On Sat, Jan 28, 2012 at 6:01 AM, Steven Bellovin <s...@cs.columbia.edu> wrote: >> >> Or at least that's what everyone thought. More recently, various groups have >> begun to focus on >> a fly in the ointment: the practical implementation of this process. While >> quantum key distribution >> offers perfect security in practice, the devices used to send quantum >> messages are inevitably >> imperfect. > > This is only surprising if you assume large values of "everyone". Anyone in > the real world has > long since worried about implementations. Remember Bob Morris' Rule 1 of > cryptanalysis: check > for plaintext. > (http://www.ieee-security.org/Cipher/ConfReports/conf-rep-Crypto95.html)
So why didn't one of these "real world" people point this out, to researchers? It's a bit too easy to claim something as obvious when someone just told you. > --Steve Bellovin, https://www.cs.columbia.edu/~smb -- Noon Silk Fancy a quantum lunch? https://sites.google.com/site/quantumlunch/ "Every morning when I wake up, I experience an exquisite joy — the joy of being this signature." _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography