The Kish cypher :
Kish, Laszlo B.
The Kish cypher : the story of KLJN for unconditional security Laszlo B. Kish - New Jersey : World Scientific, c2017. - xx, 439 p. : ill. ; 24 cm.
Includes bibliographical references and index.
Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself.
This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff –Law –Johnson –Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle — an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost.
9789814449458
2016019952
Computer security--Technological innovations
Data encryption (Computer science)
Public key cryptography
Thermodynamic cycles
Electronic noise
005.8 KI KI
The Kish cypher : the story of KLJN for unconditional security Laszlo B. Kish - New Jersey : World Scientific, c2017. - xx, 439 p. : ill. ; 24 cm.
Includes bibliographical references and index.
Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself.
This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff –Law –Johnson –Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle — an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost.
9789814449458
2016019952
Computer security--Technological innovations
Data encryption (Computer science)
Public key cryptography
Thermodynamic cycles
Electronic noise
005.8 KI KI