{"title":"基于相位和强度波动的密钥串分配协议","authors":"Ajung Kim","doi":"10.1142/S0219477508005057","DOIUrl":null,"url":null,"abstract":"A cryptology protocol for key distribution using phase and intensity fluctuation is proposed. It provides ways to detect the extent of eavesdropping. Detecting test factors and system design rules are suggested and the performances are analyzed for various signal keyings and cryptofunctions. It has a wide range of implementations, including the use of additive white Gaussian noise, background noise, and polarization modification in wire/wireless and optical communications.","PeriodicalId":191232,"journal":{"name":"The Random and Fluctuating World","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"PROTOCOLS FOR DISTRIBUTING KEY STRINGS BASED ON PHASE AND INTENSITY FLUCTUATION\",\"authors\":\"Ajung Kim\",\"doi\":\"10.1142/S0219477508005057\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A cryptology protocol for key distribution using phase and intensity fluctuation is proposed. It provides ways to detect the extent of eavesdropping. Detecting test factors and system design rules are suggested and the performances are analyzed for various signal keyings and cryptofunctions. It has a wide range of implementations, including the use of additive white Gaussian noise, background noise, and polarization modification in wire/wireless and optical communications.\",\"PeriodicalId\":191232,\"journal\":{\"name\":\"The Random and Fluctuating World\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Random and Fluctuating World\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1142/S0219477508005057\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Random and Fluctuating World","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/S0219477508005057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
PROTOCOLS FOR DISTRIBUTING KEY STRINGS BASED ON PHASE AND INTENSITY FLUCTUATION
A cryptology protocol for key distribution using phase and intensity fluctuation is proposed. It provides ways to detect the extent of eavesdropping. Detecting test factors and system design rules are suggested and the performances are analyzed for various signal keyings and cryptofunctions. It has a wide range of implementations, including the use of additive white Gaussian noise, background noise, and polarization modification in wire/wireless and optical communications.