Quantum Cryptography In Action 238
Whitney Wyatt writes: "Discover magazine outlines the first successful laser photon communication utilizing Quantum Cryptography. Called 'Perfect Encryption,' quantum encryption sends the key with the message, however it is impossible for an eavesdropper to intercept the message without changing it. One can only wonder what the FBI will do."
Duhh... (Score:5, Funny)
Why, outlaw quantum mechanics, of course!
Re:Duhh... (Score:1)
Nevertheless, I wonder what implications this will have for privacy, assuming this is feasable enough to become widespread.
Re:Duhh... (Score:2)
nope, no need! (Score:1, Informative)
Plus the distances involved are microscopic. For this to matter much to the government the single quanta of data has to last long enough to travel a significant distance.
key, not message (Score:3, Interesting)
The distance issue is the main problem with this technology but progress is being made on that front and I'm sure it will only be a matter of time before it is solved.
Re:key, not message (Score:3, Insightful)
Check out Generalized Privacy Amplification (1992) by Charles Bennet et. al if you're really interested.
Re:Duhh... (Score:1)
probably the same thing they've always done... intercept the transmission after it's been recieved (or in some cases before its been sent).
there is no such thing as fbi-proof. the message has to be decrypted at some point, otherwise, it isn't a very useful communication, is it?
Lessons from history.... (Score:3, Insightful)
I strongly feel that The Codebreakers should be required reading for cryptography advocates. Over and over again the weakest link in any cryptographic system, including the one-time pad has been user error. According to Kahn the NSA successfully decrypted Soviet messages encrypted with "one-time" pads that had been reused due to supply difficulties or clerical errors. They were able to accomplish this by collecting thousands of encrypted dispatches, using traffic analysis, and looking for identical cipher text that might indicate common words, names, or phrases.
Kahn credits cryptographic incompetence to a wide variety of historical disasters from the defeat of the Imperial Russian army during World War I because key officers refused to use codes, to the World War II defeat of enigma because the German Navy had their U-boats transmitting trivial messages to headquarters on a daily basis. (In fact, traffic analysis and radio direction finding efforts were probably more critical than the actual capture of an enigma machine.)
The bottom line is that creating cryptographic systems that mathematically cannot be broken using current technology and probably with any future technology is relatively trivial. Creating socio-technical systems that are resistant to cryptographic incompetence is almost impossible. Most of the focus on algorithms is missing the point when there exist a dozen algorithms that are unbreakable, but no algorithms that are not vulnerable to social engineering attacks, traffic analysis, and dictionary attacks.
I feel that this is really the primary focus of government attacks on cryptographic products, the goal is not to attack the algorithms, but to hinder the development of socio-technical systems that use cryptography effectively. Why worry about if Microsoft Office includes strong, probably unbreakable encryption algorithms, if the software uses password XOR by default for compatibility with earlier versions, the strong cryptography is incompatible with export versions, and a dictionary attack will get 50 percent of the information you want? I am less interested in whether they can create yet another unbreakable encryption system, than creating a security system that allows me to send private e-mail to co-workers who don't understand why they should get a pgp plug-in or how to use it.
Re:Lessons from history.... (Score:2)
hmmm.. (Score:2, Insightful)
Or is this so complicated that only states and not criminal indivduals can use it?
Martin
Re:hmmm.. (Score:1)
What will they do? (Score:4, Interesting)
Re:What will they do? (Score:1)
On a side note, I have no clue how posts like the parent get modded up. Comparing cryptography to plutonium just doesn't make sense to me. But then again, maybe I'm an idiot.
Re:What will they do? (Score:3, Interesting)
Re:What will they do? (Score:2)
Re:What will they do? (Score:2)
Not successfully, true. However, you do remember the move to require backdoors (government keyescrow, actually) in the early 1990s, right?
Read the arguments put forth against the recent liberalization of export controls. At least half of the objections made didn't have anything to do with other countries--they were regarding law enforcement's 'need' to be able to successfully tap encrypted communications. Do you really think that they want to draw the line at the U.S. border?
Re:What will they do? (Score:2)
Only a matter of time.. (Score:1)
So, right now we can't eavesdrop without modifying
Jason
Re:Only a matter of time.. (Score:2, Informative)
Re:Only a matter of time.. (Score:2, Insightful)
Martin
Re:Only a matter of time.. (Score:2)
Violation of Bell's inequality has been expermentally demonstrated, subject to a few caveats, which mostly boil down to having to assume that God is not maliciously manipulating our results. Of course, all of physics has to assume that, so I don't really think it is a big deal.
What is more, unlike classical cryptography, where the eavesdropper can copy the cyphertext and spend an infinite amount of time decyphering it, quantum key exchange requires that the eavesdropper have the techonology to intercept the signal right now. Quantum key exchange today is immune to future advances in technology (with the possible exception of a working time machine--but then that screws things up no matter what).
All that said, the posts above are absolutely correct in saying that there are always other weak links. This system is not immune to man-in-the middle attacks, tampering with the "trusted" equipment at either end, or social engineering. In addition, some forms of quantum key exchange are potentially vulnerable to tempest style attacks.
Re:Only a matter of time.. (Score:1, Insightful)
Here's a pence, buy a clue
Impossible? (Score:3, Informative)
But they weren't first (Score:2)
If you're still not clear on the whole quantum cryptography deal, idquantique.com has a good introduction [idquantique.com] (pdf, of course).
They won't do anything for a long time (Score:2)
Re:They won't do anything for a long time (Score:1)
Over short distances on the ground, quantum cryptography will be much simpler and cheaper. Wireless optical communication systems that span up to five miles are already in use as voice and data networks linking businesses, hospitals, and university campuses. It would be easy to add single-photon encryption to these systems, Hughes says.
Where not there yet, but maybe in 10 years you can get optical ethernet cards with quantum cryptograhy onboard everywhere cheap.
Who knows
Re:They won't do anything for a long time (Score:2)
Guys, this isn't something that will be showing up in our homes - or even large corporate offices - for years. Decades, maybe. Once this moves out of Los Alamos and into what I will call, for want of a better term, the "real world", there may be export restrictions on this, just as with PGP. That's all, I'll bet. And for now, I doubt there will be *any* legistlation.
It's not just a matter of the technical problems. A bigger question is why would you want this. We already have a key agreement protocol that works perfectly well. It's called Diffie-Hellman, and its security derives from the hardness of the discrete log problem (which is related to the factoring problem). You can make DH as strong as you want, simply by choosing larger exponentials. The danger is that someone will build a quantum computer which can crack DH in p time.
However, the whole point of key agreement is that it allows you make ah hoc communications with arbitrary parties without having to meet ahead of time to agree on a key. To do this, we need an authentication protocol such as RSA. RSA is based on similar maths as DH, so if someone can build a quantum computer that cracks DH then RSA will probably fall too. Quantum cryptography doesn't solve the authentication problem so it isn't much use for wide scale use. It doesn't make much sense for personal use either because you still have to meet with your friend in order to agree on an authentication key.
-a
Re:They won't do anything for a long time (Score:2)
The point you're missing is that because of fundamental quantum mechanics, a third party can't eavesdrop on the transmission without changing the properties OF the transmission. This means that their intrusion can be detected almost immediately. So even if quantum computers would allow them to crack the keys, they won't be able to get into a position to do so.
I'm not missing that point. You obviously didn't understand my previous posting. I was talking about using the use of quantum cryptography for key exchange. If you do the key exchange without authentication then you are subject to a man in the middle attack and quantum mechanics does nothing to help you (the intrusion will NOT be detected). Sure, it will still allow you to detect attempts at quantum cracking once you have a shared key, but that's not useful for wide-scale deployment.
-a
Thought for the day (Score:1)
It's a fallen world...
Re:Thought for the day (Score:1)
look how far we go to trust each other.
it's like the saying about the person who believes everything they read.
Perfect encryption already exists... (Score:3, Insightful)
It's called a one-time pad.
So, before everybody and their brother starts talking about how the NSA can already break this, remember that you can, quite easily, build a 'uncrackable' cypher.
And it'll never be breakable, provided you take some sort of security measures. But if you're paranoid, you already do most of those.
Sorry, this is just a preemptive strike against 'the government can monitor my thoughts" crowd.
Back to your normal high S/N ratio.
Re:Perfect encryption already exists... (Score:3, Informative)
It seems to me that, if this article is correct, the advancement of this form of cryptography is probably no more "unbreakable" than the Titanic was unsinkable. The point is only to make it so that an eavesdropper gives away their presence by intercepting (and thereby destroying) some of the key.
IIRC, most quantum schemes contemplate "quantum" transmission (i.e. single photon encoded information) on for the key, while the actual encrypted message is still transmitted through normal means (which would allow for error correction, faster transmission, communications robustness etc.) So, the actual message is still interceptable, and therefore still susceptible to a brute-force attack.
Sure, you might not be able to get realtime intelligence the way the Allies did in WWII, or we did in the Cold War (thanks to tapping into unencrypted underwater cables), but you can still decypher messages given enough time and computing power.
Thus, I repeat, the scheme contemplated here, if I understand it correctly, is no more "unbreakable" than the Titanic was "unsinkable."
automan(dc)
no sig is good sig.
Re:Perfect encryption already exists... (Score:2, Informative)
no brute force attack (Score:2, Insightful)
The problem is: when you try one the possibilities, how do you know if it's my original plaintext or not? Was my original message "BREAD"? Was it "HELLO"? Was it "DEATH"? The answer is all of the above and none of the above. You can calculate all 2^40 possibilities, and all of them could be correct. You could use a little human intuition -- you could say "DEATH" is more probable than "999.." -- but that only goes so far. You have no reason to believe that "HELLO" is a more or less probably message than "DEATH". If you did have any of that intution, then the actual ciphertext was be literally meaningless to you (aside from its length, of course). You have *NO* way of knowing which is the actual message.
Unless you have the key. This is where quantum cryptography comes into play. Exchanging keys for Vernam ciphers is not hard, but it is impossible (literally) to do electronically and securely. If you send the key over insecured channels, then your key is insecure. If you send your key over encrypted channels, then your key is only as secure as the channel you used, which is to say not secure at all (relatively speaking, seeing as all ciphers are prone to brute-force attack, except for the Vernam cipher). By using quanta, you can tell if your key has been listened to with 1 - (0.5)^n probability, where n is the length of the key.
It always amazes me that people are still willing to spout of crap like "the Vernam cipher is crackable" or "it's prone to brute-force attacks", I guess because they've grown up with the "anything's possible, even the impossible" Hollywood drivel. The Vernam cipher, if the key is generated with a true random number generator (which does not exist, I should say, but it might some day) is uncrackable. It is mathematically provable. Each bit in the ciphertext (again, if the key is completely random) does not depend on any of the bits before or after it. So, suppose you intercept a bit of ciphertext. It is a 0. Was the original plaintext a 0 or a 1? There is a 50% chance it was a 0 and a 50% it was a 1. Tell me how you would crack this; the entire cryptoanalysis field is awaiting your answer. There is no reason a 0 a better answer than a 1; there is no reason a 1 is a better answer than a 0; there is a 0.5 probability it was a 0; there is a 0.5 probability it was a 1. Tell me: was it a 0 or a 1? Take all the computer time you need.
Quantum Cryptography _IS_ OTP (Score:2)
Re:Perfect encryption already exists... (Score:1)
Yes, the article even talks about one-time pads, although they only report their existance since the beginning of the last century.
What is really exciting about this is that the key is sent without detection (supposedly... I personally think there will eventually be devices made to counter this by "quantum listening" to that transfer).
Funny enough, that "crowd" you're referring to will still be paranoid even if they don't bother communicating with anyone at all that the government will still monitor their thoughts.
Sorry, one-time pad is not perfect (Score:2, Interesting)
You say it will *never* be breakable if you take some sort of security measures. Never's a pretty tough thing to prove. OK, which measures should you take? How do you know that 1000 years from now, someone will not have perfected time travel and invisibility... how do you know that someone is not standing over your shoulder while you are locked in a lead-lined vault deep inside Mt. Everest as you key in the pad? If you kill yourself after making the pad, how do you know the inflitrator does not have the technology to reconstruct your memories from your brain tissue? The one time pad being perfect "forever" is a bunch of crap. "For now" I can deal with, but not "forever"... which makes it just like most cryptography.
Re:Sorry, one-time pad is not perfect (Score:2)
> will not have perfected time travel and
>invisibility... how do you know that someone is
> not standing over your shoulder while you are
> locked in a lead-lined vault deep inside Mt.
> Everest as you key in the pad?
(a) If someone has these capabilities, encryption doesn't help you at all, because secrets don't help you at all.
(b) "How do you know that..." is a degenerate argument; how do you know that 'reality' is real? Any rational discussion has to start with agreed-to premises and it's basically childs-play to deny the discussion by rejecting the premises.
Re:Sorry, one-time pad is not perfect (Score:2)
I don't when I'm discussing things like quantum mechanics or cryptography. Especially pared with "never." Will I say that I never will use it in the future? I couldn't say that...
Re:Sorry, one-time pad is not perfect (Score:2)
Which of course is the larger point here that applies to cryptography. Everything is pretty damn secure until you forget that time passes. What we think is unbreakable now is breakable though technique X in 10 years. And if you throw my favorite technology into the mix, time travel, nothing is pretty damn secure, ever... not even today, because someone from the future could come to the present with technique X and make the cryptography incredible insecure... today.
Re:Perfect encryption already exists... (Score:3, Informative)
Re:Perfect encryption already exists... (Score:2)
No form of encryption can hide the fact that a message has been sent. That's what stegaography and other forms of obfuscation are for.
Re:Perfect encryption already exists... (Score:3, Informative)
If you want to make a One Time Pad that's long enough, you are free to disguise the length of a message by padding your text with 0s. This is essentially "wasting" your pad, but if you're really concerned about the length of your message being revealed, you are free to obscure it and make it seem artificially larger. (You can't make it artificially smaller, unless you somehow compress your message before you encrypt it.)
And you can hide the fact that a message has been sent by using any steganographic method you chose. Just as you can with any other encryption algorithm.
Don't confuse the algorithm with the transmition medium.
Re:Perfect encryption already exists... (Score:2)
If you pad your message to a fixed length, you can eliminate problem of a known message length. (if the message is longer than your fixed length, break it into two messages)
No form of "encryption" will hide the fact that you are transmitting a message. To do that you need to imploy a steganographic technique such as spread spectrum transmission. Once you have encrypted your message using your one time pad, you transmit the message using Stego technique and you have "perfect" encryption according to your definition.
Re:Perfect encryption already exists... (Score:2)
For all practical purposes, 128-bit symmetric key ciphers are as unbreakable as an OTP, even to the three-letter organizations, but without the pratical problems associated to the OTP.
Quantum cryptography comes to extend ``nearly-unbreakable'' crypto even further. From the looks of it, the usage of OTPs will decrease due to quantum crypto, even if it isn't unbreakable.
QC is perfect, current implementations aren't (Score:2, Interesting)
Quantum cryptography addresses this problem by creating a secure communication channel that is detected at the single-photon level. Because detection of a single photon changes it, any eavesdropper can easily be detected when unexpected results are found.
The property of the system that simultaneously makes it both secure and unfit for sending anything other than a one-time pad is that a random portion of the bits sent by the source are rendered useless. When the receiver picks an incorrect detection scheme, the results are ambiguous. The two parties compare notes on what methods they used, and then eliminate all the ambiguous bits. They can't know beforehand which ones will be thrown away. The way to check for eavesdroppers is to use an insecure channel to compare (and then throw away) a portion of the results to see if there are any discrepancies.
After the key is sent, the encoded message can be sent on an insecure channel, since both parties can be sure they have the same key. A one-time pad cipher can never be cracked because, for instance, a 1 kbit message can have any 1 kbit key as its cipher. Therefore the number of keys to check would be 2^(1024). Even after this is completed (well after the end of the world?) the decoded message is found along with every other possible 1 kbit combination. Any possible 1 kbit file can would be found among the results. This is no better than writing a program that fills memory with files that contain the numbers from 0 to 2^(1024)-1.
Some researchers are actually attacking the implementation of quantum cryptography rather than the theory. The devices used in QC actually send light down the fiber optic lines that damages the equipment on both ends resulting in predictable behavior. However, there are already safeguards developed against these type of attacks. Essentially it comes down to this question: "Is there a perfect implementation of Quantum Cryptography?"
Sure, but here's the paradox... (Score:3, Informative)
Re:Perfect encryption already exists... (Score:2)
Perfect encryption does not address snooping (Score:2)
Re:Perfect encryption already exists... (Score:5, Informative)
Say you have 1kb you need to encrypt.
You generate a 1kb key, and do a simple XOR.
Then you take the key, and the resulting 'encrypted' file, and send them on their merry way. Only when the two are placed together can the original data be recovered.
So as long as nobody obtains the original key, the data is uncrackable. You can't brute force it, because the keyspace is the size of the data itself. Brute forcing it would simply mean generating every single combination of 1k data fields and guessing which one was the original.
Make sense?
Re:Perfect encryption already exists... (Score:2)
I know OPT are great, but i'm looking into the practical side for everyday use. If i where doing something really bad, i'd be using random OTPs.
I just want to login to my server securely, and be sure messages my friends send me are not tampered. And buy some stuff online. Will there exist a perfect solution for this?
Also, OTPs advange may be in fact a disadvantage. That's not OTP failure of course. Perfect encryption means "you'll never know for sure", but "_sometimes_" you NEED to need something "safe" but reversable.
Federico
Re:Perfect encryption already exists... (Score:2)
Yes it does, thank you. I was hoping someone would give a brief explanation.
Re:Perfect encryption already exists... (Score:2)
Quantum Encryption provides a provably secore way of distributing your one-time PAD or any shorter symmetric key that you might prefer.
Interception vs. Encryption (Score:2, Interesting)
Plus the distances involved are microscopic. For this to matter much to the government the single quanta of data has to last long enough to travel a significant distance.
Re:Interception vs. Encryption (Score:5, Interesting)
Yeah, it means the message can only be read once. But in this case the message is the key for a one time pad encryption.
Basically this makes one time pad encryption a whole lot more secure than it was before. One time pads, I think, are the best form of encryption--but the problem has been the security of the key.
this whole photon quantum encryption deal addresses that issue in a really neat way.
Re:Interception vs. Encryption (Score:2)
No, it doesn't. The OTPs aren't anymore secure (how do you make unbreakable more secure? That's like saying more dead, or more off).
This is also vulnerable to man in the middle attacks. Nothing stops people from re-transmitting whatever they want. If they know the message, the can always re-encrypt. You still need a secure back channel.
Cool, but the FBI don't have to do anything. (Score:3, Insightful)
Alice and Bob have a length of optical fibre running between them, and are using quantum cryptography. Eve attempts to evesdrop, but is unable to do so without changing the information in the signal (polarisation etc). Eve is foiled. Hurrah!
Now imagine that Alice and Bob are mere mortals and get to use the phone network like the rest of us.
The system they use is a standard fibre & router system, but the actual fibre is encrypted. What is Eve to do?
Answer: She installs a tap on the repeater, because quantum crypto only works over single lengths of fibre.
As if by magic quantum cryptography only becomes useful to people who get to dig holes in the road, such as phone companies, big business and the government. We little people don't even get to play the game.
MOD THIS DOWN... (Score:2, Informative)
That means WITHOUT FIBRE
Which means you dont need to dig holes and most of the assumptions of the poster are invalidated.
Read the article first people.
Re:MOD THIS DOWN... (Score:2)
That means WITHOUT FIBRE
Which means you dont need to dig holes and most of the assumptions of the poster are invalidated.
WooHoo! Now I can communicate securely with everybody in my unobstructed direct line of sight! Without fiber!
Wait... I could already do that by walking over to them and whispering in their ear. Oh well.
Re:MOD THIS DOWN... (Score:2)
And no.. I don't think this is ever going to be used at any time for civilian use. The technology is too costly and also typically civilians don't need that level of encryption.
Re:Cool, but the FBI don't have to do anything. (Score:2, Informative)
Re: (Score:2)
Re: Quantum Cryptography In Action (Score:1)
Re: Quantum Cryptography In Action (Score:1)
Re: Quantum Cryptography In Action (Score:1)
Re: Quantum Cryptography In Action (Score:2)
Back to the pre computer days of cryptography (Score:1)
Good scoop. (Score:1)
Osama? (Score:2, Insightful)
Initial handshake? (Score:1)
Re:Initial handshake? (Score:2, Insightful)
After reading one of the more detailed articles linked to the original, I think one solution is to agree as a matter of protocol that the receiver's report will consist of photons all polarized in a specific direction.
The sender sends some random data to the receiver using photon polarization. The receiver randomly chooses polarizations and reports back to the sender its list of choices without polarizing (or using a consistent polarization). The sender then tells it which choices were correct (once again without polarization). At this point all subsequent data could be sent polarized using the bit pattern from the correctly chosen photons to determine the polarization pattern.
Sorry, have to liven this up (Score:1, Offtopic)
Yes, I know its highly off-topic, but far more interesting than another theoretical quantum story...
I'm not up on this sort of thing... (Score:2)
Quantum physics (Score:4, Funny)
Re:Quantum physics (Score:2)
Similar example (Score:1)
Routing (Score:2, Interesting)
What will the Feds do now ? (Score:1)
Keylog as usual
quantum booster? (Score:2)
How This Really Works (Score:3, Interesting)
First you take your bits and XOR them with your randomly generated One Time Pad. Then you send the encrypted text over one channel.
NowNext to your computer you have a little box that generates entangled photons from some sort of parametric downconversion (one photons goes into a crystal and comes out two photons). These photons are (made to be) polarization entangled, meaning you don't know that their polarization is, but whatever it is, both photons share it.
Now you take one of those photons and send it through a polarizer that you have rotated according to the appropriate bit on your One Time Pad. Then you see whether you get a photon or you don't, and send this information to your friend.
Your friend receives the second of the photon pair, and runs a similar polarization measurement.
Now, your friend has three pieces of information: (1) your cyphertext (2) the results of your polarizer pass and (3) the other entangled photon. Thanks to quantum mechanics, your friend can now decode the cyphertext based on the results of his entanged photon passing through the polarizer.
The advantage of this system is that you need all three pieces of information to break the cypher, and the third peice, by the laws of physics, can only be measured once. If an attackers intercepts your communication, he might be able to read part of it, but you will instantly know that ther is someone tapping the line.
The disadvantage is that you can't use any repeaters, as this will destroy the entanglement of your photons. You just have to have really good fibers.
Sorry for the long-windedness, but a less technical explanation really leaves out the juice, and a more technical explanation goes into some extreme handwaving and diagrams.
Muerte
man in the middle (Score:2, Interesting)
What if a I place a device between the intended sender and receiver in such a way that it blocks the intended sender and receiver completely. I intercept a key exchange attempt from the sender and respond as any recipient would. I then have a quantum encrypted channel between myself and the sender. At the same time, I negotiate my own quantum encrypted channel between myself and the recipient. I can now receive data sent from one channel and send it to the other channel. This seems to negate the benefits of using quantum encrypted channels (unless one can somehow assure that I cannot totally block the actual transmissions between the intended sender and receiver).
I suppose some kind of authentication needs to be incorporated into this technology to ensure you're establishing a session to the correct receiver.
The end of crypto for the masses? (Score:2)
It is at this point, ladies and gentlemen, that communication technology stops empowering the masses, and gives the wealthy yet another tool to consolodate and defend their power.
Re:The end of crypto for the masses? (Score:2)
Re:The end of crypto for the masses? (Score:2)
What will the FBI do? Simple (Score:2)
Our government uses communications Joe Citizen can't tap. So should Joe Citizen have the right to use such technology for himself.
Evesdropping IS possible. (Score:3, Informative)
If I can hand someone a secret key that will let us authenticate with each other, then I can just as easily hand them a dvd full of random data for perfect one-time-pad encryption of our communication. Any solution without authentication is no better than the original problem, because authentication reduces to the original problem of getting some secret information from one person to the other.
To understand the problem, imagine this scenario. Alice wants to connect to Bob, so Alice establishes a quantum cryptographically secure connection with Bob. Wonderful, but what if Eve is sitting in the middle, and from the very beginning of the connection, Alice ACTUALLY establishes a quantum cryptographically secure connection with Eve, and then Eve establishes a quantum cryptographically secure connection with Bob. How do they know the difference? They can't, because individual photons are by the laws of quantum mechanics indistinguishable. There's no "signature" by which they can know who they're really talking to.
All quantum cryptography does, is tell you when someone begins evesdropping on a connection that has previously been secure. There will be applications for such a means of secure communication, but without resolving the classic man-in-the-middle attack, quantum cryptography cannot be applied to the bulk of cryptography uses.
Re:Evesdropping IS possible. (Score:2)
This is wonderful if you're James Bond. Now use this defense against man-in-the-middle attacks to secure my connection to a website I'm about to make a purchase on.
Just one link in the chain, guys... (Score:2)
Of course the same goes on the transmitting end.
Similarly, the one-time-pad that the QC system uses to encode the photons is vulnerable to attack or reverse engineering. (Note that this isn't highly likely, but likely enough to eliminate QC from being perfect.)
All Quantum Cryptography does is make one link in the chain more secure. That's it.
Re:Just one link in the chain, guys... (Score:2)
Actually, no. At its best, Quantum Cryptography ensures that one and only one party will be able to receive the encrypted datastream. That doesn't mean it's unassailable. It simply means that it can't be eavesdropped without the intended recipient being aware of it.
Hmmm (Score:2)
And as for worrying about what the FBI will do, I imagine that the FBI will just let the NSA (National Security Agency) [nsa.gov] do their jobs.
Sorry, normally I don't complain but sometimes I just can't help it.
Limitations of QC (Score:2)
Paul.
Direct link to the article (Score:2)
http://www.discover.com/may_02/feattech.html [discover.com]
The link supplied in the slashdot write-up requires Javascript. Javascript is bad. 'K?
Re:The end of cryptographic research looms (Score:1)
Re:The end of cryptographic research looms (Score:2)
For example, assume the cipher text is "TTYM". You try one candidate key and the clear text is "KILL". You try another and the clear text is "LIVE". There is no way to know which is correct, or if either one is correct.
If the key is used twice, suddenly you are not perfectly secure. If a given candidate key results in the first message clear text of "LIVE" and a second message using the same key decrypts as "GRBL", you probably have the wrong key. If, however, you get "KILL" and "SHIP", you have a more probable correct key. The more messages sent with the key, the more likely the recovery by an attacker (that is to say, the more confidence the attacker will have that a candidate key is correct). The only issue is key management. In fact, key management is the big issue with any crypto system.
Quantum cryptography merely offers an easier to use and manage "perfect" crypto system than a one-time pad. It isn't one whit more secure.
Re:The end of cryptographic research looms (Score:2)
The difficulty and expense in using one-time pads is in this need to secure the sharing of the keys. If,as the article suggests (and believe me, I'm no expert in quantum crypto, nor do I claim to be one, but I do have some security and crypto knowledge), quantum cryptography provides a means to do all of this key exchange safely "in the open" as it were, it gets rid of the biggest barrier to using the technique.
Re:omg (Score:1)
Re:omg (Score:2)
The problem with this is that you need to know in which direction it was polarized when you first receive the photon. If you guess incorrectly, then you've lost the information in that photon. Since it's possible to incorrectly guess 50% of the time, you could lose up to 50% of the transmission. It's like having to intercept a message by guessing in advance every word in the message.
No, that's not a problem. The reason is that you know the possible spin states ahead of time. You choose one of two possible vectors to measure along, then you tell the sender what your choice was and he can compute the same answer you got.
The real problem with quantum encryption is that it doesn't have any significant advantage over conventional encryption.
-a
-a
Re:Unreadable? or Unretrievable? (Score:1)
Re:Quanta! (Score:1)
Re:The Irony of Knee Jerk Politics (Score:2)