SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Gold/Mining/Energy : Gold and Silver Juniors, Mid-tiers and Producers

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: koan who wrote (17832)8/9/2006 2:03:05 AM
From: E. Charters  Read Replies (1) of 78413
 
"Side channel" is mil speak for other ways of cracking or intercepting other than working from the raw coded message. As in mistakes, overheard talk, in-the-clear parts of the message.. which I will leave to you to surmise the circumstance of, torture, phony weak codes leaked to the public or back doored codes leaked to the enemy ... leaking IF, traffic analysis, etc....

You are correct in assuming that to work on the quantum signal at all would change its character rendering the encoding signal useless. This would cause a problem with the sent message and render it impossible to decode. So unless repeaters were symmetric on both sides of the sent code-decode signal( QE is symmetric as far as the encoding goes), the coding would fail. Don't ask me if symmetric repeaters are possible.

It may be possible to change the message such that only you know how it is changed, if you intercept the encoding signal the sender -and- the message itself too. The sender and receiver both get identical random keys. Would the sender know if it were changed? Hard to tell, as there is no real way of detecting change except to know that decoding failed. rsvp's are necessary here. The encoding method may not see the problem.

Such is the way blocking or spoofing of code is done to fool pgp or asymmetric coding, which can be decoded by a sophisticated interceptor. It is very theoretical but there may be ways it can or is being done in the wild.

EC<:-}
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext