[8362] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Fwd: from Edupage, December 22, 2000

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Tue Jan 2 18:39:07 2001

From: "Steven M. Bellovin" <smb@research.att.com>
To: David Honig <honig@sprynet.com>
Cc: Udhay Shankar N <udhay@pobox.com>, cryptography@c2.net
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Tue, 02 Jan 2001 16:07:39 -0500
Message-Id: <20010102210740.5D05035DC2@smb.research.att.com>

In message <3.0.6.32.20010102120340.008722c0@pop.sprynet.com>, David Honig writ
es:
>At 10:27 PM 1/1/01 +0530, Udhay Shankar N wrote:
>>Did this slip between the cracks in holiday season or has it already been 
>>discussed here ?
>>
>>Udhay
>
>Its just yet another 'secure' scheme that uses quantum theory
>(here, discrete photons; elsewhere, entangled photons) 
>to detect or prevent leaking bits.  
>
>More elegant than gas-pressurized, pressure-monitored 'secure' cables, but
>the same idea. 

Right -- and for most situations, it solves the wrong problem.  Crypto 
is fun, but conventional crypto is likely good enough -- the real 
threats are at the end-points.

>


		--Steve Bellovin




home help back first fref pref prev next nref lref last post