Re: quantum computer factors number

2001-12-21 Thread Ben Laurie

Steve Bellovin wrote:
 
 A quantum computer has been built that has actually factored a number: 15.
 It's not a very interesting number from a cryptographic perspective,
 but it is real.  http://www.nature.com/nature/links/011220/011220-2.html

Its worth noting that not only is the number not very interesting (15),
but various properties of it have been used to make the quantum computer
simpler. The quantum computer would not be capable of performing any
other calculation. In particular, addition has been substituted for
multiplication in one part of the calculation, and the other
multiplication has been changed to a completely different operation (bit
swapping). Once simplified thus, several operations were omitted because
they were known to not actually influence the outcome or because enough
of their inputs were known to make them guaranteed to be null
operations.

These changes are described as optimisations - but since in any real
case they would involve performing most of the calculation on a
classical computer (AFAICS), its difficult to see how this experiment
demonstrates anything other than a remarkable ability to control and
measure the quantum state of 7 atoms in a molecule. Which is impressive
in itself, but it seems hardly fair to describe it is factorisation.

Probably the coolest thing about this experiment is that they have
produced what appears to be a very accurate model of the decoherence
effects, which should allow quantum computers to be modelled with some
certainty in the future.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Stegdetect 0.4 released and results from USENET search available

2001-12-21 Thread Niels Provos

I just released Stegdetect 0.4.  It contains the following changes:

 - Improved detection accuracy for JSteg and JPhide.
 - JPEG Header Analysis reduces false positives.
 - JPEG Header Analysis provides rudimentary detection of F5.
 - Stegbreak uses the file magic utility to improve dictionary
   attack against OutGuess 0.13b.

You can download the UNIX source code or windows binary from

  http://www.outguess.org/download.php

-
The results from analyzing one million images from the Internet Archive's
USENET archive are available at

  http://www.citi.umich.edu/u/provos/stego/usenet.php

[...]
  After scanning two million images from eBay without finding any
  hidden messages, we extended the scope of our analysis.

  This page provides details about the analysis of one million images
  from the Internet Archive's USENET archive.

  Processing the one million images with stegdetect results in about
  20,000 suspicious images. We launched a dictionary attack on the
  JSteg and JPHide positive images.  The dictionary has a size of
  1,800,000 words and phrases.  The disconcert cluster used to
  distribute the dictionary attack has a peak performance of roughly
  87 GFLOPS.

  However, we have not found a single hidden message.
[...]

Comments and feedback are welcome.  We have an FAQ at

  http://www.citi.umich.edu/u/provos/stego/faq.html

Regards and a merry Christmas,
  Niels Provos



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Stegdetect 0.4 released and results from USENET search available

2001-12-21 Thread John Gilmore

Niels  Peter, congratulations on finding no secret messages.  This is
why computers are getting faster -- so we can spend more and more time
searching out the lack of any information being communicated.

An obvious step is to extend your detector to handle other formats
besides JPEG.  That would involve more 'research' than merely running
it on other collections of images (e.g. JPEGs pulled from the Web in
the Internet Archive collection, or from your own crawler).

[Other people can also do the work of running your publicly released
software against other collections.  It would take more talent to
write something that processes other formats.]

By the way, I'm interested in what steganographic messages you are
finding in the plaintext tags in JPEG files.  I've heard that some
cameras mark each photo with the serial number of the camera, date,
etc.  You can probably also detect what model of camera produced the
image (based on exactly what tags it puts in the image, whether
there's a thumbnail, what the filename is, etc).  (Jpegdump provides
an easy way to see these tags.)  Remember how Microsoft Word documents
encode the Ethernet address of the PC on which they were created, and
how this has been used in several high-profile cases to track
documents to individuals?  I am a lot more concerned about popular
cameras that spy on their own users, than I am about the occasional
subliminal message sent through the Usenet.  It would be useful to
have a tool that removes all the nonessential tags from a jpeg file, a
'stegremover' to delete any spyware that your camera has left behind,
as well as a detector, and a hall of shame page for manufacturers
who are building that spyware.

John

PS: Cypherpunks, where *are* you putting your secret messages?  Give
us a hint!  Surely *somebody* in this crew must be leaving some
bread-crumbs around for Niels and NSA to find... :-)



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Stegdetect 0.4 released and results from USENET search available

2001-12-21 Thread P.J. Ponder


On Fri, 21 Dec 2001, John Gilmore wrote:

 . . . . 

 PS: Cypherpunks, where *are* you putting your secret messages?  Give
 us a hint!  Surely *somebody* in this crew must be leaving some
 bread-crumbs around for Niels and NSA to find... :-)

I always assumed newsgroups, like alt.images.binary.*, but perhaps
websites that allow users to upload pictures are the preferred channels.
Of course there is a big distiction between (intentionally) leaving
something around for Niels to find and really trying to hide something
--
pj




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]