Quantum cryptography gets "practical"
Dave Howe
DaveHowe at gmx.co.uk
Thu Oct 7 11:50:05 PDT 2004
Tyler Durden wrote:
> Oops. You're right. It's been a while. Both photons are not utilized,
> but there's a Private channel and a public channel. As for MITM attacks,
> however, it seems I was right more or less by accident, and the
> collapsed ring configuration seen in many tightly packed metro areas
> (where potential customers of Quantum Key Exchange reside) does indeed
> make such attacks much easier.
>
> Come to think of it, an intruder that were able to gain access to a CO
> without having to notify the public (Patriot Act) should easily be able
> to insert themselves into a QKE client's network and then do whatever
> they want to (provided, of course, they have the means to crack the
> 'regular' encryption scheme used to encode the bits--NSA).
>
> Which means that, should a $75K/year NSA employee want to strike it
> really, really rich, they'd be able to procure advanced notice of any
> mergers/acquisition deals.
Unless someone has come up with a new wrinkle to this since I last
looked, the QKE system indeed requires three channels - the key photon
one which must be optical, and a conventional comms pair (the latter of
course can be substituted with any comms pair you have handy, but if you
are running fibre from A to B you might as well run three)
As all three require MiTM to be mounted, it would be better to have a
physically diverse path for the conventional pair - but in a small city
where you are patching the optical channel though the nearest exchange,
this may not be practicable.
The "regular encryption scheme" (last I looked at a QKE product) was XOR....
More information about the cypherpunks-legacy
mailing list