Download ACS Seminar on Internet computing Internet Security Issues

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Renormalization group wikipedia , lookup

Renormalization wikipedia , lookup

Relativistic quantum mechanics wikipedia , lookup

Hardware random number generator wikipedia , lookup

Scalar field theory wikipedia , lookup

Computational chemistry wikipedia , lookup

Lateral computing wikipedia , lookup

Path integral formulation wikipedia , lookup

Quantum field theory wikipedia , lookup

Mathematical physics wikipedia , lookup

Uncertainty principle wikipedia , lookup

Quantum computing wikipedia , lookup

Quantum group wikipedia , lookup

Canonical quantization wikipedia , lookup

Quantum machine learning wikipedia , lookup

Natural computing wikipedia , lookup

Theoretical computer science wikipedia , lookup

Cryptanalysis wikipedia , lookup

Cryptography wikipedia , lookup

History of cryptography wikipedia , lookup

Quantum key distribution wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Transcript
QKD
• www.magiqtech.com
• Totally secure key distribution
• Faster key refresh rate (up to once per
second)
• Proactive, absolute intrusion detection
• Lower total cost of ownership
1
2
• http://cryptome.org/qc-grover.htm
3
• Quantum cryptography is a new technology that gives a
solution to the key distribution and key management
problems. The keys generated and disseminated using
quantum cryptography are proven to be absolutely random
and secure. The security of quantum cryptography is based
upon the laws of quantum mechanics, not upon the
assumed security of complex mathematical algorithms.
Thus, progress in computational power, advances in
hardware design, or the discovery of new mathematical
algorithms will not compromise the security provided by
systems using these technologies. Quantum cryptography
is also safe with respect to future advances in code
breaking and computing, including developments in the
new field of quantum computing, which will severely
reduce or possibly obliterate the security of classical
cryptographic solutions.
4
•
CRYPTO-GRAM May 15, 2000
•
•
•
•
•
•
•
•
•
•
•
•
•
•
There's some news on the quantum cryptography front. I was not going to
even bother mentioning this, but I have received enough press calls to
indicate that most people don't understand the ramifications. As a
scientist, I find this interesting. As a security professional, I know
it's irrelevant. Elsewhere I've described a reliance on cryptography as
putting a tall spike in the ground and hoping the enemy runs right into
it. The real problems are not crypto-related: they're implementation
errors, trust-model screw-ups, intentional misuse, misconfiguration,
etc. Quantum cryptography is an interesting development, but it's akin to
arguing whether the spike is one mile tall or 1.5 miles tall. (For anyone
who's wondering what quantum cryptography is, there's a lucid explanation
in the last chapter of Simon Singh's _The Code Book_.) Much more useful is
to start worrying about all the non-crypto-related vulnerabilities.
<http://www.aip.org/releases/2000/release03.html>
5