Re: quantum crypto rears its head again.

2006-12-14 Thread Jon Callas

On 13 Dec 2006, at 11:57 AM, Perry E. Metzger wrote:



I saw this link on Slashdot (and it was also on Ekr's blog):

http://hackreport.net/2006/12/13/quantum-cryptography-its-some-kind- 
of-magiq/


It appears that the quantum crypto meme just won't go away.

Bob Gelfond of MagiQ promises us that for only $100,000, plus monthly
leasing of a dry fiber optic home run between your end systems, you
can have security that isn't even as good as what nearly free software
will give commodity computers over the unsecured public internet.

I wonder if this idea is ever going to die. My guess is it will, but
not until the people who have thrown away their money investing in
this technology go bankrupt.



Thanks for writing your note at the bottom. Quantum cryptography is a  
fascinating thing, but first of all, it's not cryptography. It should  
be called quantum secrecy, or something akin to that. Next, its  
proponents have a tendency to effectively say, "Oh, math, that's  
something that could go bad. But physics, *that* will always be good!"


Jon

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Quantum Crypto

2003-12-20 Thread Perry E . Metzger

John Lowry <[EMAIL PROTECTED]> writes:
> Perry is absolutely right.
> There is no point in pursuing this.
> It might even be analogous to what we now know about computers.
> We were warned that there would never be a need for more than
> A half-dozen - after all, they were extremely expensive just to get
> A few more digits in the logarithm table ...  Thank goodness that we stopped
> those wasteful government research efforts and put money into improving
> analog mechanical desktop calculators - which is all anyone ever needed
> anyway.  ;-)

Your amusing banter aside, my point remains. QCrypto doesn't solve any
problems that anyone has in the real world -- everything it can do can
be done far more cheaply and indeed far better by other means -- so it
is a large expense that serves no purpose.

I know of no company using something like AES+HMAC for link security
that has had its cryptographically secured communications successfully
attacked by cryptanalysis* -- and AES is free, and running it is nearly
free. On the other hand, I know of lots of companies that have had
problems because they haven't thought out their remote access systems
well or because they are running software vulnerable to buffer
overflows. The issue is not that we need "unbreakable crypto" -- we
already have it for practical purposes. The issue is that our systems
are not built robustly.

> Please don't dismiss what is really a very new research area with unknown
> potential -

This is not an issue of "unknown potential" -- we know what the
systems being marketed do. They have specifications and user manuals.

I would never suggest that people stop research, of course, but it
seems that QCrypto is not a solution to any real world problem.

Perry

*By this, I don't include things like "the key management algorithm
 only used all ones as the key" -- I mean legitimate attacks against
 AES etc.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Quantum Crypto

2003-12-20 Thread John Lowry
Perry is absolutely right.
There is no point in pursuing this.
It might even be analogous to what we now know about computers.
We were warned that there would never be a need for more than
A half-dozen - after all, they were extremely expensive just to get
A few more digits in the logarithm table ...  Thank goodness that we stopped
those wasteful government research efforts and put money into improving
analog mechanical desktop calculators - which is all anyone ever needed
anyway.  ;-)

Perry,
I seem to remember paying excessive amounts for my first installations
of 1822, X.25, token-ring, ethernet - in fact all new devices.  Even the
ones that weren't needed ... Initial cost is a poor metric and you of all
people should know it.  However, I sincerely applaud your effort to present
a snapshot of the state of the art - and the effort to qualify the QKD folks
who are prematurely entering the market.  Please try to include a view the
long term potential and imagine how it might be used when you write your
report.  After all, who would have thought that computers _would_ be linked
together to create communication networks ... And that my 75-year old mother
could not only afford one but actually enjoy using it.  (Ok, its a Macintosh
...)
Please don't dismiss what is really a very new research area with unknown
potential - just leaving the physicist's lab bench for the engineering lab
bench - because a few folks are entering the market too soon and claiming
that they have "product".  There is a baby in that bath water !

Season's Greetings !

John


On 12/16/03 10:14, "Perry E.Metzger" <[EMAIL PROTECTED]> wrote:

> 
> There have been more press releases about quantum crypto products
> lately.
> 
> I will summarize my opinion simply -- even if they can do what is
> advertised, they aren't very useful. They only provide link security,
> and at extremely high cost. You can easily just run AES+HMAC on all
> the bits crossing a line and get what is for all practical purposes
> similar security, at a fraction of the price.
> 
> The problem in security is not that we don't have crypto technologies
> that are good enough -- our algorithms are fine. Our real problem is
> in much more practical things like getting our software to high enough
> assurance levels, architectural flaws in our systems, etc.
> 
> Thus, Quantum Crypto ends up being a very high priced way to solve
> problems that we don't have.
> 
> 
> Perry
> 
> -
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Quantum Crypto

2003-12-20 Thread Ed Gerck
"Perry E.Metzger" wrote:

> ...
> The problem in security is not that we don't have crypto technologies
> that are good enough -- our algorithms are fine. Our real problem is
> in much more practical things like getting our software to high enough
> assurance levels, architectural flaws in our systems, etc.
>
> Thus, Quantum Crypto ends up being a very high priced way to solve
> problems that we don't have.

Well, one of our real problems is that in order to protect a system we need
to introduce targets in addition to the system's resources (the original targets)
that can come under attack, which additional targets increase complexity,
overhead and we cannot protect with 100% efficiency. Thus, paradoxically,
adding controls adds weakenesses.

For example, if we add a password list and an ACL to control access we
are adding targets -- that can be (and are) attacked. Another example is
the software itself, needed to control the access.

Quantum cryptography's promise is to solve this real problem by eliminating
some additional targets when compared to a conventional system.

The same, however, can be done without QC and that is, IMO, one of the
directions we need more work on. How can we reduce the number of additional
targets -- QC or not? This approach can provide provable benefits by directly
reducing the total number of targets. You can't attack a target that does not exist.

Cheers,
Ed Gerck


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Quantum crypto, from BBC

2003-06-10 Thread Bill Stewart
At 12:44 PM 06/07/2003 -0400, John S. Denker wrote:
On 06/07/2003 08:04 AM, Udhay Shankar N wrote:
I haven't seen this discussed here yet.
I hadn't seen this particular implementation of it discussed here
before your posting, but as John points out, the topic has been discussed.
It's somewhat cool, but not particularly useful.
On the scale of physics hype, quantum crypto in
particular and quantum computation in general are
nowhere near as bad as cold fusion, but perhaps
comparable to high-Tc superconductors, which had
a definite basis in fact, but their practicality
was wildly overclaimed.
Quantum computers that can actually do factoring of usefully
large numbers would have a major impact on the whole crypto field.
But quantum cryptography for sending messages
is seldom any more useful than sending an occasional courier
with a briefcase handcuffed to his arm,
which probably costs a lot less than stringing fiber.
It's also not very useful for preventing traffic analysis :-)



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Quantum crypto, from BBC

2003-06-07 Thread Perry E. Metzger

Udhay Shankar N <[EMAIL PROTECTED]> writes:
> I haven't seen this discussed here yet. Is there something to this?

Quantum Cryptography is a really expensive way to provide link
encryption that is perhaps marginally better in some theoretical sense
to simply using, say, AES link encryption boxes at both ends, but in
day to day practice provides no additional security at all.

It is the sort of thing that fascinates people who are interested in
neat solutions that solve no real problems.

In the real world, the issue is not finding cryptographic mechanisms
that are good enough. We have fine algorithms for securing links
already. It is getting people to use them, and getting programmers not
to misuse them or make other mistakes that render them moot.

Perry

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Quantum crypto, from BBC

2003-06-07 Thread Dave Howe
Udhay Shankar N wrote:
> I haven't seen this discussed here yet. Is there something to this?

For limited applications, yes

QC in the form usually found in recent tests is actually quite simple.

The sender generates some good random binary data (from an unknown source,
doesn't really matter) and sends it encoded in the polarization of a photon
(one of four states - so two bits are needed at this point per photon; the
first encodes a choice of axes (horizontal+vertical or the diagonals) and
the second an orientation (so for example a 0 could be represented by
horizontal and 1 by vertical, or if the diagonal filter is in use, 0 by a \
and 1 by a /) )
The recipient filters the photons using a random choice of filter - and
transmits the choice of filter back to the sender. From this, the sender
will know if the recipient received the photon encoded properly or not - a
vertical filter would "see" a photon for a vertically encoded 1, not see one
for a horizontally encoded 0, and have a chance to see either a \ or a / but
if it is a decent filter, would not see them at all; the same idea rotated
45 degrees applies to the diagonal filter.
The sender then tells the recipient which filters he got right. Both now
have a set of bits that they alone know, are completely randomly generated,
and can be used as a key for conventional crypto (or if it is important
enough, OTP)

>From this, it should be obvious that you need a fairly clean, predictable
photon path - usually a fiberoptic, so that you can predetermine the
reference axes at both ends of the cable. even a free-air path is usually
too vunerable to distortion and/or photon loss, so is unsuitable.  So, for
the limited case where you can create a single, unbroken optic path between
two sites, and maintain it in a state where it can't be broken by a third
party for a literal mitm attack, it is a perfectly feasable scheme for
transmitting keys. Not likely to replace a trusted courier with a dozen
cheap CDR burnt with keydata in the near future though


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: Quantum crypto, from BBC

2003-06-07 Thread John S. Denker
On 06/07/2003 08:04 AM, Udhay Shankar N wrote:
I haven't seen this discussed here yet. 
It's been discussed here some, and discussed elsewhere
plenty.  I get 19,000 hits from
http://www.google.com/search?q=quantum+cryptography+product+OR+products

> Is there something to this?

It depends on your definition of "something".

Quantum cryptography is perfectly real and is
fascinating in an academic sort of way.
The available products are somewhere between "not
very practical" and "ridiculous" if you ask me.
Most companies can't be bothered to do classical
crypto properly.  The idea that they would pay the
incremental cost to step up to quantum crypto seems
far-fetched to me.
On the scale of physics hype, quantum crypto in
particular and quantum computation in general are
nowhere near as bad as cold fusion, but perhaps
comparable to high-Tc superconductors, which had
a definite basis in fact, but their practicality
was wildly overclaimed.
Dr Shields' team have demonstrated quantum cryptography working over
distances of 100 km, which should be enough to cover large metropolitan
areas such as London and Tokyo.
This is not new news.

The Department of Trade and Industry has pledged cash to help the
researchers refine their work and bring commercial quantum cryptography
products to market.
Tee hee.  Very funny.  I don't think "trade and industry"
considerations are the driving force here.  I think the
military and the cryptologic agencies have rather larger
budgets than the Department of Trade and Industry, and
they are really who's paying for the flurry of R&D.
=

If you want to improve the fact-to-hype ratio, go to
  http://xxx.lanl.gov/find/quant-ph
and type "cryptography" in the 'abstract' box.  I get
82 hits in the range 2001-to-date.  And those lead to
yet other references.


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]