On Fri, 27 Jan 2012 13:39:44 -0500, Warren Kumari <war...@kumari.net> wrote: > If your security widget vendor is malicious, they may include some > sort of storage in devices you purchase, record secret bits and > someone might pull them out in the future.... > > Surely I am missing something here? Or is that really the news?
I thought the same thing and skimmed (very incompletely) through the paper. They do talk about how to hide the saved bits in later sessions of particular QKD protocols, so maybe there is something inherent there that would make such an attack, say, especially hard to detect in the QKD setting? -SMH _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography