Re: secure links using classical (i.e., non-quantum) physics

2005-12-14 Thread Travis H.
I am discussing implementing a very simple version of this with the
author.  If anyone else is interested in participating or just
watching, email me and I'll keep you in the loop.
--  -- P=NP if (P=0 or N=1)
My love for mathematics is like 1/x as x approaches 0.
GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B

The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

secure links using classical (i.e., non-quantum) physics

2005-12-10 Thread Steven M. Bellovin

Totally Secure Classical Communication Utilizing Johnson (-like) Noise 
and Kirchoff's Law
Authors: Laszlo B. Kish
Comments: 14 pages; Google search terms: +totally +secure +communication
Subj-class: General Physics
Journal-ref: Manuscript featured by Science, vol. 309, p. 2148 (2005, 
September 30)

An absolutely secure, fast, inexpensive, robust, maintenance-free 
and low-power- consumption communication is proposed. The states of the 
information bit are represented by two resistance values. The sender 
and the receiver have such resistors available and they randomly select 
and connect one of them to the channel at the beginning of each clock 
period. The thermal noise voltage and current can be observed but 
Kirchoff's law provides only a second-order equation. A secure bit is 
communicated when the actual resistance values at the sender's side and 
the receiver's side differ. Then the second order equation yields the 
two resistance values but the eavesdropper is unable to determine the 
actual locations of the resistors and to find out the state of the 
sender's bit. The receiver knows that the sender has the inverse of his 
bit, similarly to quantum entanglement. The eavesdropper can decode the 
message if, for each bits, she inject current in the wire and measures 
the voltage change and the current changes in the two directions. 
However, in this way she gets discovered by the very first bit she 
decodes. Instead of thermal noise, proper external noise generators 
should be used when the communication is not aimed to be stealth.

--Steven M. Bellovin,

The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]