Information theoretic security by the laws of classical physics (plenary paper)

3Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Mingesz, R., Kish, L. B., Gingl, Z., Granqvist, C. G., Wen, H., Peper, F., … Schmera, G. (2013). Information theoretic security by the laws of classical physics (plenary paper). In Advances in Intelligent Systems and Computing (Vol. 195 AISC, pp. 11–25). Springer Verlag. https://doi.org/10.1007/978-3-642-33941-7_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free