On Fri, 22 Aug 2008, Robert J. Hansen wrote:
. . .
There are no quantum encryption algorithms. None.
What we have is quantum key exchange, where you use a handful of qubits
to negotiate a random session key in a way that an eavesdropped cannot
listen in on the transaction. If you're willing to burn up a _lot_ of
. . .
(Without taking any position on the legitimacy or not of
any particular part of the quantum encryption field)
Wouldn't the claim be: "cannot listen in on such a
transaction between Alice and Bob without affecting the
transaction in a detectable way"?
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users