Re: quantum hype

2003-09-19 Thread John S. Denker
I wrote: >> >> *) In each block, Mallory has a 50/50 chance of being able to >> copy a bit without being detected. On 09/18/2003 12:02 PM, martin f krafft wrote: > > This is what I don't buy. If Mallory sees the data, it must be > detected, because otherwise the approach is flawed. But in any cas

Re: Simple inner transposition steganography

2003-09-19 Thread David Honig
At 08:21 PM 9/18/03 +0200, edo wrote: >Come on, this is a terrible idea for steganography. Unless this catches >on as some sort of fad, which (a) it won't and (b) even if it did it >would be short-lived, then sending a message with its letters scrambled >in this way would be the last thing you'd w

Re: quantum hype

2003-09-19 Thread R. Hirschfeld
> Date: Thu, 18 Sep 2003 18:02:50 +0200 > From: martin f krafft <[EMAIL PROTECTED]> > > I don't know a lot about QKD, but I believe the following is true: The eavesdropper Eve doesn't know with which basis to measure the polarity of the each intercepted photon. When she guesses right, she gets

Re: Simple inner transposition steganography

2003-09-19 Thread Dave Howe
edo wrote: > Come on, this is a terrible idea for steganography. Unless this > catches on as some sort of fad, which (a) it won't and (b) even if it > did it > would be short-lived, then sending a message with its letters > scrambled > in this way would be the last thing you'd want to do for > ste

Re: quantum hype

2003-09-19 Thread Dave Howe
martin f krafft wrote: >This is what I don't buy. If Mallory sees the data, it must be >detected, because otherwise the approach is flawed. As I understand it, there are four possible "rotations" for the photon ( call them '\' '|' '/' and '-' ) so two choices for a filter (straight or slant). a s

Re: quantum hype

2003-09-19 Thread martin f krafft
also sprach [EMAIL PROTECTED] <[EMAIL PROTECTED]> [2003.09.19.1115 +0200]: > The sender sends RANDOM BITS to the receiver. Those that don't get > eavesdropped can then be concatenated at both ends to produce an > identical string of random bits. Since this is known to both > endpoint parties, and n

[Enhyper Knowledgebase] News for 19-Sep-2003

2003-09-19 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Fri, 19 Sep 2003 08:50:44 +0100 To: [EMAIL PROTECTED] From: [EMAIL PROTECTED] Subject: [Enhyper Knowledgebase] News for 19-Sep-2003 --- IWS - The Information Warfare Site (added: 1

Re: Simple inner transposition steganography

2003-09-19 Thread Peter Wayner
edo wrote: > One could declare such a simple trick to be "not stego." Or, even, worthless, and beneath the contempt of the serious student of cryptography. That would be too harsh. The elegance of the idea is that it shows how little one needs to do to achieve some security from observation.

Re: quantum hype

2003-09-19 Thread Victor . Duchovni
On Fri, 19 Sep 2003, martin f krafft wrote: > But Newton gets more wrong the faster you go. So it's not F = m.a, > that theory was only a good approximation, nothing more. Actually it still is F = m.a, but the numbers depend on the observer. F=m.a is a fundamental consequence of the conservation

Re: quantum hype

2003-09-19 Thread Ian Grigg
"R. Hirschfeld" wrote on QKD: > The eavesdropper Eve doesn't know with which basis to measure the > polarity of the each intercepted photon. When she guesses right, she > gets the correct information and can send it on undetectably. When > she guesses wrong, she gets a zero or one with equal pro

Re: quantum hype

2003-09-19 Thread Dave Howe
Ian Grigg wrote: > If I understand this correctly, this is both > an eavesdropping scenario and an MITM scenario. > > In the above, Eve is acting as Mallory, as she > is by definition intercepting the bits and re- > sending them on? I think it is more a question of style - a classic "passive" Eve c

Windows to Power ATMs in 2005

2003-09-19 Thread R. A. Hettinga
Wired News Windows to Power ATMs in 2005š By Elisa Batista Story location: http://www.wired.com/news/technology/0,1282,60497,00.html 02:00 AM Sep. 19, 2003 PT Within three years, most bank machines that dispense cash will run on the Window

Re: quantum hype

2003-09-19 Thread Matt Crawford
I'm always stuck on that little step where Alice tells Bob what basis she used for each photon sent. Tells him how? They need integrity protection and endpoint authentication for N bits of basis. Is the quantum trick converting those N bits to N/2 privacy-protected bits really as exciting as

Re: quantum hype

2003-09-19 Thread John S. Denker
On 09/19/2003 12:07 PM, Matt Crawford wrote: I'm always stuck on that little step where Alice tells Bob what basis she used for each photon sent. Tells him how? That's a fair question. Here's an outline of the answer. We choose an eps << 1. We ask how many people accurately received a fractio

Threat models (was: quantum hype )

2003-09-19 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, "John S. Denker" writes: > Or perhaps more relevantly, what >is the chance that an enemy black-bag artist or a >traitor or a bungler will compromise all my keys >and/or all my plaintext? The latter is not to >be sneezed at, and puts an upper bound on what >I'm willi