- Kish cypher
The Kish cypher [ [http://technology.newscientist.com/channel/tech/mg19426055.300 Noise keeps spooks out of the loop - tech - 23 May 2007 - New Scientist Tech ] ] , is a classical technique for maintaining secure communications without resort to the complexity of
quantum cryptography , due to L. B. Kish. There have been a number of attempts to crack the Kish cypher method, but so far it has stood up to scrutiny, and it remains an open question as to whether it could ultimately replace securequantum cryptography . The Kish cypher is a hardware-based technique and should not be confused with a software approach called the Kish-Sethuraman (KS) cypher. [L. B. Kish and S. Sethuraman, "Non-breakable data encryption with classical information," "Fluctuation and Noise Letters", 4:C1–C5, (2004).] [A. Klappenecker, "Remark on a 'non-breakable data encryption' scheme by Kish and Sethuraman," "Fluctuation and Noise Letters", 4:C25, (2004).]The Kish cypher scheme
The communication channel is a standard wire, and conceptually the sender can transmit a message by simply switching between two different resistor values at one end of the wire. At the other end, the receiver can also reciprocate by switching in and out resistors. No voltages or signals are sent along the line. The receiver simply uses a
spectrum analyser to passively measure theJohnson noise of the line. From the noise, the the total resistance of the line can be calculated. The receiver knows his/her own resistor value, so can then deduce the sender's resistor. In this way messages can be simply encoded in terms of binary states dependent on two resistor values. The system is thought to be secure because although an eavesdropper can measure the total resistance, he/she has no knowledge of the individual values of the receiver and sender.The use of resistors is an idealization for visualization of the scheme, however, in practice, one would use artificially generated noise with higher amplitude possessing Johnson-like properties. This removes the restriction of operation within thermal equilibrium. It also has the added advantage that noise can be ramped down to zero before switching and can be ramped up back to the nominal value after switching, in order to prevent practical problems involving unwanted transients.
Controversy
There have been a number of objections to this scheme, but as far as is known it has not yet been cracked. A number of objections are as follows:
* The Kish cypher is very slow. The reply to this objection is that
quantum cryptography is also very slow. Quantum cryptographers therefore only claim their technique is to be used for secure key distribution to make classical encryption more secure. Similarly the Kish cypher can be used for secure key distribution and not the whole message.* An eavesdropper can potentially crack the Kish cypher by evaluating a resistor value at one end of the wire, in the time window where the resistor at the other end is being switched out. The reply to this objection is that accurate noise measurement is slow, as it requires an averaging process. The resistors are switched faster than the noise measurement. Thus security is maintained, as the Kish cypher is elegantly based on classical time-amplitude measurement uncertainty, in the same way that quantum uncertainty is at the heart of secure
quantum cryptography .* The use of the
Johnson noise formula to evaluate the resistor values requires thermal equilibrium. In the Kish cypher method this is far from the case. For example, it cannot be guaranteed that the receiver and sender are at the same temperature. This objection is addressed by using artificial noise sources with Johnson-like characteristics rather than actual resistor values.ee also
*
Cryptography
*Quantum cryptography
*Secure communication
*Topics in cryptography References
* R. Mingesz, Z. Gingl, L. B. Kish, "Johnson(-like)-noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line," "Physics Letters A", 372(7):978-984, (2008).
* L. B. Kish, "Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law," "Physics Letters A", 352(3):178-182, (2006).
* J. Scheuer and A. Yariv, "A classical key-distribution system based on Johnson (like) noise - How secure?" "Physics Letters A", 359(6):737-740, (2006).
* A. Cho, "Cryptography - Simple noise may stymie spies without quantum weirdness," "Science" 309(5744):2148-2148, (2005).
Notes
External links
* [http://www.schneier.com/blog/archives/2005/12/totally_secure.html Bruce Schneier, Totally Secure Classical Communications?]
* [http://www.schneier.com/blog/archives/2006/02/more_on_kishs_c.html Bruce Schneier, More on Kish's Classical Security Scheme]
* [http://it.slashdot.org/article.pl?sid=05/12/10/1714256 Totally Secure Non-Quantum Communications?]
* [http://www.physorg.com/news8906.html Forget Quantum Encryption, Simple Scheme Can Stop Electronic Eavesdroppers]
* [http://spie.org/x16669.xml Unconditionally secure communication via wire]
* [http://www.lightbluetouchpaper.org/2006/10/08/kishs-totally-secure-system-is-insecure/ Kish’s "totally secure" system is insecure]
* [http://ansuz.sooke.bc.ca/software/security/kish-classical-crypto.php Quantum cryptography without the quantum?]
* [https://triton.infosys.tamus.edu/portal/page?_pageid=37,3347&_dad=portal&_schema=PORTAL&p_news_id=1466 Secure wire communicator]
* [http://www.ece.tamu.edu/%7Enoise/research_files/research_secure.htm Totally Secure Non-Quantum Communication and Networks]
* [http://www.vokrugsveta.ru/telegraph/theory/754/?view=16903b865cf8f121073c46d21b0315b4 A Russian report on the Kish cypher]
Wikimedia Foundation. 2010.