Data Structures and Algorithms

1404 Submissions

[3] viXra:1404.0081 [pdf] replaced on 2014-05-15 23:12:47

On the “cracking” Scheme in the Paper “A Directional Coupler Attack Against the Kish Key Distribution System” by Gunn, Allison and Abbott

Authors: Hsien-Pu Chen, Laszlo B. Kish, Claes-Göran Granqvist, Gabor Schmera
Comments: 11 Pages. missing/incorrect abstract fixed; extended (second) version

Recently, Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf] proposed a new scheme to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law–Johnson-noise (KLJN) secure key distribution. We proved in a former paper [http://arxiv.org/pdf/1404.4664] that GAA’s mathematical model is unphysical. Here we analyze GAA’s cracking scheme and show that in the cable loss free case it serves less eavesdropping information than the old mean-square based attack, while in the loss-dominated case it offers no information. We also investigate GAA's experimental claim to be capable of distinguishing, with a poor statistics over a few correlation times, the distributions of two Gaussian noises with a relative variance difference of less than 10–8. Normally such distinctions would require hundreds of millions of correlations times to be observable. We identify several experimental artifacts due to poor design that can lead to GAA’s assertions; deterministic currents due to spurious harmonic components ground loop, DC offset; aliasing; non-Gaussian features including non-linearities and other non-idealities in the generators; and the time-derivative nature of their scheme enhancing all these aspects.
Category: Data Structures and Algorithms

[2] viXra:1404.0069 [pdf] submitted on 2014-04-09 06:17:49

Building of Networks of Natural Hierarchies of Terms Based on Analysis of Texts Corpora

Authors: D.V. Lande
Comments: 5 Pages. Russian language

The technique of building of networks of hierarchies of terms based on the analysis of chosen text corpora is offered. The technique is based on the methodology of horizontal visibility graphs. Constructed and investigated language network, formed on the basis of electronic preprints arXiv on topics of information retrieval.
Category: Data Structures and Algorithms

[1] viXra:1404.0054 [pdf] replaced on 2014-07-08 09:47:54

Securing Vehicle Communication Systems by the KLJN Key Exchange Protocol

Authors: Y. Saez, X. Cao, L.b. Kish, G. Pesti
Comments: 12 Pages. Paper accepted for publication at FNL on May 19, 2014

We review the security requirements for vehicular communication networks and provide a critical assessment of some typical communication security solutions. We also propose a novel unconditionally secure vehicular communication architecture that utilizes the Kirchhoff-law–Johnson-noise (KLJN) key distribution scheme.
Category: Data Structures and Algorithms