Kish cypher

Kish cypher

The Kish cypher [ [http://technology.newscientist.com/channel/tech/mg19426055.300 Noise keeps spooks out of the loop - tech - 23 May 2007 - New Scientist Tech ] ] , is a classical technique for maintaining secure communications without resort to the complexity of quantum cryptography, due to L. B. Kish. There have been a number of attempts to crack the Kish cypher method, but so far it has stood up to scrutiny, and it remains an open question as to whether it could ultimately replace secure quantum cryptography. The Kish cypher is a hardware-based technique and should not be confused with a software approach called the Kish-Sethuraman (KS) cypher. [L. B. Kish and S. Sethuraman, "Non-breakable data encryption with classical information," "Fluctuation and Noise Letters", 4:C1–C5, (2004).] [A. Klappenecker, "Remark on a 'non-breakable data encryption' scheme by Kish and Sethuraman," "Fluctuation and Noise Letters", 4:C25, (2004).]

The Kish cypher scheme

The communication channel is a standard wire, and conceptually the sender can transmit a message by simply switching between two different resistor values at one end of the wire. At the other end, the receiver can also reciprocate by switching in and out resistors. No voltages or signals are sent along the line. The receiver simply uses a spectrum analyser to passively measure the Johnson noise of the line. From the noise, the the total resistance of the line can be calculated. The receiver knows his/her own resistor value, so can then deduce the sender's resistor. In this way messages can be simply encoded in terms of binary states dependent on two resistor values. The system is thought to be secure because although an eavesdropper can measure the total resistance, he/she has no knowledge of the individual values of the receiver and sender.

The use of resistors is an idealization for visualization of the scheme, however, in practice, one would use artificially generated noise with higher amplitude possessing Johnson-like properties. This removes the restriction of operation within thermal equilibrium. It also has the added advantage that noise can be ramped down to zero before switching and can be ramped up back to the nominal value after switching, in order to prevent practical problems involving unwanted transients.

Controversy

There have been a number of objections to this scheme, but as far as is known it has not yet been cracked. A number of objections are as follows:

* The Kish cypher is very slow. The reply to this objection is that quantum cryptography is also very slow. Quantum cryptographers therefore only claim their technique is to be used for secure key distribution to make classical encryption more secure. Similarly the Kish cypher can be used for secure key distribution and not the whole message.

* An eavesdropper can potentially crack the Kish cypher by evaluating a resistor value at one end of the wire, in the time window where the resistor at the other end is being switched out. The reply to this objection is that accurate noise measurement is slow, as it requires an averaging process. The resistors are switched faster than the noise measurement. Thus security is maintained, as the Kish cypher is elegantly based on classical time-amplitude measurement uncertainty, in the same way that quantum uncertainty is at the heart of secure quantum cryptography.

* The use of the Johnson noise formula to evaluate the resistor values requires thermal equilibrium. In the Kish cypher method this is far from the case. For example, it cannot be guaranteed that the receiver and sender are at the same temperature. This objection is addressed by using artificial noise sources with Johnson-like characteristics rather than actual resistor values.

ee also

*Cryptography
*Quantum cryptography
*Secure communication
*Topics in cryptography

References

* R. Mingesz, Z. Gingl, L. B. Kish, "Johnson(-like)-noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line," "Physics Letters A", 372(7):978-984, (2008).

* L. B. Kish, "Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law," "Physics Letters A", 352(3):178-182, (2006).

* J. Scheuer and A. Yariv, "A classical key-distribution system based on Johnson (like) noise - How secure?" "Physics Letters A", 359(6):737-740, (2006).

* A. Cho, "Cryptography - Simple noise may stymie spies without quantum weirdness," "Science" 309(5744):2148-2148, (2005).

Notes

External links

* [http://www.schneier.com/blog/archives/2005/12/totally_secure.html Bruce Schneier, Totally Secure Classical Communications?]
* [http://www.schneier.com/blog/archives/2006/02/more_on_kishs_c.html Bruce Schneier, More on Kish's Classical Security Scheme]
* [http://it.slashdot.org/article.pl?sid=05/12/10/1714256 Totally Secure Non-Quantum Communications?]
* [http://www.physorg.com/news8906.html Forget Quantum Encryption, Simple Scheme Can Stop Electronic Eavesdroppers]
* [http://spie.org/x16669.xml Unconditionally secure communication via wire]
* [http://www.lightbluetouchpaper.org/2006/10/08/kishs-totally-secure-system-is-insecure/ Kish’s "totally secure" system is insecure]
* [http://ansuz.sooke.bc.ca/software/security/kish-classical-crypto.php Quantum cryptography without the quantum?]
* [https://triton.infosys.tamus.edu/portal/page?_pageid=37,3347&_dad=portal&_schema=PORTAL&p_news_id=1466 Secure wire communicator]
* [http://www.ece.tamu.edu/%7Enoise/research_files/research_secure.htm Totally Secure Non-Quantum Communication and Networks]
* [http://www.vokrugsveta.ru/telegraph/theory/754/?view=16903b865cf8f121073c46d21b0315b4 A Russian report on the Kish cypher]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Kish — may refer to:Geography*Kish Island, an Iranian island and a city in the Persian Gulf *Kish (Sumer), an ancient city in Sumer, now in Iraq *Kish Bank, a shallow in the Irish Sea *Kiş, Khojavend, Azerbaijan *Kiş, Shaki, AzerbaijanPeople*Kish… …   Wikipedia

  • Cypher (film) — Cypher Promotional movie poster Directed by Vincenzo Natali Produced by Paul …   Wikipedia

  • Cypher — est un film de science fiction de Vincenzo Natali sorti en 2002. Sommaire 1 Synopsis 2 Analyse 3 Fiche technique 4 Distribution …   Wikipédia en Français

  • Cypher (Film) — Filmdaten Deutscher Titel: Cypher Originaltitel: Cypher Produktionsland: USA Erscheinungsjahr: 2002 Länge: 95 Minuten Originalsprache: Englisch …   Deutsch Wikipedia

  • Cypher (2002) — Filmdaten Deutscher Titel Cypher Produktionsland USA, Kanada …   Deutsch Wikipedia

  • Laszlo B. Kish — Infobox Scientist box width = 300px name = Laszlo B. Kish image size = 300px caption = Laszlo Bela Kish birth date = birth place = Hungary death date = death place = residence = flag|USA citizenship = nationality = flag|Hungary|name=Hungarian… …   Wikipedia

  • Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… …   Wikipedia

  • Cipher — For other uses, see Cipher (disambiguation). Edward Larsson s rune cipher resembling that found on the Kensington Runestone. Also includes runically unrelated blackletter writing style and pigpen cipher. In cryptography, a cipher (or cypher) is… …   Wikipedia

  • Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… …   Wikipedia

  • Off-line Root CA — In a Public Key Infrastructure PKI the top of the trust path is the Certificate authority (CA), because is on the top is called the root CA. The CA is able to issue, distribute and revoke digital certificates X.509. The CA which is software… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”