Information theoretic security by the laws of classical physics

Autor: Mingesz, R., Kish, L. B., Gingl, Z., Granqvist, C. G., Wen, H., Peper, F., Eubank, T., Schmera, G.
Rok vydání: 2012
Předmět:
Zdroj: in: V.E. Balas et al. (Eds.): Soft Computing Applications, AISC 195, pp. 11-25. (Springer, 2013)
Druh dokumentu: Working Paper
DOI: 10.1007/978-3-642-33941-7_5
Popis: It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.
Comment: Featured in MIT Technology Review http://www.technologyreview.com/view/428202/quantum-cryptography-outperformed-by-classical/ ; Plenary talk at the 5th IEEE Workshop on Soft Computing Applications, August 22-24, 2012, (SOFA 2012). Typos corrected
Databáze: arXiv