On Fri, 22 Aug 2008, Robert J. Hansen wrote:
 . . .
There are no quantum encryption algorithms.  None.

What we have is quantum key exchange, where you use a handful of qubits
to negotiate a random session key in a way that an eavesdropped cannot
listen in on the transaction.  If you're willing to burn up a _lot_ of
 . . .

(Without taking any position on the legitimacy or not of
any particular part of the quantum encryption field)
Wouldn't the claim be:  "cannot listen in on such a
transaction between Alice and Bob without affecting the
transaction in a detectable way"?

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to