Search results for: KLJN SECURE KEY EXCHANGE SYSTEM
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublicationA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange
PublicationThe Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...
-
Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities
PublicationIn relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublicationThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Ancillary services to grids provided with distributed generation
PublicationThe paper introduces system for utilization of the customer-side generated energy. Additionally system can secure some ancillary services to grids. Those services include: current active filtering, load voltage stabilization and in case of grid voltage faults - uninterruptible load supplying (possible with energy storage device). Presented experimental results confirm flexibility of this arrangement in processes of power delivery...
-
Whirling system of water exchangein breeding pools
PublicationTo secure the proper conditions of life for sea mammals existing in closed systems one has to maintain the character of the breeding basins (i.e. shape, dimensions, facing of walls and bottom, quality and motion of water) as natural as possible. An appropriate system of water exchange plays a very important role here. A full renewal of water is time-consuming, expensive and troublesome, so can be made only periodically, and should...
-
Interaction with medical data using QR-codes
PublicationBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
W-like bound entangled states and secure key distillation
PublicationWe construct multipartite entangled states with underlying W-type structuresatisfying positive partial transpose (PPT) condition under any (N −1)|1 partition. Then we showhow to distill a N-partite secure key from the states using two different methods: direct applicationof local filtering and novel random key distillation scheme in which we adopt the idea from recentresults on entanglement distillation. Open problems and possible...
-
Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?
PublicationAdvancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...
-
Secure key from bound entanglement
PublicationScharakteryzowaliśmy zestaw dzielonych kwantowych stanów, który zawiera kryptograficznie prywatny klucz. Pozwala nam to przerobić teorię prywatności jako paradygmat blisko związany z tą, która jest używana w manipulacjach splątania.
-
The methods of secure data transmission in the KNX system
PublicationThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Cache service for maps presentation in distributed information data exchange system
PublicationThe paper presents the proposition of caches implementation for map presentation in distributed information data exchange system. The concept of cache service is described in the context of distributed information data exchange system elements which control and present on maps positions and other identification data of vessels and other suspicious objects on the territorial sea, sea-coast and the internal sea-waters. The proposed...
-
Database for integration of information in distributed data exchange system elements of Border Guard
PublicationThe paper presents the database solution for integration of information in distributed data exchange system elements of the Polish Border Guard. The proposed database solution is described in the context of data exchange system elements which control position and store identification data of vessels (fishing, sports and sailing boats) and other suspicious objects on the territorial sea, sea-coast and the internal sea-waters controlled...
-
Impact of Innovative Financial Products on Financial Systems: Exchange Traded Products and the Polish Financial System
PublicationExchange Traded Products (ETPs) are one of the most recent and most rapidly developing financial products. As their assets grow they have an increasing impact on financial systems in many countries, including USA, UK or Japan. Development of ETPs is linked with many opportunities and threats for the local financial systems. Their correct assessment is becoming more difficult due to the growing complexity of the available products,...
-
Secure transmission of visual image in the VTS system using fingerprinting
Publication -
Key Role of CRF in the Skin Stress Response System
Publication -
Technical State Assessment of Charge Exchange System of Self-Ignition Engine, Based On the Exhaust Gas Composition Testing
PublicationThis paper presents possible use of results of exhaust gas composition testing of self - ignition engine for technical state assessment of its charge exchange system under assumption that there is strong correlation between considered structure parameters and output signals in the form of concentration of toxic compounds (ZT) as well as unambiguous character of their changes. Concentration of the analyzed ZT may be hence considered...
-
Rafał Leszczyna dr hab. inż.
PeopleDr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...
-
MAPSERVER – INFORMATION FLOW MANAGEMENT SOFTWARE FOR THE BORDER GUARD DISTRIBUTED DATA EXCHANGE SYSTEM
PublicationIn this paper the architecture of the software designed for management of position and identification data of floating and flying objects in Maritime areas controlled by Polish Border Guard is presented. The software was designed for managing information stored in a distributed system with two variants of the software, one for a mobile device installed on a vessel, an airplane or a car and second for a central server. The details...
-
Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras
PublicationThe study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.
-
Experimental Extraction of Secure Correlations from a Noisy Private State
PublicationWe report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...
-
Izabela Mironowicz dr hab. inż. arch.
People -
Sustainable Investing. Socio-Economic Impacts of Exchange-Traded Funds
PublicationSustainable Investing: Socio-Economic Impacts of Exchange-Traded Funds examines the social and economic effects of sustainable investing ETFs and their impacts on the global financial system. The book presents the key issues with regard to sustainable investing, discussing exchange-traded funds mechanisms and categories in comparison to competing investment funds. The book outlines the theoretical determinants of ETF markets development...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublicationIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Innovative investment funds and stability of financial systems: Nonparametric study of exchange-traded funds in Europe
PublicationThe main aim of the paper is investigation of the potential contribution of exchange-trade funds (ETFs) to the instability of the European financial systems. The paper begins with presentation of the key theoretical concepts with regard to ETFs and financial stability. We discuss the key attributes of ETFs as the innovative category of investment funds, their hypothesized impact on the financial stability as well as briefly describe...
-
Quantum privacy witness
PublicationWhile it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...
-
General paradigm for distilling classical key from quantum states
PublicationIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Exploring application relationships within enterprise system by matching messages in enterprise log
PublicationWith data becoming their key asset, large enterprises require data governance processes to maintain its quality. Because a large portion of business value in enterprise systems is usually delivered by legacy applications without proper documentation, there is a need for a better understanding of these applications and the data produced by them. In this paper, we present an approach to collecting insights into the data managed by...
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Simulation research on the tool cycle in automated manufacturing system at selected tool duplication levels
PublicationThe paper presents results of the research concerning impact of applied tool exchange rule on the efficiency of an automated manufacturing system. The research consider the tool duplication levels that constrain realisation of a manufacturing process. Presented study was based on the real industrial system data. The operating of the investigated system of manufacture, including tools necessary for its realisation, was modelled...
-
Comparison of Transmission Capacities of Two Regulation Systems: Lateral and in-phase Control Transformers
PublicationThis paper presents a comparison of regulation capabilities of lateral and in-phase control transformers in a selected node of a power system. Their regulation capabilities are presented, as well as cross-system exchange options.
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublicationBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Proof of Concept of Indoor Location System Using Long RFID Readers and Passive Tags
PublicationThe paper proposes a system for persons and objects location with the use of long radio-frequency identifications (RFIDs) readers. In order to investigate all aspects of the proposed location system, several key elements had to be analyzed, including the distance from which the tagged objects and the possibility of using more than one tag within one RFID range at the same time. When designing the system, it is also necessary to...
-
FORECASTING EXCHANGE RATES IN THE PROCESS OF THE ASSESSMENT OF CONSUMER RISK BANKRUPTCY IN CENTRAL EUROPE
PublicationThis paper focuses on the issue of forecasting the fluctuation of exchange rates as part of the early warning system against the risk of consumer bankruptcy. The author identified the main macroeconomic factors affecting the level of bankruptcies for households in Poland. The fluctuation of exchange rates, which directly affects the deterioration of the economic situation of borrowers who have opened credit accounts in a foreign...
-
Experimental certification of more than one bit of quantum randomness in the two inputs and two outputs scenario
PublicationOne of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality. They are a fundamental feature of the theory that allows two parties that share an entangled quantum system to observe correlations stronger than possible in classical physics. In addition to their theoretical significance, non-local correlations have practical applications, such as device-independent randomness generation, providing...
-
Practical I-Voting on Stellar Blockchain
PublicationIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
Electrical conductivity relaxation measurements - water uptake of BaCe0.6Zr0.2Y0.1Tb0.1O3-δ
Open Research DataFor Electrical Conductivity Relaxation (ECR) measurements, platinum reversible electrodes were applied in a four-probe arrangement and the BaCe0.6Zr0.2Y0.1Tb0.1O3-δ sample was measured in the ProboStat™ measurement system. The ECR measurements were performed in air in the temperature range of 450-800 ℃ after switching water partial pressure between...
-
Exchange-traded products in Germany: development and substitution of exchange-traded funds, exchange-traded commodities and exchange-traded notes.
PublicationResearch background: Exchange-traded products (ETPs) are one of the most rapidly growing categories of financial products. Their fast development has been boosted by innovative features. Three main categories of ETPs are exchange-traded funds (ETFs), exchange-traded commodities (ETCs) and exchange-traded notes (ETNs). ETCs and ETNs remain least known, even though their number on some stock exchanges is high. In Europe, Germany...
-
Massively parallel linear-scaling Hartree–Fock exchange and hybrid exchange–correlation functionals with plane wave basis set accuracy
PublicationWe extend our linear-scaling approach for the calculation of Hartree–Fock exchange energy using localized in situ optimized orbitals [Dziedzic et al., J. Chem. Phys. 139, 214103 (2013)] to leverage massive parallelism. Our approach has been implemented in the ONETEP (Order-N Electronic Total Energy Package) density functional theory framework, which employs a basis of non-orthogonal generalized Wannier functions (NGWFs) to achieve...
-
The Influence of Cooperation on the Operation of an MPC Controller Pair in a Nuclear Power Plant Turbine Generator Set
PublicationThe paper discusses the problem of cooperation between multiple model predictive control (MPC) systems. This approach aims at improving the control quality in electrical energy generation and forms the next step in a series of publications by the authors focusing on the optimization and control of electric power systems. Cooperation and cooperative object concepts in relation to a multi MPC system are defined and a cooperative control...
-
Biocompatibility and potential functionality of lanthanum-substituted cobalt ferrite spinels
PublicationBulk and nanostructurized lanthanum-cobalt spinels have attracted a lot of interest from researchers, due to their unique physical and chemical properties as well as functionalities, which are interesting for biomedical and electronic industries. In this manuscript we show that introducing small lanthanum (La3+) content can tune magnetic, electronic and cytotoxic properties of the CoFe2− xLaxO4 system (x ≤ 0.1). The mechanisms...
-
Exchange-Traded Funds on European Markets: Has Critical Mass been Reached? Implications for Financial Systems.
PublicationExchange-traded funds (ETFs) are one of the most rapidly expanding categories of financial products in Europe. One of the key yet still unanswered questions is whether European ETF markets have reached the size at which they could affect the financial systems. In our study, we examine 13 European countries during the period 2004–2017 in order to trace whether the share of ETFs in the total assets of investment funds has reached...
-
KONCEPCJA WSPÓŁPRACY SYSTEMU STRUMIENIOWEJ TRANSMISJI DANYCH CZASU RZECZYWISTEGO STRADAR Z EUROPEJSKIM SYSTEMEM EUROSUR
PublicationPrzedstawiono koncepcję współpracy systemów STRADAR i EUROSUR, w celu wymiany informacji związanych z ochroną granic UE. Opisano cechy zrealizowanego demonstratora STRADAR i zasady komunikacji oraz bezpieczeństwa wymiany informacji w systemie EUROSUR. Opisano warianty wymiany infor-macji pomiędzy systemami STRADAR i EUROSUR, od najprostszych, możliwych do zastosowania w obecnej wersji STRADAR, do zautomatyzowanych, wymagających...
-
The System of the Supervision and the Visualization of Multimedia Data for BG
PublicationMonitoring of country maritime border is an important task of the Border Guard. This task can be facilitated with the use of the technology enabling gathering information from distributed sources and its supervision and visualization. The system presented in the paper is an extension and enhancement of the previously developed distributed system map data exchange system. The added functionalities allow supplementation of map data...
-
Anna Rzeczycka dr hab.
PeopleAnna Rzeczycka is the deputy head of the Department of Finance at the Faculty of Economics and Management of the Gdańsk University of Technology. Publications are situated in the field of social sciences in the discipline of economics and finance. They include books, monographs, articles, publications and scientific editions of monographs and scientific journals. In terms of numbers, it includes the following items: 12 monographs...
-
Porównanie możliwości przesyłowych dwóch układów regulacyjnych: transformatorów z regulacją poprzeczną oraz transformatorów z regulacją wzdłużną
PublicationW artykule przedstawiono porównanie możliwości regulacyjnych transformatorów z regulacją poprzeczną oraz wzdłużną w wybranym węźle systemu elektroenergetycznego. Zaprezentowano możliwości regulacyjne tych układów oraz możliwości kształtowania wymiany międzysystemowej.
-
Integrated functional safety and cyber security analysis
PublicationThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...