Time synchronization protocol for the KLJN secure key exchange scheme
- URL: http://arxiv.org/abs/2207.05675v2
- Date: Thu, 14 Jul 2022 01:02:38 GMT
- Title: Time synchronization protocol for the KLJN secure key exchange scheme
- Authors: Laszlo B. Kish
- Abstract summary: The information theoretically secure Kirchhoff-law-Johnson-noise (KLJN) key exchange scheme is also potentially vulnerable against clock attacks.
We propose and explore various ways of clock synchronization for the KLJN system and propose an ultimate protocol that preserves time and hardware integrity under arbitrary attacks.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The information theoretically secure Kirchhoff-law-Johnson-noise (KLJN) key
exchange scheme, similarly to quantum key distribution (QKD), is also
potentially vulnerable against clock attacks, where Eve takes over the control
of clock synchronization in the channel. This short note aims to introduce a
time synchronization protocol scheme for Alice and Bob, which is resistant
against arbitrary time delay attacks, both symmetric and asymmetric ones. We
propose and explore various ways of clock synchronization for the KLJN system
and propose an ultimate protocol that preserves time and hardware integrity
under arbitrary attacks.
Related papers
- Digital Twin-Assisted Federated Learning with Blockchain in Multi-tier Computing Systems [67.14406100332671]
In Industry 4.0 systems, resource-constrained edge devices engage in frequent data interactions.
This paper proposes a digital twin (DT) and federated digital twin (FL) scheme.
The efficacy of our proposed cooperative interference-based FL process has been verified through numerical analysis.
arXiv Detail & Related papers (2024-11-04T17:48:02Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - The Road to Near-Capacity CV-QKD Reconciliation: An FEC-Agnostic Design [53.67135680812675]
A new codeword-based QKD reconciliation scheme is proposed.
Both the authenticated classical channel (ClC) and the quantum channel (QuC) are protected by separate forward error correction (FEC) coding schemes.
The proposed system makes QKD reconciliation compatible with a wide range of FEC schemes.
arXiv Detail & Related papers (2024-03-24T14:47:08Z) - PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis [1.765099515298011]
Precision Time Protocol (PTP) can accomplish high-precision time synchronization in trusted environments.
Time delay attacks pose the highest threat to the protocol, enabling attackers to diverge targeted clocks undetected.
This work proposes an approach to detect and counteract delay attacks against PTP based on cyclic path asymmetry measurements.
arXiv Detail & Related papers (2024-01-19T12:35:00Z) - Qubit-based distributed frame synchronization for quantum key distribution [9.43392013925968]
We propose a qubit-based distributed frame synchronization method that can achieve time recovery in a continuously running system.
Experimental results show that the proposed method outperforms the advanced qubit-based synchronization method Qubit4Sync.
We believe our method is applicable to a broad range of QKD scenarios, including drone-based QKD and quantum network construction.
arXiv Detail & Related papers (2023-08-25T03:17:43Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Qubit-based clock synchronization for QKD systems using a Bayesian
approach [0.0]
Qubit-based synchronization protocols directly use the transmitted quantum states to achieve synchronization.
We present a model system with accompanying simulations of an efficient three-state BB84 prepare-and-measure protocol with decoy states.
We find that we can achieve a 95 percent synchronization confidence in only 4,140 communication bin widths.
arXiv Detail & Related papers (2021-07-02T23:44:25Z) - Nonclassical Attack on a Quantum KeyDistribution System [0.0]
The article is focused on research of an attack on the quantum key distribution system and proposes a countermeasure method.
Results of the research show that quantum key distribution systems have vulnerabilities not only in the protocols, but also in other vital system components.
arXiv Detail & Related papers (2021-04-28T11:49:52Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Secure and efficient synchronization scheme for quantum key distribution [2.8114538315299558]
We propose an alternative synchronization scheme by fixing the relative delay of the signal time window among all SPDs.
The new scheme is not only immune to the vulnerability but also improves the synchronization time from usually a few seconds to tens of milliseconds.
arXiv Detail & Related papers (2020-02-25T04:41:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.