Re: quantum hype

2003-10-03 Thread Peter Fairbrother
[EMAIL PROTECTED] wrote: >> From: [EMAIL PROTECTED] >> [mailto:[EMAIL PROTECTED] Behalf Of Dave Howe >> >> Peter Fairbrother may well be in possession of a break for the QC hard >> problem - his last post stated there was a way to "clone" photons with >> high accuracy in retention of their polari

Re: quantum hype

2003-09-28 Thread Dave Howe
Peter Fairbrother wrote: > I promised some links about the 5/6 cloning figure. You've had a few > experimental ones, here are some theory ones. has anyone with better number theory / probability skills than me taken a stab at exactly *how* accurate cloning would have to be (and how many clones you

Re: quantum hype

2003-09-28 Thread Peter Fairbrother
I promised some links about the 5/6 cloning figure. You've had a few experimental ones, here are some theory ones. Cloning machines: http://www.fi.muni.cz/usr/buzek/mypapers/96pra1844.pdf Theoretically optimal cloning machines: http://www.gap-optique.unige.ch/Publications/Pdf/PRL02153.pdf 1/6 d

Re: quantum hype

2003-09-24 Thread Greg Troxel
I'm always stuck on that little step where Alice tells Bob what basis she used for each photon sent. Tells him how? They need integrity protection and endpoint authentication for N bits of basis. Is the quantum trick converting those N bits to N/2 privacy-protected bits really as excit

Re: quantum hype

2003-09-22 Thread David Wagner
John S. Denker wrote: >After the key exchange has taken place, Alice >and Bob can use the key to set up a tunnel to >keep their discussions private. Probably one >of the first things they will do is exchange >authentication messages through the newly >created tunnel. Thereby Alice can decide >whe

Re: quantum hype

2003-09-22 Thread Peter Fairbrother
Matt Crawford wrote: >> BTW, you can decrease the wavelength of a photon by bouncing it off >> moving >> mirrors. > > Sure. To double the energy (halve the wavelength), move the mirror at > 70% of the speed of light. And since you don't know exactly when the > photon is coming, keep it moving a

Re: quantum hype

2003-09-22 Thread Matt Crawford
BTW, you can decrease the wavelength of a photon by bouncing it off moving mirrors. Sure. To double the energy (halve the wavelength), move the mirror at 70% of the speed of light. And since you don't know exactly when the photon is coming, keep it moving at that speed ... ---

Re: quantum hype

2003-09-22 Thread Peter Fairbrother
[EMAIL PROTECTED] wrote: >> From: [EMAIL PROTECTED] >> [mailto:[EMAIL PROTECTED] Behalf Of Dave Howe >> >> Peter Fairbrother may well be in possession of a break for the QC hard >> problem - his last post stated there was a way to "clone" photons with >> high accuracy in retention of their polari

RE: quantum hype

2003-09-22 Thread Michael_Heyman
> From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of Dave Howe > > Peter Fairbrother may well be in possession of a break for the QC hard > problem - his last post stated there was a way to "clone" photons with > high accuracy in retention of their polarization > [SNIP] > Not a break at

Re: quantum hype

2003-09-22 Thread Jaap-Henk Hoepman
I always understood that QKD is based on a hard problem of which the theory of physics says it is impossible to find a solution (if not, then i'd like to know). Then if QKD breaks, the current theory of physics was wrong. On the other hand, if DH or RSA breaks, factoring or the discrete log turn

Re: quantum hype

2003-09-21 Thread Andreas Gunnarsson
On Sun, Sep 21, 2003 at 01:37:21PM +0100, Peter Fairbrother wrote: [cloning photons] > There is also another less noisy cloning technique which has recently been > done in laboratories, though it doubles the photon's wavelength, which would > be noticeable, To get rid of the wavelength change it s

Re: quantum hype

2003-09-21 Thread Peter Fairbrother
Peter Fairbrother wrote: > If the channel is authentic then a MitM is hard - but not impossible. The > "no-cloning" theorem is all very well, but physics actually allows imperfect > cloning of up to 5/6 of the photons while retaining polarisation, and this > should be allowed for as well as the n

Re: quantum hype

2003-09-21 Thread Dave Howe
>> no. its the "underlieing hard problem" for QC. If there is >> a solution to any of the Hard Problems, nobody knows about them. >right, so it's no better than the arguable hard problem of >factoring a 2048 bit number. Peter Fairbrother may well be in possession of a break for the QC hard problem

Re: quantum hype

2003-09-21 Thread martin f krafft
Again, replying to all. also sprach John S. Denker <[EMAIL PROTECTED]> [2003.09.19.0038 +0200]: > Other key-exchange methods such as DH are comparably > incapable of solving the DoS problem. So why bring up > the issue? For one, I can un-DoS with QC at any point in time. This may be relevant for

Re: quantum hype

2003-09-21 Thread Peter Fairbrother
There are lots of types of QC. I'll just mention two. In "classic" QC Alice generates polarised photons at randomly chosen either "+" or "x" polarisations. Bob measures the received photons using a randomly chosen polarisation, and tells Alice whether the measurement polarisation he chose was "+"

Re: quantum hype

2003-09-21 Thread Arnold G. Reinhold
At 6:38 PM -0400 9/18/03, John S. Denker wrote: Yes, Mallory can DoS the setup by reading (and thereby trashing) every bit. But Mallory can DoS the setup by chopping out a piece of the cable. The two are equally effective and equally detectable. Chopping is cheaper and easier. Other key-exchange

Re: quantum hype

2003-09-20 Thread R. Hirschfeld
> Date: Fri, 19 Sep 2003 11:57:22 -0400 > From: Ian Grigg <[EMAIL PROTECTED]> > If I understand this correctly, this is both > an eavesdropping scenario and an MITM scenario. > > In the above, Eve is acting as Mallory, as she > is by definition intercepting the bits and re- > sending them on? As

Re: quantum hype

2003-09-19 Thread John S. Denker
On 09/19/2003 12:07 PM, Matt Crawford wrote: I'm always stuck on that little step where Alice tells Bob what basis she used for each photon sent. Tells him how? That's a fair question. Here's an outline of the answer. We choose an eps << 1. We ask how many people accurately received a fractio

Re: quantum hype

2003-09-19 Thread Matt Crawford
I'm always stuck on that little step where Alice tells Bob what basis she used for each photon sent. Tells him how? They need integrity protection and endpoint authentication for N bits of basis. Is the quantum trick converting those N bits to N/2 privacy-protected bits really as exciting as

Re: quantum hype

2003-09-19 Thread Dave Howe
Ian Grigg wrote: > If I understand this correctly, this is both > an eavesdropping scenario and an MITM scenario. > > In the above, Eve is acting as Mallory, as she > is by definition intercepting the bits and re- > sending them on? I think it is more a question of style - a classic "passive" Eve c

Re: quantum hype

2003-09-19 Thread Ian Grigg
"R. Hirschfeld" wrote on QKD: > The eavesdropper Eve doesn't know with which basis to measure the > polarity of the each intercepted photon. When she guesses right, she > gets the correct information and can send it on undetectably. When > she guesses wrong, she gets a zero or one with equal pro

Re: quantum hype

2003-09-19 Thread Victor . Duchovni
On Fri, 19 Sep 2003, martin f krafft wrote: > But Newton gets more wrong the faster you go. So it's not F = m.a, > that theory was only a good approximation, nothing more. Actually it still is F = m.a, but the numbers depend on the observer. F=m.a is a fundamental consequence of the conservation

Re: quantum hype

2003-09-19 Thread martin f krafft
also sprach [EMAIL PROTECTED] <[EMAIL PROTECTED]> [2003.09.19.1115 +0200]: > The sender sends RANDOM BITS to the receiver. Those that don't get > eavesdropped can then be concatenated at both ends to produce an > identical string of random bits. Since this is known to both > endpoint parties, and n

Re: quantum hype

2003-09-19 Thread Dave Howe
martin f krafft wrote: >This is what I don't buy. If Mallory sees the data, it must be >detected, because otherwise the approach is flawed. As I understand it, there are four possible "rotations" for the photon ( call them '\' '|' '/' and '-' ) so two choices for a filter (straight or slant). a s

Re: quantum hype

2003-09-19 Thread R. Hirschfeld
> Date: Thu, 18 Sep 2003 18:02:50 +0200 > From: martin f krafft <[EMAIL PROTECTED]> > > I don't know a lot about QKD, but I believe the following is true: The eavesdropper Eve doesn't know with which basis to measure the polarity of the each intercepted photon. When she guesses right, she gets

Re: quantum hype

2003-09-19 Thread John S. Denker
I wrote: >> >> *) In each block, Mallory has a 50/50 chance of being able to >> copy a bit without being detected. On 09/18/2003 12:02 PM, martin f krafft wrote: > > This is what I don't buy. If Mallory sees the data, it must be > detected, because otherwise the approach is flawed. But in any cas

Re: quantum hype

2003-09-18 Thread martin f krafft
It took me a while. I would herewith like to reply to all posts on this I received so far: also sprach John S. Denker <[EMAIL PROTECTED]> [2003.09.13.2343 +0200]: > *) In each block, Mallory has a 50/50 chance of being able to > copy a bit without being detected. This is what I don't buy. If

Re: quantum hype

2003-09-16 Thread John Lowry
QC is currently a one-time pad distribution mechanism - or at lower rates a key establishment mechanism most suitable for symmetric algorithms. You are correct that authentication is not inherent. Then again, this is also true for "classical" symmetric and PKI schemes. To be usable, all crypto r

Re: quantum hype

2003-09-16 Thread Hadmut Danisch
On Sat, Sep 13, 2003 at 09:06:56PM +, David Wagner wrote: > > You're absolutely right. Quantum cryptography *assumes* that you > have an authentic, untamperable channel between sender and receiver. So as a result, Quantum cryptography depends on the known methods to provide authenticity and

Re: quantum hype

2003-09-15 Thread Ed Gerck
martin f krafft wrote: > So MagiQ and others claim that the technology is theoretically > unbreakable. How so? If I have 20 bytes of data to send, and someone > reads the photon stream before the recipient, that someone will have > access to the 20 bytes before the recipient can look at the 20 > b

Re: quantum hype

2003-09-14 Thread David Wagner
Arnold G. Reinhold wrote: >I think there is another problem with quantum cryptography. Putting >aside the question of the physical channel, there is the black box at >either end that does all this magical quantum stuff. One has to trust >that black box. > >- Its design has to thoroughly audited

Re: quantum hype

2003-09-14 Thread Ian Grigg
David Wagner wrote: > One could reasonably ask how often it is in practice that we have a > physical channel whose authenticity we trust, but where eavesdropping > is a threat. I don't know. The only answer that I have come across - to which I ascribe no view on accuracy - is "undersea fibre" [1

Re: quantum hype

2003-09-14 Thread Bill Stewart
martin f krafft wrote: and the general hype about quantum cryptography, I am bugged by a question that I can't really solve. I understand the quantum theory and how it makes it impossible for two parties to read the same stream. However, what I don't understand is how that adds to security. It's ve

Re: quantum hype

2003-09-14 Thread Arnold G. Reinhold
At 10:18 PM + 9/13/03, David Wagner wrote: ... One could reasonably ask how often it is in practice that we have a physical channel whose authenticity we trust, but where eavesdropping is a threat. I don't know. I think there is another problem with quantum cryptography. Putting aside the que

Re: quantum hype

2003-09-14 Thread starwars
Martin F Krafft asked: > So MagiQ and others claim that the technology is theoretically > unbreakable. How so? If I have 20 bytes of data to send, and someone > reads the photon stream before the recipient, that someone will have > access to the 20 bytes before the recipient can look at the 20 > b

Re: quantum hype

2003-09-13 Thread John S. Denker
On 09/13/2003 05:43 PM, David Wagner wrote: > > I believe the following is an accurate characterization: > Quantum provides confidentiality (protection against eavesdropping), > but only if you've already established authenticity (protection > against man-in-the-middle attacks) some other way. I

Re: quantum hype

2003-09-13 Thread David Wagner
martin f krafft wrote: >David Wagner <[EMAIL PROTECTED]> writes: >> You're absolutely right. Quantum cryptography *assumes* that you >> have an authentic, untamperable channel between sender and >> receiver. The standard quantum key-exchange protocols are only >> applicable when there is some oth

Re: quantum hype

2003-09-13 Thread David Wagner
> On 09/13/2003 05:06 PM, David Wagner wrote: > > Quantum cryptography *assumes* that you > > have an authentic, untamperable channel between sender and receiver. > > Not true. The signal is continually checked for > tampering; no assumption need be made. Quantum crypto only helps me exchange

Re: quantum hype

2003-09-13 Thread John S. Denker
On 09/13/2003 03:52 PM, martin f krafft wrote: > ... any observation of the quantum stream is immediately > detectable -- but at the recipient's side, and only if checksums are > being employed, which are not disturbed by continual or sporadic > photon flips. > > someone will have > access to the 2

Re: quantum hype

2003-09-13 Thread martin f krafft
also sprach David Wagner <[EMAIL PROTECTED]> [2003.09.13.2306 +0200]: > You're absolutely right. Quantum cryptography *assumes* that you > have an authentic, untamperable channel between sender and > receiver. The standard quantum key-exchange protocols are only > applicable when there is some oth

Re: quantum hype

2003-09-13 Thread David Wagner
martin f krafft wrote: >So MagiQ and others claim that the technology is theoretically >unbreakable. How so? If I have 20 bytes of data to send, and someone >reads the photon stream before the recipient, that someone will have >access to the 20 bytes before the recipient can look at the 20 >bytes,