Kish Cypher - Securing Computers and Hardware By Integrating The Kish Cypher On Chips

Securing Computers and Hardware By Integrating The Kish Cypher On Chips

A specific advantage of the Kish system is that it can be integrated on digital chips to provide key exchange (both for the first and the refreshed keys) for secure data communication between hardware units, such as processors, memories, hard drives, etc., within a computer or an instrument and information theoretic security can be offered also in these system. Another advantage of such system is that, due to the short distances and the relevant range of frequency, the main non-idealities (wire resistance, inductance and capacitance) are negligible thus the Kish system can run under idealistic conditions to provide security without further precautions or processing, such as privacy amplification.

Read more about this topic:  Kish Cypher

Famous quotes containing the words securing and/or hardware:

    In the weakness of one kind of authority, and in the fluctuation of all, the officers of an army will remain for some time mutinous and full of faction, until some popular general, who understands the art of conciliating the soldiery, and who possesses the true spirit of command, shall draw the eyes of all men upon himself. Armies will obey him on his personal account. There is no other way of securing military obedience in this state of things.
    Edmund Burke (1729–1797)

    A friend of mine spoke of books that are dedicated like this: “To my wife, by whose helpful criticism ...” and so on. He said the dedication should really read: “To my wife. If it had not been for her continual criticism and persistent nagging doubt as to my ability, this book would have appeared in Harper’s instead of The Hardware Age.”
    Brenda Ueland (1891–1985)