logoalt Hacker News

knoke11/07/20241 replyview on HN

As far as In understand it (not very much) you can listen in on the transmitted keys, but the interaction can be statistically(!) measured and suspicious bits can me omitted (the wiki is quite comprehensible: https://en.wikipedia.org/wiki/Quantum_key_distribution?wprov...). There are different protocols, some more and some less quantum and most rely on classical, encrypted channels and trusted nodes in addition to the quantum channels.

One thing is for sure: you can’t send information faster than light with this or any other kind of quantum communication as two entangled qubits are basically two RNGs that are correlated. You’d just get noise without an additional classical, not FTL, data link (please, somebody with expertise: help!)


Replies

fi35811/07/2024

As far as I know, they still need classical encryption methods (with something like shared secret key or public key for authentication) to detect active man in the middle attacks where the attacker prevents the parties connecting to each other and then pretending to both parties to be the other party by creating his own "messages" as if they came from the other party. Or at least to have some kind of additional trusted physical medium where it is impossible to prevent the parties communicating directly, capturing their "messages" and then sending your own modified "messages" instead -- perhaps based on some kind of timing etc.

And if you still have to rely to classical encryption methods to make sure you know the identity of the other party (to prevent active man in the middle attack), why not just use classical encryption methods for everything else as well, instead of using quantum key distribution?

show 1 reply