Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself.This book clarifies the misinformation behind heated debates on the 'Kish Cypher' (the popular but incorrect name for the Kirchhoff-Law-Johnson-Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle - an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost.The contents of this text address both layman and expert levels of understanding.
Sprache
Verlagsort
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Produkt-Hinweis
Fadenheftung
Gewebe-Einband
Maße
Höhe: 235 mm
Breite: 157 mm
Dicke: 29 mm
Gewicht
ISBN-13
978-981-4449-45-8 (9789814449458)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
What is Secure Communication and Secure Key Exchange?; What is Conditional and Unconditional Security?; How Does Quantum Physics Do It? The Core Principle of The Security of Quantum Key Distribution; Can it Be Done by Classical Physics? It Seemed Impossible; The General Problem with Information Carried by Classical Physical Quantities; Early Attempts by the Author That Failed; Here is Thermodynamics to Help: The Second Law and Johnson Noise (Johnson Noise and Its Key Properties to Both Laymen and the Experts); The Idealized KLJN System. When it is Unconditionally Secure Against Passive and Invasive Attacks and When it is Not; Practical Problems and Hacking: The Devil in The Details. The Situation of Non-Idealities Discussed, Related Hacking Attacks and How to Defend Against Them; Experiments and Results. The Laboratory Demonstration and Related Experiments; The Results (Experimental and Theoretical) for All Known Attack Types and The Performance of The Defense Mechanisms; Privacy Amplification: What It is and Why It is So Effective Here?; Introducing Privacy Amplification and Showing The Effectiveness of the KLJN System to Reduce Security Leaks to Almost Zero; Fields of Applications: Networks, Power Lines, Between Computers and Within Computers, Games and Instruments; Open Problems.