I'm not an expert on this stuff, but I'm interested enough to chase
a few references...
Ivan Krstic [EMAIL PROTECTED] writes:
The idea that observing modifies state is something to be approached with
caution. Read-only does make sense in quantum world; implementations of
early theoretical

On Fri, 26 Sep 2003 09:10:05 -0400, Greg Troxel [EMAIL PROTECTED] wrote:
[snip]
The current canoncial
paper on how to calculate the number of bits that must be hashed away
due to detected eavesdropping and the inferred amount of undetected
eavesdropping is Defense frontier analysis of quantum

That's pretty much what I was talking about when I said that it may be
possible to clone an arbitrarily large proportion of photons - and that
Quantum Cryptography may not actually be secure.
A key point is the probability that the measurement/cloning operation
has of disturbing the

On 24 Sep 2003 08:34:57 -0400, Greg Troxel [EMAIL PROTECTED] wrote:
[snip]
In Quantum Cryptography, Eve is allowed to not only observe, but also
transmit (in the quantum world observing modifies state, so the notion
of read only doesn't make sense). Also, Eve is typically accorded
unlimited

At 08:34 AM 9/24/03 -0400, Greg Troxel wrote:
A consequence of the infinite CPU assumption is that ciphers like AES,
hash functions like SHA-1, etc. are all considered useless by the
purist QC community. Thus, people talk about doing authentication
with families of universal hash functions. This