Encryption key distribution system and method
a key distribution system and encryption key technology, applied in the field ofsignal transfer, can solve problems such as the key potentially vulnerable to an attack by a third party monitoring the network
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
embodiment 1
[0104]A Kirchhoff-Law-Johnson-(like)-Noise (KLJN) system for secure key distribution, comprising:
[0105]a wired network; and
[0106]a plurality of hosts connected to each other on the wired network,
[0107]wherein each host is connected to every other host by a continuous wired path capable of transmitting electrical current,
[0108]wherein each host of the plurality of hosts comprises a first resistor and is configured to produce a first-resistor enhanced Johnson noise voltage when the first resistor is connected to a voltage source,
[0109]wherein each host of the plurality of hosts further comprises a second resistor and is further configured to produce a second-resistor enhanced Johnson noise voltage when the second resistor is connected to a voltage source,
[0110]wherein the resistance value of the first resistor of each host is identical to that of all other hosts of the plurality of hosts, and
[0111]wherein the resistance value of the second resistor of each host is the identical to tha...
embodiment 2
[0112]The system according to embodiment 1, wherein each host further comprises a filter box.
embodiment 3
[0113]The system according to embodiment 2, wherein the filter box comprises:
[0114]a first KLJN filter for KLJN key exchange; and
[0115]a main signal filter for supplying a main signal of the network to the host having the filter box.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 