“…The Quantum Key Distribution (QKD) [5] and the Kirchhoff-Law-Johnson-Noise (KLJN) [6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26] secure key exchange are two examples of hardware-based secure key exchange concepts that are information theoretically secure [27]. Thus even with infinite computing resources the key will not be extracted by Eve, because the security offered by these schemes are based on fundamental laws of physics, to crack the key exchange would require Eve to break the underpinning laws of physics.…”