[19675] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: quantum chip built

daemon@ATHENA.MIT.EDU (Whyte, William)
Thu Jan 19 13:02:56 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 19 Jan 2006 12:49:26 -0500
From: "Whyte, William" <WWhyte@ntru.com>
To: "Travis H." <solinym@gmail.com>, <leichter_jerrold@emc.com>
Cc: <mjec@mjec.net>, <jsd@av8n.com>, <alex@alten.org>,
	<cryptography@metzdowd.com>

> 1) Are there quantum encryption algorithms that we will use on quantum
> computers to prevent quantum cryptanalysis?  Not just key
> distribution; ID Quantique is commercially selling units for that
> already.

There are existing quantum encryption algorithms that require a
physical link between the communicators (and don't provide
authentication) -- these are used in the products sold by ID=20
Quantique. But it hasn't been established that an encryption
algorithm needs to be based on quantum mechanisms to survive
the introduction of quantum computers. So I'd take issue with
your phrasing of the question.

In so far as you're wondering about what algorithms will be
used in the post-quantum computing world, the ECRYPT project=20
has organized a workshop on postquantum cryptography -- see=20
http://postquantum.cr.yp.to/ for details. The report of that
workshop should be interesting reading.

Chers,

William



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post