Quantum Cryptography

Paul Hoffman paul.hoffman at vpnc.org
Fri Jun 22 13:47:23 EDT 2007


At 10:44 AM -0700 6/22/07, Ali, Saqib wrote:
>>...whereas the key distribution systems we have aren't affected by
>>eavesdropping unless the attacker has the ability to perform 2^128 or
>>more operations, which he doesn't.
>
>Paul: Here you are assuming that key exchange has already taken place.

No, I'm not. I am talking about protocols that do their own key 
exchange. IPsec. SSL/TLS. Kerberos. Etc.

>But key exchange is the toughest part.

No, requiring that the two ends have a fixed connection which QKD 
works over is far tougher than using a proven protocol that works 
over any connection.

--Paul Hoffman, Director
--VPN Consortium

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list