July 13, 2022, 1:20 a.m. | Laszlo B. Kish

cs.CR updates on arXiv.org arxiv.org

The information theoretically secure Kirchhoff-law-Johnson-noise (KLJN) key
exchange scheme, similarly to quantum key distribution (QKD), is also
potentially vulnerable against clock attacks, where Eve takes over the control
of clock synchronization in the channel. This short note aims to introduce a
time synchronization protocol scheme for Alice and Bob, which is resistant
against arbitrary time delay attacks, both symmetric and asymmetric ones. We
propose and explore various ways of clock synchronization for the KLJN system
and propose an ultimate protocol …

exchange key protocol

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Consultant

@ Auckland Council | Central Auckland, NZ, 1010

Security Engineer, Threat Detection

@ Stripe | Remote, US

DevSecOps Engineer (Remote in Europe)

@ CloudTalk | Prague, Prague, Czechia - Remote

Security Architect

@ Valeo Foods | Dublin, Ireland

Security Specialist - IoT & OT

@ Wallbox | Barcelona, Catalonia, Spain