Information Theoretic Security by the Laws of Classical Physics Conference Paper uri icon


  • It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loopi.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocolfor secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.

name of conference

  • 5th IEEE Workshop on Soft Computing Applications, (SOFA 2012)

published proceedings

  • Soft Computing Applications. Advances in Intelligent Systems and Computing

author list (cited authors)

  • Mingesz, R., Kish, L. B., Gingl, Z., Granqvist, C. G., Wen, H., Peper, F., Eubanks, T., & Schmera, G.

complete list of authors

  • Mingesz, R||Kish, LB||Gingl, Z||Granqvist, CG||Wen, H||Peper, F||Eubanks, T||Schmera, G

editor list (cited editors)

  • Balas, V. E., Fodor, J., Várkonyi-Kóczy, A. R., Dombi, J., & Jain, L. C.

publication date

  • January 2013