At 10:44 AM -0700 6/22/07, Ali, Saqib wrote:
...whereas the key distribution systems we have aren't affected by
eavesdropping unless the attacker has the ability to perform 2^128 or
more operations, which he doesn't.
Paul: Here you are assuming that key exchange has already taken place.
No, I'm not. I am talking about protocols that do their own key
exchange. IPsec. SSL/TLS. Kerberos. Etc.
But key exchange is the toughest part.
No, requiring that the two ends have a fixed connection which QKD
works over is far tougher than using a proven protocol that works
over any connection.
--Paul Hoffman, Director
--VPN Consortium
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]