At 6:38 PM -0400 9/18/03, John S. Denker wrote:
Yes, Mallory can DoS the setup by reading (and thereby
trashing) every bit. But Mallory can DoS the setup by
chopping out a piece of the cable. The two are equally
effective and equally detectable. Chopping is cheaper and
easier.
Other key-exchange
There are lots of types of QC. I'll just mention two.
In "classic" QC Alice generates polarised photons at randomly chosen either
"+" or "x" polarisations. Bob measures the received photons using a randomly
chosen polarisation, and tells Alice whether the measurement polarisation he
chose was "+"
Again, replying to all.
also sprach John S. Denker <[EMAIL PROTECTED]> [2003.09.19.0038 +0200]:
> Other key-exchange methods such as DH are comparably
> incapable of solving the DoS problem. So why bring up
> the issue?
For one, I can un-DoS with QC at any point in time. This may be
relevant for
>> no. its the "underlieing hard problem" for QC. If there is
>> a solution to any of the Hard Problems, nobody knows about them.
>right, so it's no better than the arguable hard problem of
>factoring a 2048 bit number.
Peter Fairbrother may well be in possession of a break for the QC hard
problem
Peter Fairbrother wrote:
> If the channel is authentic then a MitM is hard - but not impossible. The
> "no-cloning" theorem is all very well, but physics actually allows imperfect
> cloning of up to 5/6 of the photons while retaining polarisation, and this
> should be allowed for as well as the n
On Sun, Sep 21, 2003 at 01:37:21PM +0100, Peter Fairbrother wrote:
[cloning photons]
> There is also another less noisy cloning technique which has recently been
> done in laboratories, though it doubles the photon's wavelength, which would
> be noticeable,
To get rid of the wavelength change it s
Has anyone reviewed Simon Singh's CD version
of "The Code Book" ?
=
http://www.simonsingh.net/The_CDROM.html
After 12 months of intense development, the interactive
CD-ROM version of The Code Book is now available. I might
be biased, but I think that i
After listening to the discussion about hiding information by
srcabmling the oredr of ltetres, I decided to write some code to
experiment with it.
You can try out the Java applet here:
http://www.wayner.org/books/discrypt2/wordsteg.php
Source code is available protected by the LGPL.
It builds