From: | Adam Getchell <acgetche@****.UCDAVIS.EDU> |
---|---|
Subject: | Quantum cryptography - Implications (Short!) |
Date: | Tue, 9 Aug 1994 14:15:24 -0700 |
you didn't), QC works like this:
First, you bit-bash together a key, which is a random sequence of
digits to be used in your Vernam cipher.
Next, you send your key via a fiber optic line, using Quantum
Cryptography.
Then, you compare errors, toss out incorrect measurements, and
from assumed eavesdroppers you distill a shorter key that is completely
secure.
Finally, you use this key in a Vernam cipher to send your message
out using public means.
The cipher is unbreakable, the channel is untappable (or at
least, the parts that were tapped weren't used), leaving the only angle
of attack in the key storage.
The EPR effect can be used as in QC to ensure that a stolen key
will be detected, but it's unwieldy and impractical. Hence, corporations
will probably rely on site security to maintain the key security, since
all other angles of attack are covered.
That means to only way to break someone's code and listen in on
their transmissions is to hire shadowrunners to do the key extraction.
Or use your own assets, but then the other side might figure out
you're gunning for their codes to use in those negotiations next week.
+-------------+---------------------------------------------------------------+
|Adam Getchell|acgetche@****.engr.ucdavis.edu | ez000270@*******.ucdavis.edu |
| acgetchell |"Invincibility is in oneself, vulnerability is in the opponent"|
+-------------+---------------------------------------------------------------+