Quantum Cryptography
Paul Hoffman
paul.hoffman at vpnc.org
Fri Jun 22 13:47:23 EDT 2007
At 10:44 AM -0700 6/22/07, Ali, Saqib wrote:
>>...whereas the key distribution systems we have aren't affected by
>>eavesdropping unless the attacker has the ability to perform 2^128 or
>>more operations, which he doesn't.
>
>Paul: Here you are assuming that key exchange has already taken place.
No, I'm not. I am talking about protocols that do their own key
exchange. IPsec. SSL/TLS. Kerberos. Etc.
>But key exchange is the toughest part.
No, requiring that the two ends have a fixed connection which QKD
works over is far tougher than using a proven protocol that works
over any connection.
--Paul Hoffman, Director
--VPN Consortium
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list