Kish Cypher - Securing Computers and Hardware By Integrating The Kish Cypher On Chips

Securing Computers and Hardware By Integrating The Kish Cypher On Chips

A specific advantage of the Kish system is that it can be integrated on digital chips to provide key exchange (both for the first and the refreshed keys) for secure data communication between hardware units, such as processors, memories, hard drives, etc., within a computer or an instrument and information theoretic security can be offered also in these system. Another advantage of such system is that, due to the short distances and the relevant range of frequency, the main non-idealities (wire resistance, inductance and capacitance) are negligible thus the Kish system can run under idealistic conditions to provide security without further precautions or processing, such as privacy amplification.

Read more about this topic:  Kish Cypher

Famous quotes containing the words securing and/or hardware:

    We have almost succeeded in leveling all human activities to the common denominator of securing the necessities of life and providing for their abundance.
    Hannah Arendt (1906–1975)

    A friend of mine spoke of books that are dedicated like this: “To my wife, by whose helpful criticism ...” and so on. He said the dedication should really read: “To my wife. If it had not been for her continual criticism and persistent nagging doubt as to my ability, this book would have appeared in Harper’s instead of The Hardware Age.”
    Brenda Ueland (1891–1985)