There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often misunderstood. It has been shown recently that the use of two pairs of resistors with enhanced Johnsonnoise and a Kirchhoff-loop ‒ i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol ‒ for secure key distribution leads to information theoretic security levels superior to those of today’s quantum key distribution. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. The KLJN system is briefly surveyed here with discussions about the essential questions such as (i) perfect and imperfect security characteristics of the key distribution, and (ii) how these two types of securities can be unconditional (or information theoretical).
 Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V. (2011). Full-field implementation of a perfect eavesdropper on a quantum cryptography system. _ature Commun., 2, 349 DOI: 10.1038/ncomms1348.
 Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V. (2010). Hacking commercial quantum cryptography systems by tailored bright illumination. _ature Photonics, 4, 686‒689, DOI: 10.1038/NPHOTON.2010.214.
 Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Scarani, V., Makarov, V., Kurtsiefer, C. (2011). Experimentally faking the violation of Bell’s inequalities. Phys. Rev. Lett., 107,170404, DOI: 10.1103/PhysRevLett.107.170404.
 Makarov, V., Skaar, J. (2008). Faked states attack using detector efficiency mismatch on SARG04, phasetime, DPSK, and Ekert protocols. Quantum Inf. Comp., 8, 622‒635.
 Wiechers, C., Lydersen, L., Wittmann, C., Elser, D., Skaar, J., Marquardt, C., Makarov, V., Leuchs, G. (2011). After-gate attack on a quantum cryptosystem. _ew J. Phys., 13, 013043, DOI: 10.1088/1367-2630/13/1/013043.
 Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V. (2010). Thermal blinding of gated detectors in quantum cryptography. Opt. Express, 18, 27938‒27954, DOI: 10.1364/OE.18.027938.
 Kish, L.B., Khatri, S., Horvath, T. (2011). Computation using noise-based logic: Efficient string verification over a slow communication channel. Eur. J. Phys., B, 79, 85‒90, http://arxiv.org/abs/1005.1560
 Wen, H., Kish, L.B., Klappenecker, A., Peper, F. (June 2012). New noise-based logic representations to avoid some problems with time complexity. Fluct. oise Lett., 11, 1250003.
 Mullins. J. (2010). Breaking the noise barrier. New Scientist, 2780, http://www.newscientist.com/article/mg20827801.500-breaking-the-noise-barrier.html?full=true
 Kish, L.B. (2006). Totally secure classical communication utilizing Johnson(-like) noise and Kirchhoff’s law. Phys. Lett., A, 352, 178‒182.
 Cho, A. (2005). Simple noise may stymie spies without quantum weirdness. Science, 309, 2148, http://www.ece.tamu.edu/~noise/news_files/science_secure.pdf
 Kish, L.B. (2006). Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson(-like)- noise cipher and expansion by voltage-based security. Fluct. oise Lett., 6, L57-L63, http://arxiv.org/abs/physics/0512177
 Mingesz, R., Gingl, Z., Kish, L.B. (2008). Johnson(-like)-noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line. Phys. Lett., A, 372, 978-984.
 Palmer, D.J. (2007). Noise encryption keeps spooks out of the loop. New Scientist, 2605, 32, http://www.newscientist.com/article/mg19426055.300-noise-keeps-spooks-out-of-the-loop.html
 Kish, L.B., Horvath, T. (2009). Notes on recent approaches concerning the Kirchhoff-law-Johnson-noisebased secure key exchange. Phys. Lett., A, 373, 901‒904.
 Scheuer, J., Yariv, A. (2006). A classical key-distribution system based on Johnson (like) noise - How secure? Phys. Lett., A, 359, 737‒740.
 Kish, L.B., Scheuer, J. (2010). Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator. Phys. Lett., A, 374, 2140-2142.
 Kish, L.B. (2006). Response to Scheuer-Yariv: “A classical key-distribution system based on Johnson (like) noise - How secure?”. Phys. Lett., A, 359, 741‒744.
 Hao, F. (2006). Kish’s key exchange scheme is insecure. IEE Proc. Inform. Soc., 153, 141-142.
 Kish, L.B. (2006). Response to Feng Hao’s paper “Kish’s key exchange scheme is insecure”. Fluct. oise Lett., 6, C37-C41.
 Liu, P.L. (2009). A new look at the classical key exchange system based on amplified Johnson noise. Phys. Lett., A, 373, 901‒904.
 Horvath, T., Kish, L.B., Scheuer, J. (2011). Effective privacy amplification for secure classical communications. Europhys. Lett., 94, 28002, http://arxiv.org/abs/1101.4264
 Kish, L.B., Saidi, O. (2008). Unconditionally secure computers, algorithms and hardware. Fluct. oise Lett., 8, L95-L98.
 Kish, L.B., Mingesz, R. (2006). Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise. Fluct. oise Lett., 6, C9‒C21.
 Kish, L.B,, Peper, F. (2012). Information networks secured by the laws of physics. IEICE Trans. Commun., E95-B, 1501-1507.
 Wiesner, S. (1983). Conjugate coding. SIGACT News, 15, 78-88.
 Bennett, C.H., Brassard, G. (1983). Quantum cryptography and its application to provably secure key expansion, public-key distribution, and coin-tossing. In Proc. IEEE Int. Symp. Inform. Theor., St-Jovite, Canada, 91.
 Brassard, G., (2005). Brief history of quantum cryptography: A personal perspective. In Proc. IEEE Information Theory Workshop on Theory and Practice in Information Theoretic Security, Awaji Island, Japan, 19‒23.
 Xu, F., Qi, B., Lo, H.K. (2010). Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys., 12, 113026, http://arxiv.org/abs/1005.2376
 Liang, Y., Poor, H.V., Shamai, S. (2008). Information theoretic security. Foundations Trends Commun. Inform. Theory, 5, 355-580, DOI: 10.1561/0100000036.