Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They state that it's impossible to secretly listen in (because that would involve tampering with the data), but then also state that the hub works by converting to classical bits and then retransmitting.

What prevents an attacker from inserting a device that converts to classical bits before retransmitting?



Exactly. The hub itself must be secure and trustworthy for an entirely 'secure' communication route, this won't work across any plain-jane network due to that weakness.


The hub is where the NSA grabs their copy of the key.


I believe the retransmitted quantum packet would be necessarily different from the original. So the receiving node notices that the packet has been modified, but because it expects the (secure) hub to modify the original, all is well.


But how can it tell the difference between the hub's modifications and an attacker's modifications?


it can't, that's why you need a trusted hub

clients can only tell that the message they received from the hub was actually from the hub and was not observed by anyone but the hub. there's no way to tell a message from client A to client B wasn't tampered with or observed before the hub delivered it


So if you're supposed to trust all hops on your message, quantum cryptography has no real appreciable improvement over standard digital communications (where the same problem exists).


Well, you don't have to worry about anyone hijacking a cable. Rather big improvement there. Although not without cost...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: