I wonder if there are any mirrors of this out there?
Cheers,
RAH
--- begin forwarded text
Status: U
Date: Fri, 12 Sep 2003 18:36:13 -0700
From: Elias <[EMAIL PROTECTED]>
User-Agent: Mozilla/5.0 (Windows; U; WinNT4.0; en-US;
rv:1.0.2) Gecko/20021120 Netscape/7.01
To: Fork <[EMAIL PROTEC
Dear Cryptoexperts,
With
http://www.magiqtech.com/press/navajounveiled.pdf
and the general hype about quantum cryptography, I am bugged by
a question that I can't really solve. I understand the quantum
theory and how it makes it impossible for two parties to read the
same stream. However, what
martin f krafft wrote:
>So MagiQ and others claim that the technology is theoretically
>unbreakable. How so? If I have 20 bytes of data to send, and someone
>reads the photon stream before the recipient, that someone will have
>access to the 20 bytes before the recipient can look at the 20
>bytes,
also sprach David Wagner <[EMAIL PROTECTED]> [2003.09.13.2306 +0200]:
> You're absolutely right. Quantum cryptography *assumes* that you
> have an authentic, untamperable channel between sender and
> receiver. The standard quantum key-exchange protocols are only
> applicable when there is some oth
On 09/13/2003 03:52 PM, martin f krafft wrote:
> ... any observation of the quantum stream is immediately
> detectable -- but at the recipient's side, and only if checksums are
> being employed, which are not disturbed by continual or sporadic
> photon flips.
>
> someone will have
> access to the 2
> On 09/13/2003 05:06 PM, David Wagner wrote:
> > Quantum cryptography *assumes* that you
> > have an authentic, untamperable channel between sender and receiver.
>
> Not true. The signal is continually checked for
> tampering; no assumption need be made.
Quantum crypto only helps me exchange
martin f krafft wrote:
>David Wagner <[EMAIL PROTECTED]> writes:
>> You're absolutely right. Quantum cryptography *assumes* that you
>> have an authentic, untamperable channel between sender and
>> receiver. The standard quantum key-exchange protocols are only
>> applicable when there is some oth
On 09/13/2003 05:43 PM, David Wagner wrote:
>
> I believe the following is an accurate characterization:
> Quantum provides confidentiality (protection against eavesdropping),
> but only if you've already established authenticity (protection
> against man-in-the-middle attacks) some other way.
I