FLUCTUATION AND NOISE EXPLOITATION LABORATORY

Dept. of  Electrical  and  Computer  Engineering, Texas A&M University

home personnel research news conferences journals funding collaboration

 




Other names of the Kirchhoff's-law-Johnson-noise (KLJN) secure key distribution


While we prefer the name KLJN particularly because now about 10 different "Kish" types of KLJN schemes exist, for identification purposes, we list a few other names:


Other names of the original scheme


        - Kish key distribution, KKD  (Gunn-Allison-Abbott in multiple papers 2013- )

        - Kish cypher (Derek Abbott and Wikipedia 2008-2013; and the new book triggered by the Wikipedia fights)

        - Classical key exchange scheme based on Johnson noise  (Pao-Lo Liu, 2009)
 
        - Kish's cipher (Jason Palmer, New Scientist, 2007)

        - Kish's encryption scheme (Bruce Schneier,  Schneier on security, 2005-2006)


Names of other KLJN protocols with enhanced or special performance

        - RRRT-KLJN (random-resistor-random-temperature KLJN)
 

        -
VMG-KLJN (Vadai-Mingesz-Gingl KLJN)

        - iKLJN (intelligent KLJN)

        - MKLJN (multiple KLJN)

        - KKLJN (keyed KLJN)

        - iMKLJN (intelligent-multiple KLJN)

        - iKKLJN (intelligent-keyed KLJN)

        - KMKLJN (keyed-multiple KLJN)

        - iKMKLJN (intelligent-keyed-multiple KLJN)


Note, there are yet other types, such as circulator-based active KLJN schemes and Pao-Lo Liu's software emulation KLJN scheme, etc.
 

Back to the homepage of KLJN

 

 

 

 

 

FNEL HOME TAMU HOME TAMU E.E. DEPT. TAMU IEEE TAMU LIBRARY

Departmentof Electrical Engineering, Texas A&M University
Zachry Building, Room # 30D, Phone: (979)-845-1729