There is some space. But this is not the usual PK situation where 256-bit
secret key is stuffed in 2000+ bit space.
Few notes:
- Data integrity/authenticity was not the objective. Only secrecy.
- Obtaining 'public' key means subverting and reverse engineering the
application input modules,
We have been using a different approach for securing particular fields in the
database.
The main issue with symmetric ciphers inside (distributed) systems is that the
encrypting entity is always the most numerous weak point. Whoever subverts your
input flow - and there are lots of
Take a cheap Android, write the code you need for it, make it talk via USB, rip
out all antennas, put it in your box (wrap in a paper bag first), and connect
with USB cable to the internal USB port.
HW cost: $80
a Trojan. Security certification concerns put aside, the
architectural demands
BitCoin has only one problem: maintenance of the relationship between unit
BitCoin value and the material world (energy, as in KWh) is 'soft', it requires
some sort of a volatile communal effort, which sets it for failure (as a
counter example, the amount of Au atoms on this planet is rather
The basic fallacy here is the assumption that some magical 'identity' exists
and all we have to do is be brilliant enough to figure it out.
It doesn't.
It's just a collection of beneficial behaviors, a Nash equilibrium that changes
as the rules of the Game change (which, by definition, exists