Well, I think I agree with everything David said, and given
his assumptions I believe he is correct. However, it appears
that he did NOT carefully read what I had posted. He is
assuming the existance of "the key" (see his first interjection)
while my argument was in two parts:
If there is NO key then a man in the middle attack succeeds.
No matter WHAT medium the transmission is on.
If there IS a key then quantum encryption provides no
additional protection above and beyond conventional
encryption using that key.
I can split the second case into two parts:
If there IS a key AND there are NO quantum computers then
the key provides adequate protection
If there IS a key AND there ARE quantum computers then
there is no protection against a man in the middle attack
(I guess other than making the key have more bits than
the largest known quantum computer).
In NONE of these three cases does the addition of quantum
encryption increase the security.
In short, David did not understand my argument. I EXPLICITLY
mentioned both the private key concept he assumes AND a
PKI-based system, and acknowleged that in the case of the
former there is a key transportation problem, while in the
latter case you need to have a PKI in place.
David, perhaps you could explain to me what, in absence of
any prearranged shared secret, the legitimate recipient
could POSSIBLY do that an interceptor cannot do, given that
they have the same level of functionality in their equipment
and the same knowlege of the protocols in use.
I think my argument is a little deeper than you first might
have realized, and while I'd be glad to acknowlege that you
are right if indeed you are right, I don't even have the
basic glimmering of an idea how I might be mistaken???
===
David Schwartz wrote:
Sorry for the late reply:
Quantum Cryptography vs the "man-in-the-middle" attack
The recent availability of commercial products for quantum
cryptography has generated much press attention, however,
any putative value-add for these products escapes this
author. Given the traditional "man in the middle" attack
where Vladimir imposes a pair of transceivers between Alice
and Bob:
+-------+ +----+ +------------+ +----+ +-----+
| Alice +----+ XC +--+ Vladimir's +--+ XC +----+ Bob |
+-------+ +----+ | Laptop | +----+ +-----+
+------------+
Quantum cryptography on these links does not seem to
provide any additional protection.
What?!
Under the customary
and usual assumptions that Vladimir has access to fully
functional transceiver equipment and has full knowledge
of all communications protocols in use, it just plain
not possible for Alice to know she is talking to Bob
(and not Vladimir) or for Bob to know he is talking to
Alice.
What?! How can Vladimir receive the signal if he doesn't know the key?
So, if we need either a shared secret or a Public Key
Infrastructure to protect against man in the middle
attacks anyway, what is the value add of using quantum
encryption on the link?
The value add is that quantum encryption protects against a man in the
middle attack by using a shared secret. This protection is fundamental, in
the sense that even if the man in the middle happens to guess the shared
secret, he *still* cannot decrypt the signal (unless the correct answer is
his one and only guess at the time the signal is sent, and if he guesses
wrong, he is detected).
The theory is advanced that quantum encryption would
provide some protection against the forthcoming quantum
computers, but again, this author is not persuaded.
Yes, a quantum computer could be used to attack either
scheme described, but then we lose, because it is now
possible to conduct a man in the middle attack,
even though the links themselves are quantum encrypted.
Huh? It seems to me to be very clear you have no idea what you're
talking
about. The problem is that future quantum computers may process information
much faster than current ones, and thus may break keys that we consider safe
today. However, no amount of computing power can break quantum encryption.
In summary, any putative value-add for the use of
quantum encryption completely escapes this author,
in either the absence or presence of the availability
of quantum computers as attack tools.
I think you just don't understand how quantum encryption works. The idea
with quantum encryption is that you need the key to receive the signal at
all, and only one recipient can possibly receive the signal. Thus, without
the key at the time of transmission, a MITM cannot rebroadcast the
transmission, thus it is impossible for both a MITM and the intended
recipient to receive the tranmission.
This is a capability that no other form of encryption can provide
today. It
has the benefit that no conceivable future improvements in computing power
can compromise today's communications.
To help those not familiar wrap their brains around quantum encryption,
imagine if we encode our data as a stream of particles. We have four types
of particles we can put in each timeslot, A+, A-, B+, and B-. The stream of
particles can strike two types of detectors, an A detector and a B detector
(the recipient must put a detector in the path of the particles for each
time slot to detect the particle).
If an A+ particle strikes an A detector, the detector indicates a +. If
an
A- particle strikes an A detector, the detector indicates a -. If a B+
particle strikes a B detector, a + is indicated. If a B- particle strikes a
B detector, a - is indicated.
The cool part is that if an A+ or A- particle strikes a B detector, the
indication is random, could be + or -. If a B+ or B- particle strikes an A
detector, the indication is random, could be + or -.
The data is whether the particles used are + or -. The key is the
sequence
of A or B particles *and* detectors used. It is impossible in principle to
detect whether the particle is + or - without first knowing if it is A or B.
A MITM will not know which detectors to use on which particles, so if he
intercepts any particles, he will hopelessly lose the data (whether those
particles were + or -). Thus not only will he be detected (because he cannot
retransmit) but he will not get the right data (because he will not know
which detectors to use).
This is a simplified analogy of what quantum encryption does; however,
it
should be just enough to show that:
1) No conceivable advances in computing power will break today's quantum
communications.
2) Quantum encryption provides defenses against a MITM (or any kind of
unauthorized reception) that are ironclad.
DS
--
"An Internet-connected Windows machine is tantamount to
a toddler carrying a baggie of $100 bills down a city street..."
Charles B (Ben) Cranston
mailto: [EMAIL PROTECTED]
http://www.wam.umd.edu/~zben
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager [EMAIL PROTECTED]