David Schwartz wrote:
        2) Streams of entangled particles can generate shared
secrets where none
previously existed.

No, not really, since the scheme described on page 80 of the Jan 2005 Scientific American looks vulnerable to a man-in-the-middle attack.


        In that case, it generates two shared secrets. Either way, shared 
secrets
are generated where none previously existed.


I'm *fairly* sure that wrt shared secrets if "none previously existed"
then there is NO way to prevent a man-in-the-middle attack, as there is
no way to authenticate your correspondant, however, I am willing to
listen to arguments.


        In this case, it's not an attack. You have a secure channel to the MITM.
All that I said is that a shared secret is generated, not that you know who
you share that secret with. And, of course, either of the parties to a
secret can share it if they want.

        You might wonder what good a shared secret is if you have no idea who 
it's
with. The idea is that you authenticate the endpoint right after you
establish the shared secret, before you send any sensitive information. The
MITM cannot keep the shared secrets the same with both endpoints, so you
simply confirm equivalence at the endpoints as the next step.

How would you know you were verifying the shared secret with the desired endpoint and not again verifying it with the man in the middle? I believe this problem is unsolvable without advanced knowledge of the desired remote peer.
The advantage of quantum encryption is a guarantee that if and only if the initial connection can be guaranteed, then all future data can be guaranteed secure. Establishing (and re-establishing if the connection is broken) the authenticity of the remote peer initially can never be guaranteed, but practically speaking you can pre-distribute some piece of information to the peers in such a way that you're reasonably assured of its secrecy.



Andrew



        For an example not involving any quantum encryption, consider using
anonymous DH to establish a connection. Then, over the connection, each end
sends the shared secret encrypted with its public key. Each end then
validates the signatures and that the shared secrets match. In other words,
you do MITM detection as a separate step.

        The advantage over using ADH in this same application is the forward
security. You are protected against future compromises of the keys involved
and passive interception. This is a serious issue with public/private keys
because it is *always* possible to break such a key with sufficient
computational power in an automated, foolproof way.

        DS


______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to