Information Networks Secured by the Laws of Physics

نویسندگان

  • Laszlo B. Kish
  • Ferdinand Peper
چکیده

In this paper, we survey the state of the art of the secure key exchange method that is secured by the laws of classical statistical physics, and involves the Kirchhoff's law and the generalized Johnson noise equation, too. We discuss the major characteristics and advantages of these schemes especially in comparison with quantum encryption, and analyze some of the technical challenges of its implementation, too. Finally, we outline some ideas about how to use already existing and currently used wire lines, such as power lines, phone lines, internet lines to implement unconditionally secure information networks. key words: Unconditionally secure communication; secure key exchange; secure communication via wire.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

APPLICATION OF CHARGED SYSTEM SEARCH ALGORITHM TO WATER DISTRUBITION NETWORKS OPTIMIZATION

A charged system search algorithm (CSS) is applied to the optimal cost design of water distribution networks. This algorithm is inspired by the Coulomb and Gauss’s laws of electrostatics in physics. The CSS utilizes a number of charged particles which influence each other based on their fitness values and their separation distances considering the governing law of Coulomb. The well-known benchm...

متن کامل

دیدگاه‌های روانپزشکان شهر تهران درباره‌ی قوانین بهداشت روان در ایران

 AbstractObjectives: The aim of this project was to appraise the perspectives of Tehran psychiatrists on exist- ing mental health laws. Method: A questionnaire was provided either via mail or in person to 312 psychiatrists working in Tehran 160 of them responded. Data were analyzed by descriptive-statistical methods.Findings: Data obtained from the age groups of under and over 40 years old as w...

متن کامل

Generalization of Decomposed Integration Methods for Cost Effective Heat Exchanger Networks with Multiple Cost Laws

At many circumstances, in heat exchange processes several exchangers were used with different cost laws due to their pressure ratings, materials of construction and exchange3r types. In such circumstances traditional methods of pinch technology can not be led to minimum total annual cost may cause some other disadvantages like more complexity or higher maintenance. In this research work a n...

متن کامل

Analysis of Resting-State fMRI Topological Graph Theory Properties in Methamphetamine Drug Users Applying Box-Counting Fractal Dimension

Introduction: Graph theoretical analysis of functional Magnetic Resonance Imaging (fMRI) data has provided new measures of mapping human brain in vivo. Of all methods to measure the functional connectivity between regions, Linear Correlation (LC) calculation of activity time series of the brain regions as a linear measure is considered the most ubiquitous one. The strength of the dependence obl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEICE Transactions

دوره 95-B  شماره 

صفحات  -

تاریخ انتشار 2012