[14293] in cryptography@c2.net mail archive
Re: Can Eve repeat?
daemon@ATHENA.MIT.EDU (Greg Troxel)
Fri Sep 26 16:36:41 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Greg Troxel <gdt@ir.bbn.com>
To: Peter Fairbrother <zenadsl6186@zen.co.uk>
Cc: Ivan Krstic <ccikrs1@cranbrook.edu>,
Greg Troxel <gdt@ir.bbn.com>, iang@systemics.com,
cryptography@metzdowd.com
In-Reply-To: Message from Peter Fairbrother <zenadsl6186@zen.co.uk>
of "Fri, 26 Sep 2003 11:58:43 BST." <BB99DA72.3AD33%zenadsl6186@zen.co.uk>
Date: Fri, 26 Sep 2003 09:10:05 -0400
That's pretty much what I was talking about when I said that it may be
possible to clone an arbitrarily large proportion of photons - and that
Quantum Cryptography may not actually be secure.
A key point is the probability that the measurement/cloning operation
has of disturbing the original state. Errors at the receiver are
assumed to be the result of eavesdropping. The current canoncial
paper on how to calculate the number of bits that must be hashed away
due to detected eavesdropping and the inferred amount of undetected
eavesdropping is "Defense frontier analysis of quantum cryptographic
systems" by Slutsky et al:
http://topaz.ucsd.edu/papers/defense.pdf
(I don't want to take a position on whether cloning is or isn't
possible - that's way out of my area of expertise!)
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com