quantum hype

Arnold G. Reinhold reinhold at world.std.com
Sun Sep 21 06:54:49 EDT 2003


At 6:38 PM -0400 9/18/03, John S. Denker wrote:
>
>Yes, Mallory can DoS the setup by reading (and thereby
>trashing) every bit.  But Mallory can DoS the setup by
>chopping out a piece of the cable.  The two are equally
>effective and equally detectable.  Chopping is cheaper and
>easier.
>
>Other key-exchange methods such as DH are comparably
>incapable of solving the DoS problem.  So why bring up
>the issue?

It seems to me that because key-exchange methods such as DH only 
depend on exchanging bits (as opposed to specifying a physical 
layer), they can rely on a wide variety of techniques to combat DoS. 
If Bob and Alice can safeguard their local connections to the 
Internet, its multi-routing properties provide significant DoS 
protection. Other options available to them include the switched 
telephone network, wireless, LEO satellites, cybercafes, 
steganography,  HF radio, and even postal mail. In addition, DH users 
have no need to call attention to themselves by leasing a fiber-optic 
line.

Arnold Reinhold

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list