martin f krafft wrote:

> So MagiQ and others claim that the technology is theoretically
> unbreakable. How so? If I have 20 bytes of data to send, and someone
> reads the photon stream before the recipient, that someone will have
> access to the 20 bytes before the recipient can look at the 20
> bytes, decide they have been "tampered" with, and alert the sender.

This is not relevant when the technology is correctly used for Q key
transmission because the sender would not be in the dark (sorry for the
double pun) for so long.

> So I use symmetric encryption and quantum cryptography for the key
> exchange... the same situation here. Maybe the recipient will be
> able to tell the sender about the junk it receives, but Mallory
> already has read some of the text being ciphered.

This should not happen in a well-designed system. The sender sends
the random key in the Q channel in such a way that compromises in
key transmission are detected before the key is used.

That said, Q cryptography is something else and should not be confused
with Q key distribution.

Cheers,
Ed Gerck


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to