The Kish Cypher: Introduction, History, the Big Picture, Details, and Design

The Kish Cypher: Introduction, History, the Big Picture, Details, and Design

Kish, Laszlo B.

81,12 €(IVA inc.)

An objective monograph on the “Kish Cypher” (the popular but incorrect name for the Kirchhoff–Law–Johnson–Noise scheme), this unique volume introduces the facts on the method from the perspective of Dr Kish himself. Designed to offer a thorough account of the cypher and its unconditionally secure communication, the text explains the cypher's foundation in classical physics and its superiority to its quantum-based competitors. This book seeks to clarify the misinformation behind heated debates on Wikipedia, and debunk the common misconception of “Kirchhoff's law” using simple and clear-cut treatments to explain the cypher's working principal — an understanding that has eluded (even) some experts on software-based security or quantum security — and how it can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost. Straight out of both hard and popular sciences, the explanations provide both the big picture and the genesis of the ideas behind the cypher — complete with personal history beyond the invention, as well as reflections on the current situation of science and technology (including defense technology) and academic life in the USA and the Western world. The contents of this text include layman introductory and concluding summaries for each chapter — allowing both professionals and interested members of the public to benefit from reading it. Contents: What is Secure Communication and Secure Key Exchange? What is Conditional and Unconditional Security? How Does Quantum Physics Do It? The Core Principle of The Security of Quantum Key Distribution Can it Be Done by Classical Physics? It Seemed Impossible The General Problem with Information Carried by Classical Physical Quantities Early Attempts by the Author That Failed Here is Thermodynamics to Help: The Second Law and Johnson Noise(Johnson Noise and Its Key Properties to Both Laymen and the Experts) The Idealized KLJN System. When it is Unconditionally Secure Against Passive and Invasive Attacks and When it is Not Practical Problems and Hacking: The Devil in The Details. The Situation of Non-Idealities Discussed, Related Hacking Attacks and How to Defend Against Them Experiments and Results. The Laboratory Demonstration and Related Experiments The Results (Experimental and Theoretical) for All Known Attack Types and The Performance of The Defense Mechanisms Privacy Amplification: What It is and Why It is So Effective Here? Introducing Privacy Amplification and Showing The Effectiveness of the KLJN System to Reduce Security Leaks to Almost Zero Fields of Applications: Networks, Power Lines, Between Computers and Within Computers, Games and Instruments Open Problems

  • ISBN: 978-981-4449-45-8
  • Editorial: WORLD SCIENTIFIC PUB.CO.PTE.
  • Encuadernacion: Tela
  • Páginas: 250
  • Fecha Publicación: 01/03/2016
  • Nº Volúmenes: 1
  • Idioma: