 June, 2017; originally announced June 2017.

    Comments: This version is accepted for publication in the Journal of Computational Electronics, on July 17, 2017

  29. Second Law based definition of passivity/activity of devices

    Authors: Kyle Sundqvist, David K. Ferry, Laszlo B. Kish

    Abstract: Recently, our efforts to clarify the old question, if a memristor is a passive or active device [1], triggered debates between engineers, who have had advanced definitions of passivity/activity of devices, and physicists with significantly different views about this seemingly simple question. This debate triggered our efforts to test the well-known engineering concepts about passivity/activity in… ▽ More

    Submitted 25 August, 2017; v1 submitted 22 May, 2017; originally announced May 2017.

    Comments: Accepted for publication in Physics Letters A. (August 17, 2017)

  30. arXiv:1703.09064  [pdf

    cs.ET

    Memristor equations: incomplete physics and undefined passivity/activity

    Authors: Kyle Sundqvist, David K. Ferry, Laszlo B. Kish

    Abstract: In his seminal paper, Chua presented a fundamental physical claim by introducing the memristor, "The missing circuit element". The memristor equations were originally supposed to represent a passive circuit element because, with active circuitry, arbitrary elements can be realized without limitations. Therefore, if the memristor equations do not guarantee that the circuit element can be realized b… ▽ More

    Submitted 25 August, 2017; v1 submitted 23 March, 2017; originally announced March 2017.

    Comments: Accepted for publication in Fluctuation and Noise Letters (August 5)

  31. Comments on "sub-KBT micro-electromechanical irreversible logic gate"

    Authors: Laszlo B. Kish

    Abstract: In a recent article, Nature Communications 7 (2016) 12068, the authors claimed that they demonstrated sub-kBT energy dissipation at elementary logic operations. However, the argumentation is invalid because it neglects the dominant source of energy dissipation, namely, the charging energy of the capacitance of the input electrode, which totally dissipates during the full (0-1-0) cycle of logic val… ▽ More

    Submitted 20 July, 2016; v1 submitted 30 June, 2016; originally announced June 2016.

    Comments: Version after galley proof corrections. Fluctuation and Noise Letters, in press

    Journal ref: Fluctuation and Noise Letters Vol. 15, No. 4 (2016) 1620001

  32. Comments On "A New Transient Attack On The Kish Key Distribution System"

    Authors: Laszlo Bela Kish, Claes Goran Granqvist

    Abstract: A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These de… ▽ More

    Submitted 27 May, 2016; originally announced June 2016.

    Comments: Accepted for publication in the journal Metrology and Measurement Systems (May 2016)

    Journal ref: Metrology and Measurement Systems, Vol. 23 (2016), No. 3, pp. 321-331

  33. arXiv:1605.02355  [pdf

    cs.ET cs.CR

    Unconditionally secure credit/debit card chip scheme and physical unclonable function

    Authors: Laszlo Bela Kish, Kamran Entesari, Claes-Goran Granqvist, Chiman Kwan

    Abstract: The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths b… ▽ More

    Submitted 20 July, 2016; v1 submitted 8 May, 2016; originally announced May 2016.

    Comments: This version is accepted for publication in Fluctuation and Noise Letters

  34. Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'"

    Authors: Laszlo B. Kish, Claes-G. Granqvist, Sunil P. Khatri, Ferdinand Peper

    Abstract: We prove that statistical information theoretic quantities, such as information entropy, cannot generally be interrelated with the lower limit of energy dissipation during information erasure. We also point out that, in deterministic and error-free computers, the information entropy of memories does not change during erasure because its value is always zero. On the other hand, for information-theo… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

    Comments: Journal of Computational Electronics (Springer), in press (currently web-published)

  35. arXiv:1512.03685  [pdf

    cs.CR cs.ET physics.class-ph

    Current Injection Attack against the KLJN Secure Key Exchange

    Authors: Hsien-Pu Chen, Muneer Mohammad, Laszlo B. Kish

    Abstract: The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show th… ▽ More

    Submitted 1 April, 2016; v1 submitted 9 December, 2015; originally announced December 2015.

    Journal ref: Metrology and Measurement Systems, Vol. 23 (2016), No. 2, pp. 173-181

  36. arXiv:1511.06795  [pdf, ps, other

    cs.CR

    Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange

    Authors: Elias Gonzalez, Laszlo B. Kish

    Abstract: As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given se… ▽ More

    Submitted 20 November, 2015; originally announced November 2015.

    Comments: 17 pages, 2 figures, submitted for publication

  37. Drawing from hats by noise-based logic

    Authors: Bruce Zhang, Laszlo B. Kish, Claes-Goran Granqvist

    Abstract: We utilize the asymmetric random telegraph wave-based instantaneous noise-base logic scheme to represent the problem of drawing numbers from a hat, and we consider two identical hats with the first 2^N integer numbers. In the first problem, Alice secretly draws an arbitrary number from one of the hats, and Bob must find out which hat is missing a number. In the second problem, Alice removes a know… ▽ More

    Submitted 9 January, 2016; v1 submitted 11 November, 2015; originally announced November 2015.

    Comments: Accepted for Publication in the International Journal of Parallel, Emergent and Distributed Systems. December 17, 2015

  38. Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange

    Authors: Laszlo Bela Kish, Claes-Goran Granqvist

    Abstract: We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can… ▽ More

    Submitted 1 October, 2015; v1 submitted 27 September, 2015; originally announced September 2015.

    Comments: submitted for journal publication; 8 pages, 4 figures

    Journal ref: Metrology and Measurement Systems, Volume 23, Issue 1, Pages 3-11, 2016

  39. arXiv:1508.02984  [pdf

    cs.ET cs.CR physics.class-ph

    Cable Capacitance Attack against the KLJN Secure Key Exchange

    Authors: Hsien-Pu Chen, Elias Gonzalez, Yessica Saez, Laszlo B. Kish

    Abstract: The security of the Kirchhoff-law-Johnson-(like)-noise (KLJN) key exchange system is based on the Fluctuation-Dissipation-Theorem of classical statistical physics. Similarly to quantum key distribution, in practical situations, due to the non-idealities of the building elements, there is a small information leak, which can be mitigated by privacy amplification or other techniques so that the uncon… ▽ More

    Submitted 26 October, 2015; v1 submitted 11 August, 2015; originally announced August 2015.

    Comments: Accepted for publication in the journal: Information

    Journal ref: Information 2015, 6(4), 719-732

  40. Zero and negative energy dissipation at information-theoretic erasure

    Authors: Laszlo B. Kish, Claes G. Granqvist, Sunil P. Khatri, Ferdinand Peper

    Abstract: We introduce information-theoretic erasure based on Shannon's binary channel formula. It is pointed out that this type of erasure is a natural energy-dissipation-free way in which information is lost in double-potential-well memories, and it may be the reason why the brain can forget things effortlessly. We also demonstrate a new non-volatile, charge-based memory scheme wherein the erasure can be… ▽ More

    Submitted 23 September, 2015; v1 submitted 30 July, 2015; originally announced July 2015.

    Comments: accepted for publication and is in press at the Journal of Computational Electronics

    Journal ref: Journal of Computational Electronics 14 (2015) 1-5

  41. arXiv:1505.02749  [pdf

    physics.gen-ph

    Waves in a short cable at low frequencies, or just hand-waving?

    Authors: L. B. Kish, S. P. Chen, C. G. Granqvist, J. M. Smulko

    Abstract: We address the question of low-frequency signals in a short cable, which are often considered as waves in engineering calculations. Such an assumption violates several laws of physics, but exact calculations can be carried out via linear network theory.

    Submitted 16 April, 2015; originally announced May 2015.

    Comments: Invited paper at the 23'rd International Conference on Noise and Fluctuations, 2015

  42. arXiv:1504.08229  [pdf

    physics.gen-ph cond-mat.stat-mech

    Zero-point term and quantum effects in the Johnson noise of resistors: A critical appraisal

    Authors: Laszlo B. Kish, Gunnar A. Niklasson, Claes G. Granqvist

    Abstract: There is a longstanding debate about the zero-point term in the Johnson noise voltage of a resistor. This term originates from a quantum-theoretical treatment of the Fluctuation-Dissipation Theorem (FDT). Is the zero-point term really there, or is it only an experimental artefact, due to the uncertainty principle, for phase-sensitive amplifiers? Could it be removed by renormalization of theories?… ▽ More

    Submitted 20 December, 2015; v1 submitted 22 April, 2015; originally announced April 2015.

    Comments: Accepted for publication in the Journal of Statistical Mechanics: Theory and Experiment. December 20, 2015

    Journal ref: J. Stat. Mech. (2016) 054006

  43. Resource requirements and speed versus geometry of unconditionally secure physical key exchanges

    Authors: Elias Gonzalez, Robert S. Balog, Laszlo B. Kish

    Abstract: The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information theoretically secure are quantum key distribution (QKD) and Kirchoff-law-Johnson-noise (KLJN). However, these concepts require a dedicated connection between hosts in peer-to-pee… ▽ More

    Submitted 24 April, 2015; originally announced April 2015.

    Comments: 13 pages, 7 figures, MDPI Entropy

    Journal ref: Entropy 2015, 17(4), pp. 2010-2024

  44. Critical Remarks on Landauer's principle of erasure-dissipation

    Authors: Laszlo B. Kish, Claes-Goran Granqvist, Sunil P. Khatri, Janusz Smulko

    Abstract: We briefly address Landauer's Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer's derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, dampi… ▽ More

    Submitted 31 March, 2015; v1 submitted 22 September, 2014; originally announced December 2014.

    Comments: Earlier version was published as: http://www.worldscientific.com/doi/abs/10.1142/S2010194514603640 Present (expanded/modified) version: Internat. Conf. Noise and Fluctuations, 2015, to be published

  45. arXiv:1412.1778  [pdf

    physics.bio-ph q-bio.NC

    Lognormal distribution of firing time and rate from a single neuron?

    Authors: Eszter A. Kish, Claes-Goran Granqvist, Andras Der, Laszlo B. Kish

    Abstract: Even a single neuron may be able to produce significant lognormal features in its firing statistics due to noise in the charging ion current. A mathematical scheme introduced in advanced nanotechnology is relevant for the analysis of this mechanism in the simplest case, the integrate-and-fire model with white noise in the charging ion current.

    Submitted 19 January, 2015; v1 submitted 14 November, 2014; originally announced December 2014.

    Comments: Accepted for publication in Cognitive Neurodynamics (Springer)

    Journal ref: Cognitive Neurodynamics vol. 9 (2015) pp. 459-462

  46. arXiv:1411.2026  [pdf

    cond-mat.mtrl-sci cond-mat.mes-hall

    Resistance noise at the metal-insulator transition in thermochromic VO2 films

    Authors: Zareh Topalian, Shu-Yi Li, Gunnar Niklasson, Claes-Goran Granqvist, Laszlo B. Kish

    Abstract: Thermochromic VO2 films were prepared by reactive DC magnetron sputtering onto heated sapphire substrates and were used to make 100-nm-thick samples that were 10 μm wide and 100 micron long. The resistance of these samples changed by a factor of about 2000 in the 50 < Ts < 70 C range of temperature Ts around the "critical" temperature Tc between a low-temperature semiconducting phase and a high-te… ▽ More

    Submitted 7 November, 2014; originally announced November 2014.

    Comments: submitted for publication, this topic is condensed matter physics

    Journal ref: J. Appl. Phys. 117, 025303 (2015)

  47. Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system

    Authors: Laszlo B. Kish, Zoltan Gingl, Robert Mingesz, Gergely Vadai, Janusz Smulko, Claes-Goran Granqvist

    Abstract: A recent paper by Gunn-Allison-Abbott (GAA) [L.J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into… ▽ More

    Submitted 4 November, 2014; originally announced November 2014.

    Comments: Accepted for publication in Fluctuation and Noise Letters, on November 3, 2014

    Journal ref: Fluct. Noise Lett. 14 (2015) 1550011

  48. On KLJN-based secure key distribution in vehicular communication networks

    Authors: X. Cao, Y. Saez, G. Pesti, L. B. Kish

    Abstract: In a former paper [Fluct. Noise Lett., 13 (2014) 1450020] we introduced a vehicular communication system with unconditionally secure key exchange based on the Kirchhoff-Law-Johnson-Noise (KLJN) key distribution scheme. In this paper, we address the secure KLJN key donation to vehicles. This KLJN key donation solution is performed lane-by-lane by using roadside key provider equipment embedded in th… ▽ More

    Submitted 7 January, 2015; v1 submitted 20 September, 2014; originally announced September 2014.

    Comments: Accepted for publication

    Journal ref: Fluct. Noise Lett., Vol. 14, No. 1 (2015) 1550008 (11 pages)

  49. Enhanced usage of keys obtained by physical, unconditionally secure distributions

    Authors: Laszlo B. Kish

    Abstract: Unconditionally secure physical key distribution schemes are very slow, and it is practically impossible to use a one-time-pad based cipher to guarantee unconditional security for the encryption of data because using the key bits more than once gives out statistical information, for example via the known-plain-text-attack or by utilizing known components of the protocol and language statistics. He… ▽ More

    Submitted 5 May, 2015; v1 submitted 21 August, 2014; originally announced August 2014.

    Comments: this revised version is published

    Journal ref: Fluctuation and Noise Letters 14 (2015) 1550007

  50. Brain: Biological noise-based logic

    Authors: Laszlo B. Kish, Claes-Goran Granqvist, Sergey M. Bezrukov, Tamas Horvath

    Abstract: Neural spikes in the brain form stochastic sequences, i.e., belong to the class of pulse noises. This stochasticity is a counterintuitive feature because extracting information - such as the commonly supposed neural information of mean spike frequency - requires long times for reasonably low error probability. The mystery could be solved by noise-based logic, wherein randomness has an important fu… ▽ More

    Submitted 18 August, 2014; originally announced August 2014.

    Comments: paper in press

    Journal ref: Advances in Cognitive Neurodynamics 2015, pp 319-322