[14293] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Can Eve repeat?

daemon@ATHENA.MIT.EDU (Greg Troxel)
Fri Sep 26 16:36:41 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Greg Troxel <gdt@ir.bbn.com>
To: Peter Fairbrother <zenadsl6186@zen.co.uk>
Cc: Ivan Krstic <ccikrs1@cranbrook.edu>,
	Greg Troxel <gdt@ir.bbn.com>, iang@systemics.com,
	cryptography@metzdowd.com
In-Reply-To: Message from Peter Fairbrother <zenadsl6186@zen.co.uk> 
   of "Fri, 26 Sep 2003 11:58:43 BST." <BB99DA72.3AD33%zenadsl6186@zen.co.uk> 
Date: Fri, 26 Sep 2003 09:10:05 -0400

  That's pretty much what I was talking about when I said that it may be
  possible to clone an arbitrarily large proportion of photons - and that
  Quantum Cryptography may not actually be secure.

A key point is the probability that the measurement/cloning operation
has of disturbing the original state.  Errors at the receiver are
assumed to be the result of eavesdropping.  The current canoncial
paper on how to calculate the number of bits that must be hashed away
due to detected eavesdropping and the inferred amount of undetected
eavesdropping is "Defense frontier analysis of quantum cryptographic
systems" by Slutsky et al:

  http://topaz.ucsd.edu/papers/defense.pdf

(I don't want to take a position on whether cloning is or isn't
possible - that's way out of my area of expertise!)

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post