Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

QKD will generate a session key, just like Diffie-Hellman or some of the post-quantum DH alternatives. If your threat model includes the risk that someone captures and stores ciphertext and subsequently gets access to a quantum computer and the ability to break whatever post-quantum scheme you’ve augmented with, then maybe QKD is useful. I agree that this is a bit of a stretch.

(Of course, one can also augment DH with symmetric crypto for the datacenter use case, with someone trustworthy literally carrying the key to the other end of the link, and I see no realistic usage of QKD that will outperform that unless one is worried about post-compromise recovery of a symmetric key stored in a piece of hardware. Plus, QKD has its own issues: security of QKD is subject to catastrophic failures if the single-photon source isn’t actually a single-photon source and possibly also if a malicious light source injected into the fiber causes the transmitter to stop being a single-photon source or the receiver to behave in a manner inconsistent with any possible single received photon. Think of these as side channel and fault attacks that are rather difficult to manage.)



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: