On Sat, Jan 28, 2012 at 6:01 AM, Steven Bellovin <s...@cs.columbia.edu> wrote:
>>
>> Or at least that's what everyone thought. More recently, various groups have 
>> begun to focus on
>> a fly in the ointment: the practical implementation of this process. While 
>> quantum key distribution
>> offers perfect security in practice, the devices used to send quantum 
>> messages are inevitably
>> imperfect.
>
> This is only surprising if you assume large values of "everyone".  Anyone in 
> the real world has
> long since worried about implementations.  Remember Bob Morris' Rule 1 of 
> cryptanalysis: check
> for plaintext.  
> (http://www.ieee-security.org/Cipher/ConfReports/conf-rep-Crypto95.html)

So why didn't one of these "real world" people point this out, to
researchers? It's a bit too easy to claim something as obvious when
someone just told you.


>                --Steve Bellovin, https://www.cs.columbia.edu/~smb

-- 
Noon Silk

Fancy a quantum lunch? https://sites.google.com/site/quantumlunch/

"Every morning when I wake up, I experience an exquisite joy — the joy
of being this signature."
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to