Information Networks Secured by the Laws of Physics
نویسندگان
چکیده
In this paper, we survey the state of the art of the secure key exchange method that is secured by the laws of classical statistical physics, and involves the Kirchhoff's law and the generalized Johnson noise equation, too. We discuss the major characteristics and advantages of these schemes especially in comparison with quantum encryption, and analyze some of the technical challenges of its implementation, too. Finally, we outline some ideas about how to use already existing and currently used wire lines, such as power lines, phone lines, internet lines to implement unconditionally secure information networks. key words: Unconditionally secure communication; secure key exchange; secure communication via wire.
منابع مشابه
A Sudy on Information Privacy Issue on Social Networks
In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...
متن کاملAPPLICATION OF CHARGED SYSTEM SEARCH ALGORITHM TO WATER DISTRUBITION NETWORKS OPTIMIZATION
A charged system search algorithm (CSS) is applied to the optimal cost design of water distribution networks. This algorithm is inspired by the Coulomb and Gauss’s laws of electrostatics in physics. The CSS utilizes a number of charged particles which influence each other based on their fitness values and their separation distances considering the governing law of Coulomb. The well-known benchm...
متن کاملدیدگاههای روانپزشکان شهر تهران دربارهی قوانین بهداشت روان در ایران
AbstractObjectives: The aim of this project was to appraise the perspectives of Tehran psychiatrists on exist- ing mental health laws. Method: A questionnaire was provided either via mail or in person to 312 psychiatrists working in Tehran 160 of them responded. Data were analyzed by descriptive-statistical methods.Findings: Data obtained from the age groups of under and over 40 years old as w...
متن کاملGeneralization of Decomposed Integration Methods for Cost Effective Heat Exchanger Networks with Multiple Cost Laws
At many circumstances, in heat exchange processes several exchangers were used with different cost laws due to their pressure ratings, materials of construction and exchange3r types. In such circumstances traditional methods of pinch technology can not be led to minimum total annual cost may cause some other disadvantages like more complexity or higher maintenance. In this research work a n...
متن کاملAnalysis of Resting-State fMRI Topological Graph Theory Properties in Methamphetamine Drug Users Applying Box-Counting Fractal Dimension
Introduction: Graph theoretical analysis of functional Magnetic Resonance Imaging (fMRI) data has provided new measures of mapping human brain in vivo. Of all methods to measure the functional connectivity between regions, Linear Correlation (LC) calculation of activity time series of the brain regions as a linear measure is considered the most ubiquitous one. The strength of the dependence obl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEICE Transactions
دوره 95-B شماره
صفحات -
تاریخ انتشار 2012