* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download ACS Seminar on Internet computing Internet Security Issues
Renormalization group wikipedia , lookup
Renormalization wikipedia , lookup
Relativistic quantum mechanics wikipedia , lookup
Hardware random number generator wikipedia , lookup
Scalar field theory wikipedia , lookup
Computational chemistry wikipedia , lookup
Lateral computing wikipedia , lookup
Path integral formulation wikipedia , lookup
Quantum field theory wikipedia , lookup
Mathematical physics wikipedia , lookup
Uncertainty principle wikipedia , lookup
Quantum computing wikipedia , lookup
Quantum group wikipedia , lookup
Canonical quantization wikipedia , lookup
Quantum machine learning wikipedia , lookup
Natural computing wikipedia , lookup
Theoretical computer science wikipedia , lookup
Cryptanalysis wikipedia , lookup
Cryptography wikipedia , lookup
History of cryptography wikipedia , lookup
QKD • www.magiqtech.com • Totally secure key distribution • Faster key refresh rate (up to once per second) • Proactive, absolute intrusion detection • Lower total cost of ownership 1 2 • http://cryptome.org/qc-grover.htm 3 • Quantum cryptography is a new technology that gives a solution to the key distribution and key management problems. The keys generated and disseminated using quantum cryptography are proven to be absolutely random and secure. The security of quantum cryptography is based upon the laws of quantum mechanics, not upon the assumed security of complex mathematical algorithms. Thus, progress in computational power, advances in hardware design, or the discovery of new mathematical algorithms will not compromise the security provided by systems using these technologies. Quantum cryptography is also safe with respect to future advances in code breaking and computing, including developments in the new field of quantum computing, which will severely reduce or possibly obliterate the security of classical cryptographic solutions. 4 • CRYPTO-GRAM May 15, 2000 • • • • • • • • • • • • • • There's some news on the quantum cryptography front. I was not going to even bother mentioning this, but I have received enough press calls to indicate that most people don't understand the ramifications. As a scientist, I find this interesting. As a security professional, I know it's irrelevant. Elsewhere I've described a reliance on cryptography as putting a tall spike in the ground and hoping the enemy runs right into it. The real problems are not crypto-related: they're implementation errors, trust-model screw-ups, intentional misuse, misconfiguration, etc. Quantum cryptography is an interesting development, but it's akin to arguing whether the spike is one mile tall or 1.5 miles tall. (For anyone who's wondering what quantum cryptography is, there's a lucid explanation in the last chapter of Simon Singh's _The Code Book_.) Much more useful is to start worrying about all the non-crypto-related vulnerabilities. <http://www.aip.org/releases/2000/release03.html> 5