cluster of computer

DanNeely
DanNeely
Joined: 4 Sep 05
Posts: 1364
Credit: 3562358667
RAC: 0

RE: * You share a file of

Message 58571 in response to message 58567

Quote:

* You share a file of numbers, the bigger the better, and the more 'random' the better. These were distributed securely to each computer, by 'hand' so to speak.

If you can aford $50k per location and dark fiber links between them you can use commercially available quantum crypto hardware to securely exchange keys. Current bandwidth's too low to allow exchanging OTP's for very large datasets though, so instead what is done is that the QC channel is used to exchange an OTP large enough to encrypt a key for annother algo that's long enough to require a few million+ years to crack at current tech levels. That key is then used to encrypt a chunk of normally transmitted data while a new OTP is being sent to encrypt the next key with. Hardware to transmit the quantum data over free space exists but isn't available commercially yet.

Mike Hewson
Mike Hewson
Moderator
Joined: 1 Dec 05
Posts: 6588
Credit: 312432687
RAC: 161021

RE: If you can aford $50k

Message 58572 in response to message 58571

Quote:
If you can aford $50k per location and dark fiber links between them you can use commercially available quantum crypto hardware to securely exchange keys. Current bandwidth's too low to allow exchanging OTP's for very large datasets though, so instead what is done is that the QC channel is used to exchange an OTP large enough to encrypt a key for annother algo that's long enough to require a few million+ years to crack at current tech levels. That key is then used to encrypt a chunk of normally transmitted data while a new OTP is being sent to encrypt the next key with. Hardware to transmit the quantum data over free space exists but isn't available commercially yet.


It's a fascinating area, isn't it?.
OTP will practicably protect a password, but not large data/messages. You need a 1:1 ratio of key to data to confidently protect with OTP. Historically OTP's were/are used for quick/simple stuff like 'attack at dawn' where a context and consequences were pre-set. The actual battle plans went low and slow but. So what's the point of having PW if the data is seen? Again it depends on context. All my OTP below does is confidently confirm that A and B have the same 'key' file. So yes, you then OTP an algo key to blossom the ratio from that. Sigh ..... you just have to make it more expensive ( money, time etc ) to break it open, than the package is worth 'native'.

Cheers, Mike.

I have made this letter longer than usual because I lack the time to make it shorter ...

... and my other CPU is a Ryzen 5950X :-) Blaise Pascal

Alinator
Alinator
Joined: 8 May 05
Posts: 927
Credit: 9352143
RAC: 0

Pilot error

Pilot error

Alinator
Alinator
Joined: 8 May 05
Posts: 927
Credit: 9352143
RAC: 0

LOL..... Oh yeah crypto is

Message 58574 in response to message 58573

LOL..... Oh yeah crypto is waaay kewl! :-)

The only problem is you can make yourself crazy when you start trying to wrap your mind around all the possibilities and permutations you can come up with. ;-)

Alinator

Also IIRC, SSL does use an OTP. That's the symmetric cipher you negotiate in the opening exchange when you first start to setup the secure connection.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.