2015
DOI: 10.3390/e17042010
|View full text |Cite
|
Sign up to set email alerts
|

Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges

Abstract: The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are theoretically information-secure are quantum key distribution (QKD) and Kirchoff-Law-Johnson-Noise (KLJN). However, these concepts require a dedicated connection between hosts in peer-to-peer (P2P) networks which can be impractical and or cost prohibitive. A practical and cost effective method is to have… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 45 publications
0
5
0
Order By: Relevance
“…To improve the security of the original scheme, different enhanced versions of the KLJN were introduced [4, [44][45][46][47][48][49]. A variety of potential applications have been proposed for the KLJN system [59][60][61][62][63][64][65][66][67][68][69][70][71][72].…”
Section: { } M a Bmentioning
confidence: 99%
“…To improve the security of the original scheme, different enhanced versions of the KLJN were introduced [4, [44][45][46][47][48][49]. A variety of potential applications have been proposed for the KLJN system [59][60][61][62][63][64][65][66][67][68][69][70][71][72].…”
Section: { } M a Bmentioning
confidence: 99%
“…Practical applications have potential to introduce unconditional security, among others, for networks and smart grids [59][60][61][62][63][64][65][66]; computers, instruments, credit cards, key cards, PUF [67][68][69]; autonomic vehicle systems [70][71]; and accelerated IT-secure key exchange [72].…”
Section: The Kljn Key Exchange Systemmentioning
confidence: 99%
“…This is the only system § Corresponding author. in this security class that can be integrated on a chip with today's available technology, and it can have a wide range of related applications [59][60][61][62][63][64][65][66][67][68][69][70][71][72].…”
Section: Introductionmentioning
confidence: 99%
“…The G system does not consider multi-hop cases and would give the sensor a key exchange trust evaluation of the last sensor it was able to communicate with, this can be improved in future work. Sensor networks can also utilize different protocols for different KLJN geometric networks to reduce the cable, time, and KLJN communicators cost as has been analyzed in [65,66].…”
Section: Open Questions and Future Workmentioning
confidence: 99%