REAL

Information theoretic security by the laws of classical physics (plenary paper)

Mingesz, Róbert Zoltán and Kish, L. B. and Gingl, Zoltán and Granqvist, C. G. and Wen, H. and Peper, F. and Eubank, T. and Schmera, G. (2013) Information theoretic security by the laws of classical physics (plenary paper). ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING, 195. pp. 11-25. ISSN 2194-5357

[img]
Preview
Text
1206.2534.pdf
Available under License Creative Commons Attribution.

Download (560kB) | Preview

Abstract

It has been shown recently that the use of two pairs of resistors withenhanced Johnson-noise and a Kirchhoff-loop—i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol—for secure key distribution leads to information theoreticsecurity levels superior to those of a quantum key distribution, including a naturalimmunity against a man-in-the-middle attack. This issue is becoming particularlytimely because of the recent full cracks of practical quantum communicators, asshown in numerous peer-reviewed publications. This presentation first brieflysurveys the KLJN system and then discusses related, essential questions such as:what are perfect and imperfect security characteristics of key distribution, and howcan these two types of securities be unconditional (or information theoretical)?Finally the presentation contains a live demonstration.

Item Type: Article
Subjects: Q Science / természettudomány > Q1 Science (General) / természettudomány általában
SWORD Depositor: MTMT SWORD
Depositing User: MTMT SWORD
Date Deposited: 15 Apr 2024 14:31
Last Modified: 15 Apr 2024 14:31
URI: https://real.mtak.hu/id/eprint/192576

Actions (login required)

Edit Item Edit Item