all InfoSec news
Time synchronization protocol for the KLJN secure key exchange scheme. (arXiv:2207.05675v2 [cs.CR] UPDATED)
July 15, 2022, 1:20 a.m. | Laszlo B. Kish
cs.CR updates on arXiv.org arxiv.org
The information theoretically secure Kirchhoff-law-Johnson-noise (KLJN) key
exchange scheme, similarly to quantum key distribution (QKD), is also
potentially vulnerable against clock attacks, where Eve takes over the control
of clock synchronization in the channel. This short note aims to introduce a
time synchronization protocol scheme for Alice and Bob, which is resistant
against arbitrary time delay attacks, both symmetric and asymmetric ones. We
propose and explore various ways of clock synchronization for the KLJN system
and propose an ultimate protocol …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Security Engineer, Incident Response
@ Databricks | Remote - Netherlands
Associate Vulnerability Engineer - Mid-Atlantic region (Part-Time)
@ GuidePoint Security LLC | Remote in VA, MD, PA, NC, DE, NJ, or DC
Data Security Architect
@ Accenture Federal Services | Washington, DC
Identity Security Administrator
@ SailPoint | Pune, India