[8362] in cryptography@c2.net mail archive
Re: Fwd: from Edupage, December 22, 2000
daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Tue Jan 2 18:39:07 2001
From: "Steven M. Bellovin" <smb@research.att.com>
To: David Honig <honig@sprynet.com>
Cc: Udhay Shankar N <udhay@pobox.com>, cryptography@c2.net
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Tue, 02 Jan 2001 16:07:39 -0500
Message-Id: <20010102210740.5D05035DC2@smb.research.att.com>
In message <3.0.6.32.20010102120340.008722c0@pop.sprynet.com>, David Honig writ
es:
>At 10:27 PM 1/1/01 +0530, Udhay Shankar N wrote:
>>Did this slip between the cracks in holiday season or has it already been
>>discussed here ?
>>
>>Udhay
>
>Its just yet another 'secure' scheme that uses quantum theory
>(here, discrete photons; elsewhere, entangled photons)
>to detect or prevent leaking bits.
>
>More elegant than gas-pressurized, pressure-monitored 'secure' cables, but
>the same idea.
Right -- and for most situations, it solves the wrong problem. Crypto
is fun, but conventional crypto is likely good enough -- the real
threats are at the end-points.
>
--Steve Bellovin