Cryptography-Digest Digest #167, Volume #9 Mon, 1 Mar 99 13:13:03 EST
Contents:
Re: Testing Algorithms (Patrick Juola)
Re: Testing Algorithms [moving off-topic] (Patrick Juola)
Re: Can the quantum computer determine the truth from a lie? (R. Knauer)
Re: compression?security (Somniac)
Re: Testing Algorithms [moving off-topic] (R. Knauer)
Re: My Book "The Unknowable" (Neil Nelson)
Re: True Randomness - DOES NOT EXIST!!! (John Briggs)
Common meaning misconception in IT, was Re: Unicity of English, was Re: New
high-security 56-bit DES: Less-DES ([EMAIL PROTECTED])
----------------------------------------------------------------------------
From: [EMAIL PROTECTED] (Patrick Juola)
Subject: Re: Testing Algorithms
Date: 1 Mar 1999 09:12:48 -0500
In article <[EMAIL PROTECTED]>, Somniac <[EMAIL PROTECTED]> wrote:
>Herman Rubin wrote:
>>
>> The problem is NOT to produce state changes with extremely low
>> energy; this is not difficult. It is to produce state changes
>> which will not reverse spontaneously or from transient noise.
>> A "permanent" magnet illustrates the situation; it has a large
>> hysteresis loop, which means that most of the energy in changing
>> its state goes off in heat, but this keeps it stable. Computer
>> memory, and also the state of more accessible units, is like this;
>> changeable, but not too easily so. The latter is what is needed
>> to keep it from being lost.
>> --
>Yes, true. And expand upon this wishful thinking about computing 2^256
>answers without heating up the Earth by 99 degrees, consider the Carnot
>Cycle using reversible adiabatic processes. No container has ever been
>built which provides reversible adiabatic processes. Insulators are not
>perfect, so some heat leaks out. Therefore, no one has ever built an
>ideal Carnot engine. In addition, the intake temperature of a heat engine
>must be lower than the exhast temperature.
Yes, but at this point, the question is no longer a physical problem,
but a technological one.
The point, as originally made, was that counting up to 2^256 was impossible
because there did not exist enough energy in the sun/galaxy/universe/whatever
to toggle that many bits DUE TO PHYSICAL LIMITS. This is, demonstrably,
not the case. "Insulators are not perfect,... therefore no one has ever
built an ideal Carnot engine." However, and let me stress this, I have
no reason to believe -- and every reason to disbelieve -- that current
insulator technology represents the acme above which science and
civilization will never rise.
>To make 2^256 calculations, there is not present device which can
>succeed. Future developments cannot relied upon to create perpetual
>motion computers that have reversible adders, nand gates, and memory. The
>past shows that most inventions failed to become practical.
... and I submit that this is exactly the sort of short-sighted thinking
(exactly along the lines of "we've hit the ultimate limit of the photo-
lithographic process") that results in failed predictions. You
claim that technology "cannot be relied upon" to produce these kinds of
devices -- but the conclusion that you wish to draw from that statement
is that it can be relied upon NOT to produce these devices.
Which I firmly believe is an untenable position.
-kitten
------------------------------
From: [EMAIL PROTECTED] (Patrick Juola)
Subject: Re: Testing Algorithms [moving off-topic]
Date: 1 Mar 1999 09:15:50 -0500
In article <[EMAIL PROTECTED]>,
Darren New <[EMAIL PROTECTED]> wrote:
>> > > > Think of it this way -- what's the minimum amount of energy necessary
>> > > > to move a brick five feet (horizontally)?
>> >
>> > One photon?
>>
>> A photon of what energy? Are we talking gamma rays or radio waves?
>
>My point is that if your key is 2^300 long, there are fewer than 2^300
>photons in the universe, regardless of the energy involved.
Yes, but if you get your photon back at the end of the process, you
can use it over and over again.
-kitten
------------------------------
From: [EMAIL PROTECTED] (R. Knauer)
Crossposted-To: alt.privacy,talk.politics.crypto
Subject: Re: Can the quantum computer determine the truth from a lie?
Date: Mon, 01 Mar 1999 13:49:36 GMT
Reply-To: [EMAIL PROTECTED]
On Mon, 1 Mar 1999 10:32:44 +0000 (GMT), [EMAIL PROTECTED]
(Paul Kinsler) wrote:
>There is nothing "spooky" or questionable about the theoretical basis
>of quantum computing.
There is when you start talking about a QC that uses quantum
entanglement, like in teleporation, quantum compression and superdense
codes.
Those "ebits" (entanglement bits) are very spooky indeed.
Bob Knauer
"If you want to build a robust universe, one that will never go wrong, then
you don't want to build it like a clock, for the smallest bit of grit will
cause it to go awry. However, if things at the base are utterly random, nothing
can make them more disordered. Complete randomness at the heart of things is the
most stable situation imaginable - a divinely clever way to build a universe."
-- Heinz Pagels
------------------------------
From: Somniac <[EMAIL PROTECTED]>
Subject: Re: compression?security
Date: Mon, 01 Mar 1999 08:12:02 -1000
alex wrote:
>
> Hi,
> Can any experts tell me that what is the relationship between dat
> compression and data security? I am new in security and so where can I
> pick up some basic materia?
> Thanks
Compression does not provide enough security to be safe from educated
cryptanalysts. But it can provide a small amount of security if you know
that your adversary is only one uneducated person. For example, maybe you
do not want your father to read you messages on a home computer that both
of you share. Then if you compress the messages, store the decompression
program on a floppy disk that you hide in your school locker, then it may
be safe. You may know that your father does not know about compression
software, and so, you can feel secure that your known adversary does not
have the technical knowledge to crack the code.
------------------------------
From: [EMAIL PROTECTED] (R. Knauer)
Subject: Re: Testing Algorithms [moving off-topic]
Date: Mon, 01 Mar 1999 16:21:04 GMT
Reply-To: [EMAIL PROTECTED]
On 1 Mar 1999 08:55:09 -0500, [EMAIL PROTECTED] (Patrick Juola)
wrote:
>Good answer. Now, the *next* question -- what's the minimum energy
>of a photon?
The zero point energy, namely 1/2 h_bar omega.
Bob Knauer
"There is much to be said in favour of modern journalism. By giving us the opinions
of the uneducated, it keeps us in touch with the ignorance of the community."
--Oscar Wilde
------------------------------
From: Neil Nelson <[EMAIL PROTECTED]>
Crossposted-To: sci.math,sci.physics,sci.logic
Subject: Re: My Book "The Unknowable"
Date: Mon, 01 Mar 1999 16:26:44 GMT
In article <[EMAIL PROTECTED]>,
Neil Nelson wrote:
> On _true_ randomness, mathematically, randomness is only with
> respect to some non-random viewpoint; it says something _appears_
> random as against saying something _is_ random. _True_ or pure
> randomness does not have an identifying procedure because there
> would be no non-random vantage point from which to make sense of
> anything at all including any randomness. _True_ randomness is an
> incoherent, self contradictory notion by definition. Those two
> words can be combined but no definite sense can be made of them.
Bob Knauer wrote:
[ If you try to describe randomness as that which cannot be described,
[ you run afoul of the Berry Paradox. Take your statement above:
[ " _True_ randomness is an incoherent, self contradictory notion by
[ definition."
[ Notice that you have described True Randomness in a paradoxical
[ manner, by the very fact that you described it.
That's right. _True Randomness_ is a self contradictory (paradoxical)
notion.
[[ For example the sequence 101010...10 is not prefix complexity
[[ random, although it is a true random number by virtue of its
[[ generation by a TRNG.
> it needs to be asked in what manner this sequence is used with
> respect to cryptography. It would clearly not be wise to use such a
> string of sufficient length as a bit overlay since the prefix
> complexity is small and that sequence could be easily attacked.
[ Not if it were used in a properly implemented OTP cryptosystem, one
[ that is provably secure.
[ It is one of the strings of the same length as the message, so the
[ attacker cannot decide if the message he detects is the intended
[ message, under the hypothesis that that is the correct key. He
[ needs more information to go on than just the regularity of that
[ keystring.
[ For example, what if there are two intelligible messages:
[ A = "ATTACK AT DAWN"
[ B = "ATTACK AT DUSK"
[ and I XOR them together to get a key K:
[ K = A XOR B.
[ Now I send "cipher" A openly and send the key K by a secure channel.
[ You intercept the cipher A, but not the key.
[ Which message is the intended message? My correspondent will know
[ unambiguously because he has the key.
I am having trouble with this sequence. There is: (1) the message to
be secured, (2) the key sent by a secure channel, and (3) the
encrypted message sent openly. If I needed to run an XOR each time to
get my key that would be the length of my intended message and could
send the key securely, I should just send my message securely and
forget encryption.
Traditionally the sequence would be: A is the message to be encrypted,
B is the key, XOR A and B and send K in the open and B secure. The
correspondent reverses the XOR with B to get A. But as I mentioned
previously if the key (a part of the cryptosystem) is at least as
complex as the message then the message cannot likely not be
decrypted.
[ To make this point even clearer let's say my two messages are
[ identical:
[ A = "ATTACK AT DAWN"
[ B = "ATTACK AT DAWN"
[ Now the key K is:
[ K = A XOR B = 000...0
[ But you don't know that, so you still do not know what my intended
[ message is, not with the scant amount of information I have allowed
[ you to have.
[ Since K can be any sequence, even 000...0, and they are
[ equiprobable, you have nothing to cause you to decide that either A
[ or B is my intended message.
Clearly, if you can send a key the length of the encrypted message
after the message has been encrypted, then the encrypted message is
technically redundant as you have shown. But traditionally, the key
is relatively small with respect to the entire message set used for
that key and the key is sent before any particular messages to be
encrypted are known, making the previous sequence incompatible with
common circumstances.
> Apparently non-random sequences appear randomly in relatively
> complex (relatively random) sequences,
[ How do you know that those sequences are non-random? By your own
[ "definition", you cannot tell if something is random, so you can't
[ tell if it is non-random either.
Non-random is defined as a string that can be completely defined via a
smaller string (prefix code) within a given string generating system
(language). E.g., I could write a sequence of 1000 0's here, which I
will not do as it would interrupt the reader's comprehension, or I
could just say, ``consider a sequence of 1000 0's", which is a much
shorter expression meaning the same thing. One expression is very
long with respect to the other yet they both mean the same thing. The
long expression (the actual 1000 0's) is non-random relative to the
English expression. The English expression is non-random relative to
the language (English) I am using, though it is essentially random
with respect to any other string that will give the same meaning as it
is not expected any shorter expression in English will give the same
meaning.
So initially, there are strings, then a language on strings, and then
a compression of strings using language. The language is defined to
be non-random, incompressible strings are random with respect to the
language, and compressible strings non-random with respect to the
language. Note this is not _true_ randomness but _apparent_
randomness with respect to a language.
[ If you could state that something is non-random because of some
[ necessary and sufficient property, then you could state that
[ something is random because it lacks that necessary and sufficient
[ property. Yet you have stated that randomness is not
[ characterizeable, at least not formally. That Ol' Berry Paradox
[ sure is a bummer, eh.
Randomness (apparent randomness) with respect to a non-random
perspective (a language) is definable, but randomness without a
perspective (true randomness) is not definable except in the self
contradictory manner noted above.
[ Those "non-random" sequences must appear out of necessity. Random
[ numbers must be normal in the Borel sense. Therefore every bit
[ group must be present, even ones that flunk simplistic statistical
[ tests for bias.
[ That means every finite sequence of numbers, even those with highest
[ regularity, like 000...0, must be present in a true random number,
[ even those sequences where the run length of one particular bit is
[ nearly infinite.
First we must define what it is to have a random number, which was
just indicated to be according to a non-random perspective (a
language). If, according to the previous discussion, random means a
string sequence not compressible in the language then a sufficiently
long run of 0's would be compressible and hence that string not random
wherever it might appear.
I welcome the result of Berry's Paradox from the notion of `True
Randomness' and am interested in your definition of `True Randomness'
that avoids a paradox.
Neil Nelson
------------------------------
From: [EMAIL PROTECTED] (John Briggs)
Subject: Re: True Randomness - DOES NOT EXIST!!!
Date: 1 Mar 99 11:39:09 -0400
In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED] (R. Knauer)
writes:
> On 26 Feb 99 09:47:25 -0400, [EMAIL PROTECTED] (John Briggs)
> wrote:
>
>>> Oh really? Nothing existed before the Universe, eh.
>
>>Really. Even the phrase "before the Universe" is devoid of meaning.
>
> "Before" in terms of cause and effect, not time per se.
>
> IOW, "before" as "antecedent".
Still devoid of meaning. If it's outside the Universe, it can't affect
something inside the Universe. That's basic to pretty much any definition
of "the Universe".
>>It sounds like you are going for the Francis of Assisi line of bogus
>>logic:
>
>> "For every effect there must be a prior cause"
>
> I did not know that he was the person who enunciated that. I always
> thought it was the Greek philosophers, most notably Aristotle.
>
> And what gives you this pontifical authority to declare that the law
> of cause and effect is "bogus"?
I didn't call the law bogus. I called the line of logic bogus. And it is.
I need no authority to state that opinion. Much less any "pontifical"
authority.
>>Which can then be used to fallaciously derive the existence of a
>>single root causeless cause of everything else -- the prime mover.
>>The Deity. The One.
>
> What gives you this pontifical authority to declare that that
> derivation is "fallacious"?
Fallacy one: Why just one first cause? Why not two? Or three?
Fallacy two: Why not a causal loop?
Fallacy three: Why not infinite regress?
Fallacy four: What causes the first cause?
Looks like a fallacious argument to me.
>>The universe can proceed perfectly well without this "law".
>
> Oh really - the very Universe we observe, eh?
Yes, the very Universe we observe. We see plenty of effects without
any visible cause.
> Well tell us, just how does the Universe contain order if there is no
> cause-effect law in operation? What effective principle is responsible
> for the order that we do observe, if it is not the law of cause and
> effect?
I didn't say that there is no such thing as cause and effect. I said
that the law of cause and effect _WHICH I EXPLICITLY STATED AND WHICH
YOU HAD LEFT COMPLETELY UNSPECIFIED_ was not needed by the Universe.
To re-iterate, that statement was:
>> "For every effect there must be a prior cause"
Now, if you want to loosen up the definition of "cause and effect" to
the point where radioactive decay and quantum fluctuations in the vacuum
have causes then you can make a credible argument in favor of this law.
But then you are left with the question: What causes a TRNG based on
radioactive decay to emit the sequence it does?
John Briggs [EMAIL PROTECTED]
------------------------------
From: [EMAIL PROTECTED]
Subject: Common meaning misconception in IT, was Re: Unicity of English, was Re: New
high-security 56-bit DES: Less-DES
Date: Mon, 01 Mar 1999 17:54:17 GMT
In article <[EMAIL PROTECTED]>,
"Douglas A. Gwyn" <[EMAIL PROTECTED]> wrote:
> [EMAIL PROTECTED] wrote:
> > Please see my previous reply a few minutes ago, where I analyze the two
> > messages and show that the first message is much more probable. The fact
that
> > both appear to be in English was puzzling but it is actually neutral since
> > the first is much more English-like. In fact, standard formalism applied to
> > those two messages leads to only one answer, by what seems to be a large
> > safety margin.
>
> You missed the whole point of that exercise.
This is a common misconception in Information Theory analysis: information
versus meaning. Information in Shannon's sense has nothing to do with
meaning. Information is simply that which is transferred from source to
destination. If, before transmission, the information is already present at
the destination, then the transfer is zero. Information is thus that which I
do not expect. It has nothing to do with knowledge or even if it is
meaningful or not.
My point is thus technically correct for Information Theory analysis: given
two messages, choose the one that has the best-possible approximation to
English statistics. This is done by syntax analysis at the lowest level
possible: letter frequency with unigram, digram, trigram, etc,
You are confusing meaning with syntax. Letter-frequency analysis has nothing
to do with meaning. Shannon's theory specifically excludes meaning.
If anyone wants to "read" something else in that example, then that is not
granted by the theory that was invoked behind the example: Shannon's. The
example calls upon unicity in order to define it and uncity is defined by
language statistics not by a savvy human reader.
> Neither message stands a chance of arising in normal English
> conversation;
Reading some mail lists, I beg to disagree ;-)
But, that is besides the point. Again, the example invokes unicity and
Shannon's analysis -- which specifically excludes meaning, and just focuses
on language statistics.
>.they were specifically engineered as the solution
> to a puzzle (find two very long near-English texts that are
> isomorphic under simple substitution).
> In fact, the "right" answer was determined arbitrarily by the
> author of that little essay; it cannot be determined by any
> logical analysis (since the messages are illogical to start with).
>
If a message is "logical" or not this is of no concern to a decryption based
on letter frequency analysis -- since what is not "logical" to you may be to
the intended recipient. The ONLY point that mattters in a letter frequency
attack is letter frequency, of course.
Yes, you can also then later on try to interpret the message -- but that is
outside the scope of a letter-frequency attack based on knwon language
statistical structure and may even revise it, but only afterwards -- not
before ;-)
Cheers,
Ed Gerck
============= Posted via Deja News, The Discussion Network ============
http://www.dejanews.com/ Search, Read, Discuss, or Start Your Own
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************