Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:sigh, the "quantum" buzzword (Score 1) 69

1. If all communication channels are created by an attacker and there is neither pre-shared randomness nor a trusted third party, you cannot guarantee that you're talking to anyone in particular as you have no way of cryptographically verifying their identity. I believe this is unavoidable, quantum crypto or no. 2. However you please. Email, telephone call, in person, etc. Authentication happens during the communication; if the notice of which channel to use were modified, the authentication will fail. 3. I believe the typical approach here is to use a classical authentication scheme (using pre-shared randomness, or some certification system, etc.). All that is needed is to establish the identity of the other entity; encryption is handled using QKD. (Disclaimer: I am not a cryptographer.)

Slashdot Top Deals

The shortest distance between two points is under construction. -- Noelie Alito

Working...