Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Arnold G. Reinhold

At 10:38 PM + 1/3/2001, Peter Fairbrother wrote:
>on 3/1/01 9:25 pm, Greg Rose at [EMAIL PROTECTED] wrote:
>
> > At Crypto a
>> couple of years ago the invited lecture gave some very general results
>> about unconditionally secure ciphers... unfortunately I can't remember
>> exactly who gave the lecture, but I think it might have been Oded
>> Goldreich... forgive me if I'm wrong. The important result, though, was
>> that you need truly random input to the algorithm in an amount equal to the
>> stuff being protected, or you cannot have unconditional security.
>
>Not so. Perfect compression with encryption works too.
>

How does perfect compression prevent a known plaintext attack?


Arnold Reinhold


PS I am also curious why Mr. Smith considers 1024-bit RSA to be 
"Conditionally Computationally Secure."




Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Greg Rose

A couple of people have taken me to task for complicating the question 
about One Time Pads. The purpose of my original text was just to say that 
yes, there are other useful and deployed algorithms out there that have 
unconditional security, and that it is not the case that One Time Pads are 
special in that sense. I have often seen the claim that "only one time pads 
are provably secure", and this bugs me.

>Greg Rose wrote:
> >
> > At 11:01 PM 1/3/2001 +, someone wrote:
> > >Don't you think that's a pretty good reason for singling it out? Is
> > >there any additional merit in the more complex realisations?
> >
> > I just meant that there's a widespread assumption that the *only*
> > unconditionally secure algorithm is the One Time Pad. This assumption is
> > incorrect. But I don't think it is worth cluttering the list with this
> > point... I shouldn't have said anything.
>
>Well, it may be, but that would require answering the second question in
>the affirmative: do they have any additional merit?

Well, I gave one example. Shamir Secret Sharing is:
. unconditionally information-theoretically secure
. requires truly random information to be secure
. is clearly useful
. is implemented in a number of publicly available packages
. is not equivalent to a one-time-pad except in a degenerate case

>Clearly I can obfuscate any crypto algorithm by adding other stuff to it
>(e.g. Blowfish+RSA by using the first two primes above the key to
>generate an RSA key) but it doesn't get us anywhere.

Yes, there are an infinite number of ways to use shared random information 
in complicated ways, or to complicate other algorithms, but that wasn't 
what I was getting at.

>What intrigues me is the idea that there may (or may not) be more to the
>methods you describe than mere obfuscation, though I doubt there is.

To further expand the stated example, the way Shamir secret sharing works 
is to give to n parties information such that any t (threshold) of them can 
reconstruct the secret. It does this by choosing AT RANDOM t-1 coefficients 
of a t-th degree polynomial, and using the secret data as the other 
coefficient. The "shares" are the values of the polynomial evaluated at 
independent points. When you have only t-1 data points, the interpolating 
polynomial is incompletely specified, and the set of possible polynomials 
(and therefore the set of possibilities for the secret) is as large as the 
underlying group. When there are t data points available, the interpolating 
polynomial is completely specified, and the data is uniquely revealed. See 
page 526 of the Handbook of Applied Cryptography for the full detail here, 
in particular note 12.72.

I claim that this is not obfuscation, and is a non-trivial application. QED.

I guess I should mention that the packages I've looked at that implement it 
use non-random numbers generated for example by DES, thus artificially 
limiting its security (for example, with two shares, one could brute-force 
the DES key to verify guesses for the "randomly generated" coefficients and 
recover the secret, even if more than two shares were otherwise needed). So 
it really is like the OTP in that regard -- if the numbers are truly 
random, it is provably perfectly secure, but if they aren't, all bets are off.

>Feel free to reply to this on the list. :-)

Done.

regards,
Greg.


Greg Rose   INTERNET: [EMAIL PROTECTED]
Qualcomm Australia  VOICE:  +61-2-9817 4188   FAX: +61-2-9817 5199
Level 3, 230 Victoria Road,http://people.qualcomm.com/ggr/
Gladesville NSW 2111232B EC8F 44C6 C853 D68F  E107 E6BF CD2F 1081 A37C





Re: FC: Congress weighs crypto-in-a-crime, wiretapping legislation

2001-01-03 Thread Declan McCullagh

Finally catching up on some email...

I didn't write the article; it was published in the National Review, a
weekly conservative newspaper
(http://www.nationalreview.com/kopel/kopel121500.shtml). I assume they
do at least rudimentary fact checking, and I believe David Kopel, the
author, to be a careful writer.

You can find the text of the "medal of valor" legislation, which
does not look like it passed during the 106th Congress, here:
http://thomas.loc.gov/cgi-bin/query/z?c106:H.R.46:

Of interest to the list is the crypto-in-a-crime provision:
(c) AMENDMENT OF SENTENCING GUIDELINES RELATING TO USE OF ENCRYPTION-
Pursuant to its authority under section 994(p) of title 28, United
States Code, the United States Sentencing Commission shall amend the
Federal sentencing guidelines and, if appropriate, shall promulgate
guidelines or policy statements or amend existing policy statements to
ensure that the guidelines provide sufficiently stringent penalties to
deter and punish persons who intentionally use encryption in
connection with the commission or concealment of criminal acts
sentenced under the guidelines.

Similar language was included in some of the "crypto liberalization"
bills such as SAFE in the past.

-Declan


On Thu, Dec 28, 2000 at 10:00:52AM -0500, William Allen Simpson wrote:
> Declan, I've looked at the floor activity for that day, and searched 
> the house record [Page: H12100 et seq].  I cannot find any mention of
> HR.46, or "encryption", or "wiretapping".  I also looked at every
> reference to the word "computer", which appears frequently.
> 
> Could your sources be more specific as to how this was passed? 
> 
> Sometimes, it's better to say "Senate" when you mean only the Senate, 
> and give specific names of supporters (Stevens, Hatch), rather than 
> tarring the whole "Congress" with bills that are going nowhere.
> 




Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Paul Crowley

Peter Fairbrother <[EMAIL PROTECTED]> writes:
> Not so. Perfect compression with encryption works too.

Er, does it?  I get a 1k message from you, perfectly compressed and
then encrypted with some strong algorithm and a 128-bit key.  As a
godlike being unhindered by constraints of computational power, I try
all 2^128 possible keys, and find due to the perfect compression that
each of the 2^128 plaintexts is equally likely.  From an information
theoretic point of view, I'm much better off than I was before: I used 
to be missing 8192 bits of entropy, but now I'm only missing 128 - the 
space of possible messages has been vastly reduced.  Put it this way,
if all I want to know is whether you're asking for a ticket to the
dance, I might well learn the answer since I might find that none of
the candidate messages include that request.

A 1k message encrypted with OTP, however, tells me nothing whatsoever.
-- 
  __
\/ o\ [EMAIL PROTECTED]
/\__/ http://www.cluefactory.org.uk/paul/




Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Ray Dillinger



On Wed, 3 Jan 2001, Peter Fairbrother wrote:

>on 3/1/01 9:25 pm, Greg Rose at [EMAIL PROTECTED] wrote:

>> Goldreich... forgive me if I'm wrong. The important result, though, was
>> that you need truly random input to the algorithm in an amount equal to the
>> stuff being protected, or you cannot have unconditional security.
>
>Not so. Perfect compression with encryption works too.


Sure it does.  Let us know when you figure out how to 
do Perfect Compression.

Bear





Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Ben Laurie

Peter Fairbrother wrote:
> > At Crypto a
> > couple of years ago the invited lecture gave some very general results
> > about unconditionally secure ciphers... unfortunately I can't remember
> > exactly who gave the lecture, but I think it might have been Oded
> > Goldreich... forgive me if I'm wrong. The important result, though, was
> > that you need truly random input to the algorithm in an amount equal to the
> > stuff being protected, or you cannot have unconditional security.
> 
> Not so. Perfect compression with encryption works too.

You can argue (reasonably, IMO) that the stuff being protected is the
entropy in the stuff you first thought of, which can be no bigger than
the compressed data.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff




Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Ben Laurie

Greg Rose wrote:
> 
> At 03:06 PM 1/3/2001 -0500, John Young wrote:
> >Yes, the one-time pad. However, I wondered if Smith
> >was hinting at another cipher(s) not yet publicized,
> >perhaps computational -- or more exotic technology
> >such as quantum, DNA, ultra-spectral and beyond.
> 
> It always amazes me that people single out the OTP here. There are any
> number of other algorithms that are unconditionally secure. The simplest is
> Shamir's secret sharing, when you don't have enough shares. At Crypto a
> couple of years ago the invited lecture gave some very general results
> about unconditionally secure ciphers... unfortunately I can't remember
> exactly who gave the lecture, but I think it might have been Oded
> Goldreich... forgive me if I'm wrong. The important result, though, was
> that you need truly random input to the algorithm in an amount equal to the
> stuff being protected, or you cannot have unconditional security. The OTP
> is just the simplest realisation of this.

Don't you think that's a pretty good reason for singling it out? Is
there any additional merit in the more complex realisations?

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff




Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Peter Fairbrother

on 3/1/01 9:25 pm, Greg Rose at [EMAIL PROTECTED] wrote:

> At 03:06 PM 1/3/2001 -0500, John Young wrote:
>> Yes, the one-time pad. However, I wondered if Smith
>> was hinting at another cipher(s) not yet publicized,
>> perhaps computational -- or more exotic technology
>> such as quantum, DNA, ultra-spectral and beyond.
> 
> It always amazes me that people single out the OTP here. There are any
> number of other algorithms that are unconditionally secure. The simplest is
> Shamir's secret sharing, when you don't have enough shares.

I don't think secret sharing qualifies as a cipher.

> At Crypto a 
> couple of years ago the invited lecture gave some very general results
> about unconditionally secure ciphers... unfortunately I can't remember
> exactly who gave the lecture, but I think it might have been Oded
> Goldreich... forgive me if I'm wrong. The important result, though, was
> that you need truly random input to the algorithm in an amount equal to the
> stuff being protected, or you cannot have unconditional security.

Not so. Perfect compression with encryption works too.

>The OTP 
> is just the simplest realisation of this.
> 
> Greg.


Peter
-- 
Peter Fairbrother
[EMAIL PROTECTED]





Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Greg Rose

At 03:06 PM 1/3/2001 -0500, John Young wrote:
>Yes, the one-time pad. However, I wondered if Smith
>was hinting at another cipher(s) not yet publicized,
>perhaps computational -- or more exotic technology
>such as quantum, DNA, ultra-spectral and beyond.

It always amazes me that people single out the OTP here. There are any 
number of other algorithms that are unconditionally secure. The simplest is 
Shamir's secret sharing, when you don't have enough shares. At Crypto a 
couple of years ago the invited lecture gave some very general results 
about unconditionally secure ciphers... unfortunately I can't remember 
exactly who gave the lecture, but I think it might have been Oded 
Goldreich... forgive me if I'm wrong. The important result, though, was 
that you need truly random input to the algorithm in an amount equal to the 
stuff being protected, or you cannot have unconditional security. The OTP 
is just the simplest realisation of this.

Greg.


NOTE NEW ADDRESS AND PHONE NUMBERS BELOW!

Greg Rose   INTERNET: [EMAIL PROTECTED]
Qualcomm Australia  VOICE:  +61-2-9817 4188   FAX: +61-2-9817 5199
Level 3, 230 Victoria Road,http://people.qualcomm.com/ggr/
Gladesville NSW 2111232B EC8F 44C6 C853 D68F  E107 E6BF CD2F 1081 A37C





Re: Fwd: from Edupage, December 22, 2000

2001-01-03 Thread Jim Choate


On 3 Jan 2001, Jaap-Henk Hoepman wrote:

> Except that eavesdropping on the quantum key distribution channel is _always_
> detected (by `laws of nature'), which is not true for these pressure-monitored
> cables. 

It's not true here anymore either. Last year there was at least one group
that demonstrated a mechanism for taking a doublet and making it a
quartet without effecting the entanglement. Check the cypherpunks archive
for the particular post, early this year. I was the one who posted it to
the list.



   Before a larger group can see the virtue of an idea, a
   smaller group must first understand it.

   "Stranger Suns"
   George Zebrowski

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::>/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-







Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Paul Crowley

dmolnar <[EMAIL PROTECTED]> writes:

> On Wed, 3 Jan 2001, Ben Laurie wrote:
> 
> > > A cipher is Conditionally Computationally Secure
> > > (CCS) if the cipher could be implemented with keys
> > > that are not quite "long enough" or with not quite
> > > "enough" rounds to warrant a CS rating. Examples:
> > > SKIPJACK and RSA.
> 
> This seems a bit strange to me. I would have expected "conditionally"
> computationally secure to mean "secure if some condition holds."
> For instance, Rabin is secure if factoring is hard. 

Yes, I don't think these ratings are terribly coherent.  By the
definition you give, of course, we wouldn't be able to name any
unconditionally computationally secure algorithms since we don't even
know wheter P equals NP, but that's as it should be.

We need different metrics for the strength of known attacks (upper
bound on security) and basis in problems believed to be hard (lower
bound on security).  Mixing the two seems unhelpful.
-- 
  __
\/ o\ [EMAIL PROTECTED]
/\__/ http://www.cluefactory.org.uk/paul/




Re: Cryptographic Algorithm Metrics

2001-01-03 Thread John Young

Yes, the one-time pad. However, I wondered if Smith
was hinting at another cipher(s) not yet publicized,
perhaps computational -- or more exotic technology
such as quantum, DNA, ultra-spectral and beyond.

The workshop's purpose was to discuss what security
standards might be established to assure industry
of adequate protection. The unspoken question was
what the USG could do to help industry without making 
its own intelligence-gathering and law enforcement
more difficult and its information security means and 
methods more vulnerable.

That Smith downplayed the weakness of DES is odd. 
Surely he knows of the DES cracks and Cracker. Still,
crackable systems help governments covert.

Are there clues of covert cryptanalysis in Smith's table
of the strength of selected algorithms:

  http://csrc.nist.gov/csspab/june13-15/Smith.pdf

-
MetricDES  3 DESSKIPJACK

Key   56   112  80

Attack1.37x10^11   1.25x10^28   2.56x10^18
Time

A Steps   2^56 2^1122^80

Rounds16   48   32

Strength  CS   CS   CS
-

-
MetricRC5  RSA

Key   64   1024

Attack3.61x10^13   2.40x10^17
Time

A Steps   2^56 Factoring

Rounds16   N/A

Strength  CCS  CCS
-

Note correction of previously cited examples: SKIPJACK 
is in the CS category, and RC5 should have been in CCS.






Re: Cryptographic Algorithm Metrics

2001-01-03 Thread dmolnar



On Wed, 3 Jan 2001, Ben Laurie wrote:

> > A cipher is Conditionally Computationally Secure
> > (CCS) if the cipher could be implemented with keys
> > that are not quite "long enough" or with not quite
> > "enough" rounds to warrant a CS rating. Examples:
> > SKIPJACK and RSA.

This seems a bit strange to me. I would have expected "conditionally"
computationally secure to mean "secure if some condition holds."
For instance, Rabin is secure if factoring is hard. 

> An example of this would be the cipher used on DVDs, or the mobile phone
> one, both of whose names I've forgotten.

The mobile phone one would be A5, with two variants A5/1 and A5/2.
A5/1 likely qualifies as Weak, while A5/2 would now be Very Weak.

-David





Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Ben Laurie

John Young wrote:
> 
> Last summer, at a workshop on "Security Metrics," conducted
> by NIST's Computer System Security and Privacy Advisory
> Board, Landgrave Smith, Institute of Defense Analysis, reported
> on a pilot study of "the metrics used for determining the
> strength of cryptography."
> 
>http://csrc.nist.gov/csspab/june13-15/sec-metrics.html (the workshop)
> 
>http://csrc.nist.gov/csspab/june13-15/Smith.pdf (Smith's presentation)
> 
> Five catergories of algorithm strength were established for
> the pilot:
> 
> Unconditionally Secure (US)
> Computationally Secure (CS)
> Conditionally Computationally Secure (CCS)
> Weak (W)
> Very Weak (VW)
> 
> Smith stated: "A cipher is Unconditionally Secure (US)
> if no matter how much ciphertext is intercepted, there
> is not enough information in the ciphertext to
> determine the plaintext uniquely."
> 
> No examples for this strength were given, and it was
> not clear from Smith's presentation whether there is
> such a cipher or the category was only provided
> as a theoretical premise.
> 
> Question: is there a cipher that is Unconditionally
> Secure?

One-time pads.

> A cipher is Computationally Secure (CS) if it cannot
> be broken by systematic analysis with available
> resources in a short enough time to permit
> exploitation. Examples: DES and 3 DES.

Wrong, DES is Weak.

> A cipher is Conditionally Computationally Secure
> (CCS) if the cipher could be implemented with keys
> that are not quite "long enough" or with not quite
> "enough" rounds to warrant a CS rating. Examples:
> SKIPJACK and RSA.
> 
> A Weak (W) cipher can be broken by a brute force
> attack in an acceptable length of time with an
> "affordable" investment in cryptanalytic resources
> (24 hours and $200K). No examples.
> 
> A Very Weak (VW) cipher is one that can be broken
> by determining the key systematically in a short
> period of time with a small investment (8 hours
> and $20K). No examples.

An example of this would be the cipher used on DVDs, or the mobile phone
one, both of whose names I've forgotten.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff




Re: Cryptographic Algorithm Metrics

2001-01-03 Thread Ray Dillinger



As I suppose others on the list have pointed out by now, he is just 
plain wrong about DES.  

DES is not computationally secure in this terminology.  It is either 
Conditionally Computationally Secure or Weak.

Bear


On Wed, 3 Jan 2001, John Young wrote:

>Last summer, at a workshop on "Security Metrics," conducted
>by NIST's Computer System Security and Privacy Advisory
>Board, Landgrave Smith, Institute of Defense Analysis, reported
>on a pilot study of "the metrics used for determining the
>strength of cryptography."
>
>   http://csrc.nist.gov/csspab/june13-15/sec-metrics.html (the workshop)
>
>   http://csrc.nist.gov/csspab/june13-15/Smith.pdf (Smith's presentation)
>
>Five catergories of algorithm strength were established for
>the pilot:
>
>Unconditionally Secure (US)
>Computationally Secure (CS)
>Conditionally Computationally Secure (CCS)
>Weak (W)
>Very Weak (VW)
>
>Smith stated: "A cipher is Unconditionally Secure (US)
>if no matter how much ciphertext is intercepted, there
>is not enough information in the ciphertext to
>determine the plaintext uniquely."
>
>No examples for this strength were given, and it was
>not clear from Smith's presentation whether there is
>such a cipher or the category was only provided
>as a theoretical premise.
>
>Question: is there a cipher that is Unconditionally
>Secure?
>
>Mr. Smith defined the other categories:
>
>[Quote]
>
>A cipher is Computationally Secure (CS) if it cannot 
>be broken by systematic analysis with available
>resources in a short enough time to permit
>exploitation. Examples: DES and 3 DES.
>
>A cipher is Conditionally Computationally Secure
>(CCS) if the cipher could be implemented with keys
>that are not quite "long enough" or with not quite
>"enough" rounds to warrant a CS rating. Examples:
>SKIPJACK and RSA.
>
>A Weak (W) cipher can be broken by a brute force
>attack in an acceptable length of time with an
>"affordable" investment in cryptanalytic resources
>(24 hours and $200K). No examples.
>
>A Very Weak (VW) cipher is one that can be broken
>by determining the key systematically in a short
>period of time with a small investment (8 hours
>and $20K). No examples.
>
>[End quote]
>
>
>
>
>DES - CS
>3 DES - CS
>SKIPJACK - CCS
>RSA - CCS
>
>
>
>
>





Unconditional security

2001-01-03 Thread Perry E. Metzger


John Young asks:

Smith stated: "A cipher is Unconditionally Secure (US)
if no matter how much ciphertext is intercepted, there
is not enough information in the ciphertext to
determine the plaintext uniquely."

No examples for this strength were given, and it was
not clear from Smith's presentation whether there is
such a cipher or the category was only provided
as a theoretical premise.

Question: is there a cipher that is Unconditionally
Secure?

Yes. A one-time pad based cipher has precisely this property. They are
also, however, unpleasant to use.

Keep in mind that as soon as you use anything but a perfectly random
keystream that is only employed once, it is no longer a one-time
pad. "Pseudo" one time pads are not even remotely unconditionally
secure. At best they are simply stream ciphers of ordinary
security. Frequently, "pseudo" one time pad schemes are totally
worthless.

--
Perry E. Metzger[EMAIL PROTECTED]
--
Quality NetBSD CDs, Support & Service. http://www.wasabisystems.com/



Cryptographic Algorithm Metrics

2001-01-03 Thread John Young

Last summer, at a workshop on "Security Metrics," conducted
by NIST's Computer System Security and Privacy Advisory
Board, Landgrave Smith, Institute of Defense Analysis, reported
on a pilot study of "the metrics used for determining the
strength of cryptography."

   http://csrc.nist.gov/csspab/june13-15/sec-metrics.html (the workshop)

   http://csrc.nist.gov/csspab/june13-15/Smith.pdf (Smith's presentation)

Five catergories of algorithm strength were established for
the pilot:

Unconditionally Secure (US)
Computationally Secure (CS)
Conditionally Computationally Secure (CCS)
Weak (W)
Very Weak (VW)

Smith stated: "A cipher is Unconditionally Secure (US)
if no matter how much ciphertext is intercepted, there
is not enough information in the ciphertext to
determine the plaintext uniquely."

No examples for this strength were given, and it was
not clear from Smith's presentation whether there is
such a cipher or the category was only provided
as a theoretical premise.

Question: is there a cipher that is Unconditionally
Secure?

Mr. Smith defined the other categories:

[Quote]

A cipher is Computationally Secure (CS) if it cannot 
be broken by systematic analysis with available
resources in a short enough time to permit
exploitation. Examples: DES and 3 DES.

A cipher is Conditionally Computationally Secure
(CCS) if the cipher could be implemented with keys
that are not quite "long enough" or with not quite
"enough" rounds to warrant a CS rating. Examples:
SKIPJACK and RSA.

A Weak (W) cipher can be broken by a brute force
attack in an acceptable length of time with an
"affordable" investment in cryptanalytic resources
(24 hours and $200K). No examples.

A Very Weak (VW) cipher is one that can be broken
by determining the key systematically in a short
period of time with a small investment (8 hours
and $20K). No examples.

[End quote]




DES - CS
3 DES - CS
SKIPJACK - CCS
RSA - CCS








Re: Fwd: from Edupage, December 22, 2000

2001-01-03 Thread Ben Laurie

Jaap-Henk Hoepman wrote:
> 
> On Tue, 02 Jan 2001 12:03:40 -0800 David Honig <[EMAIL PROTECTED]> writes:
> > At 10:27 PM 1/1/01 +0530, Udhay Shankar N wrote:
> > >Did this slip between the cracks in holiday season or has it already been
> > >discussed here ?
> > >
> > >Udhay
> >
> > Its just yet another 'secure' scheme that uses quantum theory
> > (here, discrete photons; elsewhere, entangled photons)
> > to detect or prevent leaking bits.
> >
> > More elegant than gas-pressurized, pressure-monitored 'secure' cables, but
> > the same idea.
> 
> Except that eavesdropping on the quantum key distribution channel is _always_
> detected (by `laws of nature'), which is not true for these pressure-monitored
> cables.

I thought that detection in quantum systems was probabilistic?

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff




Re: Fwd: from Edupage, December 22, 2000

2001-01-03 Thread Jaap-Henk Hoepman

On Tue, 02 Jan 2001 12:03:40 -0800 David Honig <[EMAIL PROTECTED]> writes:
> At 10:27 PM 1/1/01 +0530, Udhay Shankar N wrote:
> >Did this slip between the cracks in holiday season or has it already been 
> >discussed here ?
> >
> >Udhay
> 
> Its just yet another 'secure' scheme that uses quantum theory
> (here, discrete photons; elsewhere, entangled photons) 
> to detect or prevent leaking bits.  
> 
> More elegant than gas-pressurized, pressure-monitored 'secure' cables, but
> the same idea. 

Except that eavesdropping on the quantum key distribution channel is _always_
detected (by `laws of nature'), which is not true for these pressure-monitored
cables. 

Jaap-Henk

-- 
Jaap-Henk Hoepman | Come sail your ships around me
Dept. of Computer Science | And burn your bridges down
University of Twente  |   Nick Cave - "Ship Song"
Email: [EMAIL PROTECTED] === WWW: www.cs.utwente.nl/~hoepman
Phone: +31 53 4893795 === Secr: +31 53 4893770 === Fax: +31 53 4894590
PGP ID: 0xF52E26DD  Fingerprint: 1AED DDEB C7F1 DBB3  0556 4732 4217 ABEF