Amazon cover image
Image from Amazon.com

The Kish cypher : the story of KLJN for unconditional security Laszlo B. Kish

By: Material type: TextTextPublication details: New Jersey : World Scientific, c2017.Description: xx, 439 p. : ill. ; 24 cmISBN:
  • 9789814449458
Subject(s): DDC classification:
  • 005.8 KI KI
Online resources: Summary: Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself. This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff –Law –Johnson –Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle — an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
REGULAR University of Wollongong in Dubai Main Collection 005.8 KI KI (Browse shelf(Opens below)) Available T0058979

Includes bibliographical references and index.

Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself.
This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff –Law –Johnson –Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle — an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost.

There are no comments on this title.

to post a comment.