Totally Secure Classical Communication Utilizing Johnson (-like) Noise and Kirchoff's Law

نویسنده

  • Laszlo B. Kish
چکیده

An absolutely secure, fast, inexpensive, robust, maintenance-free and low-power-consumption communication is proposed. The states of the information bit are represented by two resistance values. The sender and the receiver have such resistors available and they randomly select and connect one of them to the channel at the beginning of each clock period. The thermal noise voltage and current can be observed but Kirchoff’s law provides only a second-order equation. A secure bit is communicated when the actual resistance values at the sender’s side and the receiver’s side differ. Then the second order equation yields the two resistance values but the eavesdropper is unable to determine the actual locations of the resistors and to find out the state of the sender’s bit. The receiver knows that the sender has the inverse of his bit, similarly to quantum entanglement. The eavesdropper can decode the message if, for each bits, she inject current in the wire and measures the voltage change and the current changes in the two directions. However, in this way she gets discovered by the very first bit she decodes. Instead of thermal noise, proper external noise generators should be used when the communication is not aimed to be stealth. © 2005 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Totally Secure Classical Networks with Multipoint Telecloning (teleportation) of Classical Bits through Loops with Johnson-like Noise

First, we show a new inexpensive defense against intruders and the man-in-the-middle attack in the Kirchhoff's-loop-Johnson-like-noise (KLJN) cipher. Then instead of point-to-point communication, we propose a high efficiency, secure network. The (in the idealistic case totally secure) classical network is based on an improved version of the KLJN cipher. The network consists of two parallel netw...

متن کامل

Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise

First, we show a new inexpensive defense against intruders and the man-in-the-middle attack in the Kirchhoff's-loop-Johnson-like-noise (KLJN) cipher. Then instead of point-to-point communication, we propose a high efficiency, secure network. The (in the idealistic case totally secure) classical network is based on an improved version of the KLJN cipher. The network consists of two parallel netw...

متن کامل

Absolutely Secure Communications by Johnson-like Noise and Kirchhoff's Laws

We survey the most important results and some recent developments about the secure key exchange protocol where the security is based on the Second Law of Thermodynamics and the robustness of classical physical information. We conclude that a classical physical system offers a higher level of control and security during the communication. We also mention some recent attempts inspired by this com...

متن کامل

Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System

In this paper we determine the noise properties needed for unconditional security for the ideal Kirchhoff-Law-Johnson-Noise (KLJN) secure key distribution system using simple statistical analysis. It has already been shown using physical laws that resistors and Johnson-like noise sources provide unconditional security. However real implementations use artificial noise generators, therefore it i...

متن کامل

Enhanced Secure Key Exchange Schemes Based on the Johnson - Noise Scheme

We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme. While these practical improvements offer progressively enhanced security and/or speed for the non-ideal conditions, the fundamental physical laws providing the security remain the same.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005