Quantum Cryptography Broken, and Fixed 118
schliz writes in with research out of Sweden in which researchers showed that, looking at a quantum cryptographic system as a whole, it was possible for an eavesdropper to extract some information about the QC key, thus reducing the security of the overall system. The team then proposed a cheap and simple fix for the problem. "The advanced technology was thought to be unbreakable due to laws of quantum mechanics that state that quantum mechanical objects cannot be observed or manipulated without being disturbed. But a research team at Linköping University in Sweden claim that it is possible for an eavesdropper to [get around the limitations] without being discovered. In a research paper, published in the international engineering journal IEEE Transactions on Information Theory (abstract), the researchers propose a change in the quantum cryptography process that they expect will restore the security of the technology."
There is no such thing as absolute security (Score:4, Insightful)
As long as there is even one access method there exists the opportunity to expoloit it somehow.
Re:Fundamental Flaw in Quantum[Anything] (Score:1, Insightful)
From superconductors to Aspect experiments
BTW a Superconductor doesn't lose energy because QM makes it impossible for the electrons to scatter of the nuclei. Again something entirely impossible according to our common intuitions, which, alas, the world does not care about all that much.
See also:
http://en.wikipedia.org/wiki/No_cloning_theorem
Re:Fundamental Flaw in Quantum[Anything] (Score:3, Insightful)
If something already makes sense then there is less of a need to study it scientifically. So science will gravitate towards non-intuitive things like neutrinos, recessive genes, bose-einstein condensates, etc.
Re:Fundamental Flaw in Quantum[Anything] (Score:3, Insightful)
I just hope this doesn't catch on..
Re:hype alert (Score:3, Insightful)
Re:The End of The Science of Cryptography (Score:2, Insightful)
No, not really (Score:5, Insightful)
Do you understand that one crucial aspect? If I want to talk to you completely securely, with quantum handshake, and able to detect eavesdroppers, I would need one uninterrupted strand of fibre from Germany to wherever you are. Screw 50kms, we're talking potentially tens of thousands of kilometres.
Or a chain of routers along the way that we both trust blindly to not be compromised, because each breaks that quantum handshake, and each is a point where someone could eavesdrop. You can't tunnel QC over such a hop, so it's a bit like having SSL only from your computer to your ISP, then have it decrypted there and re-encrypted to the next hop, and so on.
It's also pretty much against the whole idea of a network like the Internet. Since again, it needs dedicated uninterrupted point-to-point connections, not a loose mesh of routing machines. (You _could_ transmit the rest over the internet once you negotiated a key over QC, but: 1. you still need a dedicated connection for that handshake, and 2. you still need normal cryptography for the actual transmission then.)
For two John Does like us it's already pretty infeasible to go QC all the way.
Even for someone like the US Army:
1. Good luck having an all-QC connection from Washington to Baghdad. Even in 50 km segments, you need a lot of basically routers every 50 km on the ocean floor, each of them being a potential eavesdropping point. So if you ditch normal cryptography, you'd need to do... what? Park a couple of submarines near each of them to make damn sure the Russkies and Chinese don't tamper with them? Have permanent manned bases on the ocean floor every 50 km, with a company of soldiers watching each router, and watching each other so none of them can be a double agent and tamper with it?
2. And what do you do if someone drops a depth charge on one of those? You sure you don't want some regular crypto as backup?
3. That still doesn't help your communication to your airplanes, tanks, cruise missiles, etc, there. You can't tie a cable from each of them to Washington.
Etc.
So basically... well, let me put it mildly: I don't know what book you've read, or by what author, but I'd bet it wasn't written by someone who knows much about cryptography. It sounds more like the kind of predictions made by self-styled "pundits" like Cringely or Dvorak. Or, of course, any other of the many like them.
Re:hype alert (Score:1, Insightful)
I can safely exchange a key, because I can detect eavesdroppers and replace the sniffed parts of the key with new ones?
But if someone is continuosly does that, doesn't he effectively prevent me from communicating at all??