> Well, I think I agree with everything David said, and given
> his assumptions I believe he is correct.  However, it appears
> that he did NOT carefully read what I had posted.  He is
> assuming the existance of "the key" (see his first interjection)
> while my argument was in two parts:
>
> If there is NO key then a man in the middle attack succeeds.
>    No matter WHAT medium the transmission is on.

        Quantum encryption can ensure that the key is known to one and only one
other party. No other existing technology can do that. Consider, for
example, a stream of entangled particles. For any given pair of particles,
one is + and one is -, and nobody gets to choose which is which. If I shoot
such a stream at me and you, we both get the same bit stream (though yours
is inverted). While a MITM could *get* the key, if he has it, you do not.

        Can you do that with any other technology?

> If there IS a key then quantum encryption provides no
>    additional protection above and beyond conventional
>    encryption using that key.

        Again, false. Quantum encryption can secure a communication today 
against
all conceivable improvements in computing power.

> I can split the second case into two parts:
>
> If there IS a key AND there are NO quantum computers then
>    the key provides adequate protection

        No, it doesn't future advances in compution *will* make any given key
insecure eventually. Your communications today *will* be known in the
future.

> If there IS a key AND there ARE quantum computers then
>    there is no protection against a man in the middle attack
>    (I guess other than making the key have more bits than
>    the largest known quantum computer).

        There is. The MITM must know the key at the time of the communication, 
and
can't do any guessing or trials.

> In NONE of these three cases does the addition of quantum
> encryption increase the security.
>
> In short, David did not understand my argument.

        Definitely. I still don't.

> I EXPLICITLY
> mentioned both the private key concept he assumes AND a
> PKI-based system, and acknowleged that in the case of the
> former there is a key transportation problem, while in the
> latter case you need to have a PKI in place.
>
> David, perhaps you could explain to me what, in absence of
> any prearranged shared secret, the legitimate recipient
> could POSSIBLY do that an interceptor cannot do, given that
> they have the same level of functionality in their equipment
> and the same knowlege of the protocols in use.

        The legitimate recipient can decode the particular beam of particles 
that I
am sending. While an interceptor can do this, it is impossible for both the
interceptor and the legitimate recipient to do this. In other words, quantum
encryption can ensure that a given message has one and only one recipient,
now and forever. Quantum encryption can generate a message that *cannot* in
principle be decoded and re-sent (although you can't choose the message,
just know what it is after the fact).

> I think my argument is a little deeper than you first might
> have realized, and while I'd be glad to acknowlege that you
> are right if indeed you are right, I don't even have the
> basic glimmering of an idea how I might be mistaken???

        Do you agree that:

        1) If there exists a shared secret, quantum encryption can provide
protection, now and in the future, against MITM attacks or passive
interception.

        2) Streams of entangled particles can generate shared secrets where none
previously existed.

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to