*BSD News Article 63439


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!bunyip.cc.uq.oz.au!munnari.OZ.AU!news.hawaii.edu!ames!usenet.kornet.nm.kr!news.kreonet.re.kr!usenet.seri.re.kr!news.cais.net!news.jsums.edu!gatech!swrinde!sgigate.sgi.com!sdd.hp.com!hamblin.math.byu.edu!park.uvsc.edu!usenet
From: Terry Lambert <terry@lambert.org>
Newsgroups: comp.os.linux.misc,comp.os.linux.development.system,comp.os.linux.networking,comp.unix.bsd.bsdi.misc,comp.unix.bsd.netbsd.misc,comp.unix.bsd.freebsd.misc
Subject: Re: need secure OS to entrust millions to
Date: 13 Mar 1996 01:53:31 GMT
Organization: Utah Valley State College, Orem, Utah
Lines: 76
Message-ID: <4i59qr$ggt@park.uvsc.edu>
References: <4gi6t6$3h9@lace.colorado.edu> <nc0453Dn96w6.93F@netcom.com> <4hhp71$cv9@senator-bedfellow.MIT.EDU> <4hsun4$d3h@park.uvsc.edu> <4i0blb$g2m@senator-bedfellow.MIT.EDU>
NNTP-Posting-Host: hecate.artisoft.com
Xref: euryale.cc.adfa.oz.au comp.os.linux.misc:91482 comp.os.linux.development.system:19252 comp.os.linux.networking:31505 comp.unix.bsd.bsdi.misc:2634 comp.unix.bsd.netbsd.misc:2448 comp.unix.bsd.freebsd.misc:15371

ghudson@mit.edu (Greg Hudson) wrote:
] : I refer you to Godel's Theorem.
] 
] You're confused.  If you think you're not confused, please explain
] the relevance of Godel's First (or Second) Incompleteness Theorem
] to this problem.  You may assume that I'm familiar with the theorem.

I was referring to the implicit assumption that a fast factoring
algorithm being "impossible" makes about human knowledge of
mathematics (it assumes it is complete, and that it doesn't
contain such an algorithm).

I thought it was amusing to note that using a "negative evidence"
argument to disprove a fast factoring algorithms possibility
contradicts the completeness theorem.

I was making a funny.  ;-).

] : Typical "security through obscurity" is hiding a key in a
] : search space, but not securing the location of the key itself.
] 
] If you honestly believe that that is the common definition, then
] I'd appreciate it if you'd provide a reference.  Certainly, it is
] not what the poster I responded to was referring to by "security
] "security through obscurity."

Again, I was trying to be funny.  I failed.  8-(.

It seems to me that a known key space doesn't fall into the
"security through secrecy" definition normally attributable
only to one time pads (IMO; cv: your speculation below).

I was using a common Aristotilian mean "EITHER x OR y" to
demonstrate the absurdity of predicting mathematical knowledge.

If I had to really class it, I'd probaly call it "security through
[potentially erroneous] assumption of computational difficulty".


] : You see, I believe the NSA already has fast-factoring
] : capability based on the questions Robert Morris Senior (formerly
] : of the NSA) posed at a recent security conference.
] 
] I'm happy that you know how to speculate.  I can speculate that the
] NSA has a way to break any cryptosystem you come up with except
] one-time pads.

I speculate you could be correct.

] : All that's required to crack RSA is massive parallelism and a
] : willingness to epend the effort, and that's assuming nothing
] : more than a brute-force attack.
] 
] If, as the key size increases, the effort required to break a
] cryptosystem expands sufficiently faster than the effort required
] to use the cryptosystem legitimately, then there will always be a
] key size which will defeat an arbitrarily amount of parallelism
] and time.  Back-of-the-envelope calculations suggest that a
] 1024-bit product of two primes would require absurd amounts of
] time to factor even if every particle in the known universe were
] a supercomputer.  Of course, if you speculate that the NSA has
] arbitrarily good factoring algorithms, you will never find a
] satisfactory key size.

That's right.  There's also the quantum computing approach to
parallelism (yes, based on unproven theories about the "many
worlds" hypothesis) that would really throw a wrench into any
encryption system based on "computationally difficulty".


					Regards,
                                        Terry Lambert
                                        terry@cs.weber.edu
---
Any opinions in this posting are my own and not those of my present
or previous employers.