{"title":"PROTOCOLS FOR DISTRIBUTING KEY STRINGS BASED ON PHASE AND INTENSITY FLUCTUATION","authors":"Ajung Kim","doi":"10.1142/S0219477508005057","DOIUrl":null,"url":null,"abstract":"A cryptology protocol for key distribution using phase and intensity fluctuation is proposed. It provides ways to detect the extent of eavesdropping. Detecting test factors and system design rules are suggested and the performances are analyzed for various signal keyings and cryptofunctions. It has a wide range of implementations, including the use of additive white Gaussian noise, background noise, and polarization modification in wire/wireless and optical communications.","PeriodicalId":191232,"journal":{"name":"The Random and Fluctuating World","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Random and Fluctuating World","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/S0219477508005057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A cryptology protocol for key distribution using phase and intensity fluctuation is proposed. It provides ways to detect the extent of eavesdropping. Detecting test factors and system design rules are suggested and the performances are analyzed for various signal keyings and cryptofunctions. It has a wide range of implementations, including the use of additive white Gaussian noise, background noise, and polarization modification in wire/wireless and optical communications.