[cryptography] NSA IDA Cryptological Research Centers

2013-09-29 Thread John Young

The Institute for Defense Analyses, based in Alexandria, VA,
is a 50-year partner of NSA. It has two Centers for Communications
Research at Princeton, NJ, and La Jolla, CA, both doing cryptological
research for NSA:

http://www.idaccr.org/

http://www.ccrwest.org/

The latter's web site lists only this offering:

[Quote]


La Jolla Covering Repository

A (v,k,t)-covering design is a collection of k-element subsets, 
called blocks, of {1,2,...,v}, such that any t-element subset is 
contained in at least one block.  This site contains a collection of 
good (v,k,t)-coverings. Each of these coverings gives an upper bound 
for the corresponding C(v,k,t), the smallest possible number of 
blocks in such a covering design.


The limit for coverings is v100, k=25, and t=8 just to draw the 
line somewhere. Only coverings with at most 10 blocks are given, 
except for some which were grandfathered in. Some Steiner systems 
(coverings in which every t-set is covered exactly once) which are 
too big for the database will be included in the link below.


[Unquote]

What is covering and how does it related to cryptology?

-

Eyeballs of the two centers:

http://cryptome.org/2013-info/09/nsa-ccr/nsa-ccr.htm ___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] NSA IDA Cryptological Research Centers

2013-09-29 Thread James Cloos
 JY == John Young j...@pipeline.com writes:

LJ La Jolla Covering Repository

LJ A (v,k,t)-covering design is a collection of k-element subsets, called
LJ blocks, of {1,2,...,v}, such that any t-element subset is contained in
LJ at least one block.

JY What is covering and how does it related to cryptology?

That quote pretty much answers the question.  Perhaps an example would help:

Let's choose v=52, like a deck of playing cards (we'll leave the Jokers
inside the beltway).  Let's use 23-card blocks (k=23) and 5-card hands (t=5).

The goal to to find a set of 23-card blocks such that every possible
5-card hand can be found in at least one block.  Hense, the set of 23-
card blocks covers the set of possible 5-card hands.

That can be done trivially by making the blocks be every possible
23-card hand.  But ( 52 \choose 23 ) is about 352 trillion.  So we
want to find a smaller set of blocks which cover every possible 5-
card hand.

Their site has one covering for (53,23,5) with 243 blocks.  It also
shows that they started with a 272-block covering and worked their
way down to 243 blocks via dynamic programming.

THe application the cryptography is probably something to do with
statistical cryptanalysis.  Rainbow tables, maybe?

-JimC
-- 
James Cloos cl...@jhcloos.com OpenPGP: 1024D/ED7DAEA6
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography


Re: [cryptography] NSA IDA Cryptological Research Centers

2013-09-29 Thread Andy Isaacson
On Sun, Sep 29, 2013 at 09:43:54AM -0400, John Young wrote:
 http://www.ccrwest.org/
 
 The latter's web site lists only this offering:
 
 La Jolla Covering Repository
 
 A (v,k,t)-covering design is a collection of k-element subsets,
 called blocks, of {1,2,...,v}, such that any t-element subset is
 contained in at least one block.  This site contains a collection of
 good (v,k,t)-coverings. Each of these coverings gives an upper bound
 for the corresponding C(v,k,t), the smallest possible number of
 blocks in such a covering design.
[snip]
 What is covering and how does it related to cryptology?

As is common in math, they define what they mean in the first paragraph.
To paraphrase, they're considering ways to arrange a large number of
sets of things so that a minimum number of blocks is used to enclose
all of the sets.

I'm not a mathematician but that looks like set theory to me.  It's the
kind of fundamental mathematical research that frequently arises when
considering some more applied problem space.  Such fundamental
approaches frequently have applications in wide-ranging fields; to
compare to a more well-documented example, the 4-color problem first
solved in the 70s generated techniques which ended up being critical to
optimizing C compiler designs for RISC processors in the 90s.

http://en.wikipedia.org/wiki/Four_color_theorem
http://en.wikipedia.org/wiki/Register_allocation#Isomorphism_to_graph_colorability

I doubt that much can be concluded about the activities at the research
site based on their publishing one database in such a rarefied field.

-andy
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography