Quantum Cryptography

Ali, Saqib docbook.xml at gmail.com
Fri Jun 22 13:44:41 EDT 2007

> ...whereas the key distribution systems we have aren't affected by
> eavesdropping unless the attacker has the ability to perform 2^128 or
> more operations, which he doesn't.

Paul: Here you are assuming that key exchange has already taken place.
But key exchange is the toughest part. That is where Quantum Key
Distribution QKD comes in the picture. Once the keys are exchanged
using QKD, you have to rely on conventional cryptography to do bulk
encryption using symmetric crypto.

Using Quantum Crypto to do bulk encryption doesn't make any sense. It
is only useful in key distribution.


The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com

More information about the cryptography mailing list