Noise-Driven Informatics: Secure Classical Communications via Wire and Noise-Based Computing

  • Laszlo B. Kish


In this paper, we show recent results indicating that using electrical noise as information carrier offers outstanding potentials reminding of quantum informatics. One example is noise-based computing and logic that shows certain similarities to quantum logic. However, due to the lack of the collapse of wavefunction and due to the immediate accessibility of superposition components, the use of noise-based and quantum computers will probably be different. Another example is secure communications where, out of the unconditional security at idealistic situations, a practical security beyond known quantum solutions can be achieved and has been demonstrated. Here, the keys to security are the robustness of the classical information, which results in the avoidance of using error statistics, and the second law of thermodynamics.


Turing Machine Thermal Noise Quantum Communicator Noise Voltage Information Carrier 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



Comments of Gabor Schmera about the draft are appreciated. Zoltan Gingl is grateful for the Bolyai Fellowship of Hungarian Academy of Sciences. The travel of LBK to the University of Szeged for the startup phase of the experiments was covered by the Swedish STINT foundation and the cost of staying (10–15 December 2006) was partially covered by the European Union’s SANES grant. The costs of the KLJN system design were partially covered by the TAMU Information Technology Task Force (TITF, grant 2002). Part of these results was submitted to Physics Letters A [10].


  1. 1.
    Kish LB (2005) Stealth communication: zero-power classical communication, zero-quantum quantum communication and environmental-noise communication. Appl Phys Lett 87:234109CrossRefGoogle Scholar
  2. 2.
    Kish LB, Mingesz R, Gingl Z (2007) Thermal noise informatics: totally secure communication via a wire; Zero-power communication; and thermal noise driven computing. Plenary talk, Proceedings of the 4th SPIE Symposium on Fluctuation and Noise (SPIE)Google Scholar
  3. 3.
    Porod W (1988) Appl Phys Lett 52:2191CrossRefGoogle Scholar
  4. 4.
    Kish LB (2006) Thermal noise driven computing. Appl Phys Lett 89:144104CrossRefGoogle Scholar
  5. 5.
    von Neumann J (1956) In: Shannon CE, McCarthy J (eds) Automata studies. Princeton University Press, Princeton, pp 329–378Google Scholar
  6. 6.
    Nikolic K, Sadek A, Forshaw M (2002) Nanotechnology 13:357–362CrossRefGoogle Scholar
  7. 7.
    Sadek AS, Nikolic K, Forshaw M (2004) Nanotechnology 15:192–21CrossRefGoogle Scholar
  8. 8.
    Palem KV (2005) IEEE Trans Comput 54:1123CrossRefGoogle Scholar
  9. 9.
    Korkmaz P, Akgul BES, Palem KV, Chakrapani LN (2006) Japan J Appl Phys 45:3307–3316CrossRefGoogle Scholar
  10. 10.
    Kish LB. Noise-based logic: binary, multi-valued, or fuzzy, with optional superposition of logic states. Submitted, preprint:
  11. 11.
    Kish LB (2006) Totally secure classical communication utilizing Johnson (-like) noise and Kirchhoff’s law. Phys Lett A 352:178–182CrossRefMATHGoogle Scholar
  12. 12.
    Cho A (2005) Simple noise may stymie spies without quantum weirdness. Science 309:2148CrossRefGoogle Scholar
  13. 13.
    Kish LB (2006) Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security. Fluctuation Noise Lett 6:L57–L63CrossRefGoogle Scholar
  14. 14.
    Kish LB, Mingesz R (2006) Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise. Fluctuation Noise Lett 6:C9–C21CrossRefGoogle Scholar
  15. 15.
    Kish LB (2006) Methods of using existing and currently used wire lines (power lines, phone lines, internet lines) for totally secure classical communication utilizing Kirchoff’s Law and Johnson-like Noise, draft.
  16. 16.
    Scheuer J, Yariv A (2006) A classical key-distribution system based on Johnson (like) noise—How secure? Phys Lett A 359:737CrossRefMATHGoogle Scholar
  17. 17.
    Kish LB (2006) Response to Scheuer-Yariv: “a classical key-distribution system based on johnson (like) noise - how secure?” Phys Lett A 359:741–744CrossRefMATHGoogle Scholar
  18. 18.
    Hao F (2006) Kish’s key exchange scheme is insecure. IEE Proc Inform Sec 153:141–142CrossRefGoogle Scholar
  19. 19.
    Kish LB (2006) Response to Feng Hao’s paper “Kish’s key exchange scheme is insecure. Fluctuation Noise Lett 6:C37–C41CrossRefGoogle Scholar
  20. 20.
    Mingesz R, Gingl Z, Kish LB (2008) Johnson(-like)–Noise–Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line. Phys Lett A 372:978–984CrossRefMATHGoogle Scholar
  21. 21.
    Ursin R, Tiefenbacher F, Schmitt-Manderbach T, Weier H, Scheidl T, Lindenthal M, Blauensteiner B, Jennewein T, Perdigues J, Trojek P, Ömer B, Fürst M, Meyenburg M, Rarity J, Sodnik Z, Barbieri C, Weinfurter H, Zeilinger A (2007) Entanglement-based quantum communication over 144 km. Nat Phys (3 June). doi: 10.1038/nphys629Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2012

Authors and Affiliations

  1. 1.Department of Electrical and Computer EngineeringTexas A&M UniversityCollege StationUSA

Personalised recommendations