2008
DOI: 10.1016/j.physleta.2007.07.086
|View full text |Cite
|
Sign up to set email alerts
|

Johnson(-like)–Noise–Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line

Abstract: Abstract.A pair of Kirchhoff-Loop-Johnson(-like)-Noise communicators, which is able to work over variable ranges, was designed and built. Tests have been carried out on a model-line performance characteristics were obtained for ranges beyond the ranges of any known direct quantum communication channel and they indicate unrivalled signal fidelity and security performance of the exchanged raw key bits. This simple device has single-wire secure key generation and sharing rates of 0.1, 1, 10, and 100 bit/second fo… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
189
0
4

Year Published

2011
2011
2014
2014

Publication Types

Select...
5
2

Relationship

4
3

Authors

Journals

citations
Cited by 80 publications
(196 citation statements)
references
References 12 publications
3
189
0
4
Order By: Relevance
“…Finally, the application of thermal noise for unconventional informatics, namely for noisebased logic and computing [29][30][31][32][33][34][35][36] and the KJLN secure key exchange [37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52], emerged decades later than the corresponding quantum informatics schemes such as quantum computing [53] and quantum encryption [54][55][56].…”
Section: The Klj Secure Key Exchange Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, the application of thermal noise for unconventional informatics, namely for noisebased logic and computing [29][30][31][32][33][34][35][36] and the KJLN secure key exchange [37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52], emerged decades later than the corresponding quantum informatics schemes such as quantum computing [53] and quantum encryption [54][55][56].…”
Section: The Klj Secure Key Exchange Protocolmentioning
confidence: 99%
“…The KLJN secure key exchange scheme was introduced in 2005 [37][38][39] and was built and demonstrated in 2007 [40]; it is founded on the robustness of classical information as well as stochasticity and the laws of classical physics. It was named by its creators the "Kirchhoffloop-Johnson(-like)-Noise" scheme, while on the Internet -in blogs and similar sites, including Wikipedia -it has widely been nicknamed "Kish cypher" or "Kish cipher" (where both designations are wrong).…”
Section: The Kirchhoff-law-johnson-oise Key Distributionmentioning
confidence: 99%
“…However, in 2005, the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) secure key exchange [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16] scheme was introduced [4] and later it was built and its security demonstrated [7]. These ideas have inspired new concepts also in computing, particularly noise-based logic and computing [17][18][19][20][21][22][23][24], where not the security of data but complexity of data processing has been the issue.…”
Section: The Kirchhoff-law-johnson-(like)-noise (Kljn) Secure Key Excmentioning
confidence: 99%
“…(2,3,7,8) with the actually measured mean-square channel voltage and current to decide if the situation is secure (LH or HL) while utilizing the fact that these mean-square values are different in each of these three situations (LL, LH/HL and HH). If the situation is secure, Alice and Bob will know that the other party has the inverse of his/her bit, which means, a secure key exchange takes place.…”
Section: The Kirchhoff-law-johnson-(like)-noise (Kljn) Secure Key Excmentioning
confidence: 99%
See 1 more Smart Citation