The Kish Cypher The Kish Cypher

The Kish Cypher

The Story of KLJN for Unconditional Security

    • $114.99
    • $114.99

Publisher Description

Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself.

This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff–Law–Johnson–Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle — an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost.

The contents of this text address both layman and expert levels of understanding.

Contents:DedicationForeword by Peter V E McClintockPrefacePreparationsThe Dawn (2002–2004)The Birth of KLJN (2005–2008)Developments and Fall-Out of KLJN (2009–2014)Cream on the Cake
Readership: Scientists, engineers, members of the general public interested in how things work and all who are interested in today's history of secure communication, science and technology.

GENRE
Computers & Internet
RELEASED
2016
December 27
LANGUAGE
EN
English
LENGTH
464
Pages
PUBLISHER
World Scientific Publishing Company
SELLER
Ingram DV LLC
SIZE
14.3
MB

More Books Like This

Quantum Communication and Quantum Networking Quantum Communication and Quantum Networking
2010
Quantum Random Number Generation Quantum Random Number Generation
2020
Constructive Side-Channel Analysis and Secure Design Constructive Side-Channel Analysis and Secure Design
2021
Information Theoretic Security Information Theoretic Security
2008
Constructive Side-Channel Analysis and Secure Design Constructive Side-Channel Analysis and Secure Design
2017
Progress in Cryptology – AFRICACRYPT 2019 Progress in Cryptology – AFRICACRYPT 2019
2019