Animated Encryption 156
An anonymous reader submits: "Cartoons for fun and secrecy -- A student at the University of Dayton has apparently come up with an encryption
scheme using computer generated animation. Story at the Chronicle of Higher Education."
Scant on details (Score:4, Interesting)
Actually it sounds quite similar to the 'teenage genius' story of that Irish schoolgirl who had her similarly 'unbreakable' matrix encryption scheme widely publicized without peer review, and then broken.
It'll be interesting to see what happens in this case
Re:Scant on details (not new?) (Score:1, Insightful)
Men
Re:Scant on details (Score:1, Troll)
Oh, right, Slashdot. Patents evil. Meh.
Re:Scant on details (Score:1)
Re:Scant on details (Score:2)
Patenting a new encryption algorithm is not only evil, but also stupid. Nobody will try to break a patented algorithm, and without years and years of expert cryptographers trying to break an encryption scheme, one cannot consider it secure.
Re:Scant on details (Score:2)
Re:Scant on details (Score:2)
True, but a different situation. RSA was the first, and for years the only, (pratical) algorithm to solve a specific problem (the problem of key distribution). It's different if you patent a symmetric encryption algorithm, because there's a large number of unpatented symmetric encryption algorithms to choose from.
Re:Scant on details (Score:2)
More Details - His Abstract (Score:5, Informative)
Snake Oil (Score:5, Informative)
Specifically, we have the unbreakable claim [interhack.net] warning sign, and even more specifically, this is almost certainly one of the one -time pad [interhack.net] errors: There's also the technobabble [interhack.net], secret algorithms [interhack.net], and revolutionary breakthrough [interhack.net] warning signs.
I hope they enjoy the $20,000 patent, 'cause it's not worth the paper it's printed on.
Re:Snake Oil (Score:2)
Re:Snake Oil (Score:2)
The bits in the pad cannot be generated by an algorithm or cipher. They must be truly random, using a real random source such as specialized hardware, radioactive decay timings, etc
This is one of the axioms used in proving that a one-time pad is "perfectly secure". If you don't use truly random numbers, there is no reason why your algorithm can't be secure; it just doesn't really deserve to be called "theoretically unbreakable".
We already have ciphers which are based on algorithm-generated "one time pads." They are called stream ciphers. A stream cipher is simply a long string of pseudo-random data (derived from a shared key) which is XOR'ed with the text. It sounds like this kid has just invented a new kind of stream cipher.
Stream ciphers are faster than block ciphers but they are less widely used because they also tend to be less secure. Block ciphers are less susceptible to attacks because the per-round encryption keys are data-dependent. Who knows -- maybe this kid has invented the best stream cipher in the world (but I doubt it).
I hope they enjoy the $20,000 patent, 'cause it's not worth the paper it's printed on.
You're right, but perhaps for the wrong reason. The patent is worthless because there are numerous free alternatives. Encryption inventors think a lot like open source advocates. Give away your algorithm for free and use your newfound fame to sell your books, network monitoring services, etc (e.g. Bruce Schneier).
-a
Re:More Details - His Abstract (Score:2)
And presumably, his school has no idea what he's talking about.
to make the cipher one-way and unbreakable
This would be interesting. A one-way cipher? Cryptography actually is very easy when you remove the requirement of being able to decrypt the ciphertext.
Re:More Details - His Abstract (Score:2)
Hey, thanks, I think I just figured out what my Master's thesis will be...
(disclaimer: I am not specifically a cryptographic researcher as that statement may imply. Just a regular ole' comp. sci. master's student who understand math well enough to trust the crypto researchers over a poorly-prepared teenager any day, no matter how romatic it might be to think that the teen has actually come up with something valuable...)
Re:More Details - His Abstract (Score:2)
Re:More Details - His Abstract (Score:2)
Where is it described as such? In crypto, 'one-way' means 'irreversible' or at least 'computationally irreversible'.
The basic security of DES derives from a progression of pseudorandom numbers which are XORed with the plaintext (or portions thereof). The derivation of these pseudorandom numbers is a one way operation, even though the actual encryption is not.
The only time I have seen the term 'one-way cipher' used is in referring to hash functions.
RSA encryption is sometimes called a one-way trapdoor cipher.
-a
Re:More Details - His Abstract (Score:2)
put simply:
Re:More Details - His Abstract (Score:2)
Where is [the basic unit of DES] described as [a one-way cypher]? In crypto, 'one-way' means 'irreversible' or at least 'computationally irreversible'. The only time I have seen the term 'one-way cipher' used is in referring to hash functions.
DES is one of a class of algorithms known as Feistel networks, invented by Horst Feistel in the early 70s. Feistel noticed that he could take any "round function", invertible or not, and create an invertible function from it.
The idea's pretty simple, really (as most really good ideas are). To make an n-bit block cipher from an n/2-bit function f (preferably one-way), just take your n-bit data block and divide it in half. Call the halves L_0 and R_0 (L and R are for Left and Right, and the 0s should clue you in that we're going to repeat this a few times). Then, let:
Or more, generally,
To really make this a cipher, of course, f should be a keyed function and generally (like in DES) different keys are used for each round (well, different subkeys).
The cool thing about Feistel networks is they are guaranteed to be invertible. To "decrypt", just execute the same process, using the reversed halves of the ciphertext as the input and running through the keys in the opposite order from that used to encrypt.
As an example to give you a hint why it works, consider the final round of DES encryption:
(K_15 is the final subkey, in case that's not obvious). The ciphertext is then L_15||R_15 (ignoring the whitening phase, which is reversible and hence ignorable).
So, what happens if we reverse L_15 and R_15 and feed them back in, starting with the last subkey? The calculation is:
Well, notice that since L_15 = R_14 (eq. 1), we can substitute the first argument to f, giving:
Now if we substitute right-hand side of eq. 2 for R_15, this is:
Given the nifty properties of XOR that 'a XOR a = 0', and 'b XOR 0 = b', the results of f cancel each other out, leaving:
So we have "reversed out" the effects of f, without having to invert f. And since L = L_15 = R_14 (by eq. 1 again), we have recovered L_14 and R_14 and reversed the final round of the encryption. Do it 15 more times and you have the plaintext (again, ignoring whitening).
Of course, none of this in any way implies that the guy mentioned in the original article has or has not done anything worthwhile.
Re:More Details - His Abstract (Score:2)
If by "unconditional cryptography" he means information theoretical security, this hypothesis is provably wrong. Otherwise, I'd like to know what advantage his scheme offers with respect to (e.g.) the Blum-Blum-Schub generator.
Re:True.... (Score:2)
It's a very effective way to get something which isn't very secure. Since the process may modify how the program works.
Re:Scant on details (Score:2)
<Daffy Duck> 10100101000101000111010111010010 </Daffy Duck>
Re:Scant on details (Score:2, Informative)
Also here's a link [udayton.edu] to the press release this guy's university published on his work. Although, come to think of it, it looks quite familiar. Is this a repeated story?
Re:Scant on details (Score:1)
No details? (Score:3, Interesting)
Anyone know of a more technical piece on this?
Re:No details? (Score:1)
Re:No details? (Score:2)
The link to animation is very thin, you can use PRNG for "random movements" in computer animation. That's about it.
Re:No details? (Score:2)
I still doubt anything here is practical though.
Pointless article. (Score:2, Insightful)
Re:Pointless article. (Score:2)
Re:Pointless article. (Score:2)
Hmm ... (Score:2, Funny)
Do you call in The Tick?
Freakazoid?
The Brain?
Who knows
Re:Hmm ... (Score:1)
The power of American Maid! *triumphant musical noise plays in the distance*
If this encryption is any good though, the kid better get his lawyers on the phone now, before:
a) Dubya labels him a terrorist mastermind (ok ok, so Dubya wouldn't use a big word like mastermind)
b) Some software mobsters (read: Microsoft) decide to 'liscence' (read: steal) the algorithm from him.
Unbreakable encryption? (Score:5, Interesting)
There already is an unbreakable encryption: the One-Time Pad. Furthermore, it is mathematically provable that no unbreakable encryption can have a shorter key than the One-Time Pad. Since the One-Time Pad algorithm is already extremely simple and fast (XORing the key with the plaintext), I don't see a need for any other unbreakable encryption.
Re:Unbreakable encryption? (Score:2)
Unfortunately, the large amount of non-reusable key data that is needed (equal in size to the data to be encrypted) means it is almost unusable; a major government could afford to hand courier a cd full of pad to a embassy; I doubt Amazon could afford to do the same to protect your CC details.
Btw, what is the mathematical proof of keylength? I would be interested to see that, as even a simple variant (compressing the plaintext then using OTP) requires less key data...
Re:Unbreakable encryption? (Score:2)
Very roughly, it goes like this: We define "unbreakable" as the following property: An eavesdropper cannot learn anything (except the length) by looking at the ciphertext, i.e. given a ciphertext, every plaintext of the same length is equally probable. This property can only hold if there are at least as many keys as possible plaintexts, therefore the key cannot be shorter than the plaintext.
This case, the compressed plaintext counts as the plaintext. :)
Re:Unbreakable encryption? (Score:2)
Re:Unbreakable encryption? (Score:2)
The simplest example would be to exploit the entropy within data already encoded to generate additional keydata.
Once you do this, your scheme is now breakable.
Keep in mind that a legitimate attack is an exhaustive search of the key space. If there are fewer possible keys than possible plaintexts, then for a given ciphertext the attacker can figure out a range of candidate plaintexts that is smaller than all possible plaintexts. That means the attacker has gained information.
Re:Unbreakable encryption? (Score:2)
This is true - I should have thought it though more. I will surrender on this one before I look a bigger fool than I do now
Re:Unbreakable encryption? (Score:2)
Such a scheme may well be good enough in pratice, however you can no longer prove mathematically that it is unbreakable.
An attacker with enough resources could encrypt all possible 2048 byte paintexts with all possible 2047 byte keys. For some of the 2^2048 plaintexts, it will not be possbile to generate the given ciphertext with any of the 2^2047 keys. The attacker can rule these out as possible plaintexts. No longer are all possible plaintexts equally probable -- therefore, it's not unbreakable in the sense defined in my previous posting.
Re:Unbreakable encryption? (Score:1)
Yes, but then you have some information on what the original text could have been, as it should be a valid [insert compression program] file. The reason why OTP is unbreakable is that if you try to attack it by brute force you'll have all of the possible messages of the same lenght, and you'll have no clue about which one is the real one. On the other side, if you compress the text and then apply brute force, you'll have all of the possible files of that lenght, but only a small part of them will be valid compressed files and this may help finding the real message.
I think that the actual proof works more or less in the same way: if the key is random, and exactly the same size of the text you get every possible message, even with bruteforce, if the key is shorter there are more chances that you'll be able to find some pattern in the cryptogram that will help you to decifrate it, and anyway with bruteforce you'll get only a subset of the possible messages, so that you may have a clue on what the real message was.
Of course this is required to have a really unbreakable system, mathematically proof: ohter systems may be statistically unbreakable, either because you need lots of time to decipher the messages, or because with brute force you may not get all of the messages of the same lenght, but you'll get enough to have really small chanches to find out the real one. Those will work just fine for most needs, like Amazon etc.
Re:Unbreakable encryption? (Score:2)
True enough; however, this won't give you any sort of a handle on what the original data was (although it will give you an idea of how much entropy was in the data, if you have any idea how big it should be decompressed). It will give you a good chance of a little keydata (particlarly if the file has a fixed-text header after compression) but as keydata is never reused, that isn't a vunerability.
Re:Unbreakable encryption? (Score:1)
If it gives you any sort of information on the original message, other than its lenght, the system is no longer mathematically secure. Still reasonabily secure, but then there are lots of reasonabily secure encryption systems that are easier to use (expecially for key transmission).
Re:Unbreakable encryption? (Score:2)
Re:Unbreakable encryption? (Score:2)
Utter nonsense. (Score:2)
You might as well claim the same thing if the attacker knows that the plaintext is sensible ASCII-encoded English. That the attacker knows the character of the plaintext (and therefore has a wealth of statistical information about the plaintext) is one of the fundamental assumptions of cryptography.
The perfect secrecy of OTP is based on the secrecy and randomness of the key alone, it doesn't require an obscure or disordered encoding of the plaintext. Knowing some key bits gives you no clue about the value of other key bits.
Of course you must account for the information that can be inferred from the length of the ciphertext (and pad your plaintext to avoid any information leak). This problem is no greater or worse for compressed plaintexts than uncompressed ones.
Re:Unbreakable encryption? (Score:2)
however, a VPN system relying on CDs with keydata on them would probably eat a cd a day just on routing and housekeeping data, never mind actual traffic.
You're right, there's no reason for alternatives (Score:1)
1) Generating the pad initially, and
2) exchanging the pad.
Why not look at other possibilities, since this method has clear limitations?
No reason to limit research...
Re:You're right, there's no reason for alternative (Score:2)
Since any truly unbreakable encryption scheme has to use keys at least as long as the One-Time-Pad, I do in fact consider the problem of unbreakable encryption solved. No need for further research.
Of course, there's a lot of need for research into ciphers which are not mathematically provable to be unbreakable, but are more practical than the One-Time Pad. :)
Re:You're right, there's no reason for alternative (Score:2, Informative)
1) Generating the pad initially, and
2) exchanging the pad.
1) Generating the one-time pad is easy with a hardware noise generator such as an avalanche diode. Marx [marx.com] makes a USB dongle that has a true white noise generator. Just pump the noise into a file, walla!
2) Exchanging pads is not needed, as the one-time pad can be used in a symetric scheme, just a simple XOR will do fine. You only have to transfer the pad one way. Unfortunately, that is a problem that has no good solution.
Re:Unbreakable encryption? (Score:1)
Re:Unbreakable encryption? (Score:2)
Famous last words in the field of cryptography.
Re:Unbreakable encryption? (Score:2)
I won't discuss if it compromises security, since I'm too lazy to define mathematically what compromised security means. :) But one thing is for sure: such a scheme is not information theoretically unbreakable. Please see my posting elsewhere in this thread [slashdot.org] for a more elaborate explanation.
Re:Unbreakable encryption? (Score:1)
It would be no longer mathematically unbreakable. Of course, if the message is a few TB long your method won't compromise much, but it won't help you transmitting the key, either; on the other side if your message is 8 bit long a 7 bit keys will compromise almost everything.
Actually... (Score:2)
It compromises the security of the message exactly one bit (assuming that it's binary OTP). If the first and last bits of the ciphertext are the same, then you know that the first and last bits of the plaintext are the same, and vice versa. You gain one bit of information about it, and cut the number of possible plaintexts in half.
Cryptanalysis is based on statistical data. The attacker presumably can make reasonable guesses about the contents. So if they can guess the first bit with 70% probability, they also know the last bit with 70% certainty.
Re:Unbreakable encryption? (Score:1)
I'll agree that one time pads are the only true secure form of cryptography, but that is still not reason enough not to develop more/better algorithms which are more effective in other areas.
Re:Unbreakable encryption? (Score:2)
Any truly unbreakable cipher (in the information theoretical sense) needs a random key at least as long as the plaintext. This is provable. Therefore, no information theoretically unbreakable cipher can exist which is more effective than the One-Time Pad.
If it is more effective, it is not unbreakable. Of course, this says nothing about usefulness. In fact, effective but breakable ciphers are more useful than unbreakable ciphers in almost all cases.
No such thing as unbreakable encryption (Score:1)
Re:No such thing as unbreakable encryption (Score:2)
I should probably have been more specific in my original posting. By unbreakable I mean information theoretically secure, a mathematically well-defined property which is in fact achievable and achieved by the One-Time Pad. I have given a rough definition here. [slashdot.org]
Computer != true randomness (Score:1)
A computer can do pseudo randomness... but since it's not truly random there are ways to detect periodic repetitions and thus find the missing key to decrypt the message...
The only way to be truly random would be to have an outside source (like a camera pointing to lava lamps, or a tree in the wind, backgroud noise, etc...).
This article is not very detailed, but I understand this invention is in the process of being patented, so we'll have to wait...
Re:Computer != true randomness (Score:2, Informative)
What you mean is probably: "Computers cannot generate true random numbers in software".
Germanium diodes are said to generate real random, chaotic electron flows if used in blocking direction.
One usually uses a Germanium diode, places an A/D converter past it and calls it "hardware random number generator".
That said, scientists still aren't sure whether there is such a thing like "true random numbers" at all. Create your own universe and maybe you will be able to predict any "random" number that beings within this universe try to create.
Re:Computer != true randomness (Score:1)
Re:Computer != true randomness (Score:2, Interesting)
What I meant to say is that in today's personal computers, there is nothing truely random.
Video poker machines have been exploited because the random numbers they generates tend to repeat. When you sample those numbers over a couple of weeks, you can see patterns emerging from those numbers. If you can find a formula or method that duplicates theses patterns, you have a way to predict the "random" numbers that the machine will generate.
Re:Computer != true randomness (Score:2)
Another example... use the time between radioactive decay detects. This is theoretically random from quantum physics.... BUT.... there may be artifacts. For example, there will be a minimum time resolution of your detector. It may have hysteresis or dead times after a particle is detected.
As has been shown many times, cryptography isn't for the faint of heart. It also isn't for the foolish, like this kid's father.
Re:Computer != true randomness (Score:2)
Try writing a program that takes several hundred MB from /dev/random. You'll find its runtime depends on how much mouse movement and other user input is going on. I once ran a random acess file system simulation for class. I went to dinenr and came back and the stupid thing was stuck. I later emailed the prof to let him know he should use /dev/urandom instead of /dev/random if he's not hyper sensitive about the entropy content and needs time-critical random data.
Off hand, what PRNG does the Linux /dev/urandom use when it exhausts the entropy pool? My best bet is that OpenBSD uses Yarrow, but all bets are off with Linux.
Re:Just for your archives.. (Score:1)
Re:Computer != true randomness (Score:1)
Re:Computer != true randomness (Score:1)
That jiggle on the right... (Score:1)
Not Using Animation to encrypt (Score:5, Informative)
The article then states that the thought was to use random data in an encryption algorythm to make it unbreakable. So I don't think that we will be seeing messages passed around the the next Disney flick...
Re:Not Using Animation to encrypt (Score:2)
Sure, why not? It's neither encryption nor stego, but it's a great way to leave general instructions.
"In the scene where the guy on stilts kicks some guards in the crotch, count how many guards get kicked. ONE guard means attack on Monday. TWO means attack on Tuesday. THREE means attack on Thursday. FOUR means attack on Friday. FIVE or MORE means attack at your own discretion."
Once you've got an innocuous set of actions and indicators listed, you can throw up a 'student project' with something specific in the title, and live secure in the knowledge that your agents can safely view it, and act upon it.
This is similar to the telltales used by intelligence officers everywhere to send and recieve messages to and from their agents. "If I'm carrying the newspaper folded up in a certain way, the meet is on. If I drop it, it means the meet is off. If I'm carrying it folded a different way, it means get to your bolt hole and leave the country."
Real Work (Score:2)
Am i the only one who can't see many / any real world applications for this.
Do I understand correclty? (Score:2, Interesting)
Working with stick men in animation, Mr. Kauffman wanted to improve upon those techniques, assigning more numbers to more body parts and actions.
While studying number generators for the cartoon project, he found references to mathematicians and computer scientists who had theorized that the technique could be used in encryption technology [...]
"Since you don't know what any of the values are mathematically, [a hacker] can't solve it," says Robert E. Kauffman, who is a senior research chemist at Dayton and Jason Kauffman's father.
If I understand it correctly, Alice sends a cartoon to Bob. Bob knows which features to looks for (for example the head and feets) -- that's the secret key -- and can then reconstruct the message by analysing the movements of these features.
Not too dumb, but it looks more like steganography than cryptography.
GFK's
unbreakable? right.... (Score:3, Insightful)
Unbreakable? Sounds like snake oil already...
An idea dawned on him for a unique way to use random numbers in a math equation to encrypt data.
"Since you don't know what any of the values are mathematically, [a hacker] can't solve it,"
This is ridiculous. Some stream ciphers use random number generators for their encryptions. The problem is, that since the "random" numbers come from a random number generation algorithm, they are not random -- they just appear to be. When they are subject to analysis, patterns are found, and the whole system is compromised. The security lies in how hard it is to predict the "random" numbers.
Jason Kauffman is going to continue plugging away at his mechanical-engineering degree.
That's a good idea, since this sounds like the junk "unbreakable" encryption that comes around every few years. If he's interested in encryption, he should take some advanced math classes to get a better foundation to work from. And pick up a copy of Applied Crytography.
Sorry about the rant... but this kind of thing gets me going.
Re:unbreakable? right.... (Score:1)
But it's hard to criticize or admire whatever technique this guy is looking at, because there are no details in the article. (zero-knowledge reporting?)
How is this new? (Score:1)
This is particularly important for block cipher algorithms which use the same key over and over again on successive blocks of data!
At last I understand those Simpsons cartoons! (Score:1)
When they all leap onto the sofa at the start of the episode it truly means something.
Now if only I could get a look at the decode manual . . .
Re: At last I understand those Simpsons cartoons! (Score:2, Funny)
Homer's hair. Nuff said.
And whenever they need to send a burst of data, there always is some reason to show Homer in the 60s in the storyline, right? ;-)
New Patented Idea (Score:5, Funny)
I was sitting outside and saw all the blades of grass swaying in the wind before me. I noticed how some were shorter than others, and that they actually didn't all have the exact same color. I thought if I assigned a number to each of these and several other characteristics, I'd be well on my way to unbreakable encryption.
My dad used to be a pretty famous rodeo clown in the 60s and an alumnus of the college I'm attending, so when I approached the board of trustees for approval for my research, they were ecstatic! They gave me $20,000 to conduct my research. Now I will be busy all summer observing the grass swaying in the wind. I plan to have a prototype ready at some point, I hope.
Re:New Patented Idea (Score:1, Funny)
Have you noticed that the vertical measure of the individual blades of grass change with respect to time?
You should ask for another $20,000 to watch that change.
Re:New Patented Idea (Score:1)
http://www.udayton.edu/news/nr/062397.html
Kickass! (Score:2)
unimpressive (Score:5, Interesting)
"Since you don't know what any of the values are mathematically, [a hacker] can't solve it," says Robert E. Kauffman, who is a senior research chemist at Dayton and Jason Kauffman's father. Robert Kauffman formed a partnership with his son and the university to patent the idea. The Kauffmans are reluctant to go into more detail about the idea because it's in the patenting process.
Cryptography based on a hacker "not knowing" something can be in for quite a surprise. And there is not even a hint here that this technique is based on a mathematically sound formula that is "hard" to solve. Perhaps this guy is on to something, but this attempt to talk about it but at the same time claim they can't talk about it yet leads me to believe this is more of an exercise in hype or ego than anything scientific. Cartoon cryptography might turn out to be a fitting term for it.
Re:unimpressive (Score:2)
All cryptography is based on an attacker "not knowing" something. This 'something' is conventionally referred to as the 'key'.
If you are alluding to Kerkhoff's Principle, then it is really about defining what makes a good key and what makes a bad key.
Too many times someone without a good background in this area thinks they have done something impressive
This is true, and I have small doubt this guy's idea will amount to nothing. I would add that many times people with good backgrounds in this area think they have done something impressive and later find a flaw. Good cryptography is really really hard.
Of course, occasionally you get your Diffies, Hellmans, and Merckles who come up with relatively straightforward ideas that really are good, and really are significant. Even Rivest, Shamir and Adleman weren't experts in cryptography; they were number theorists who realized integer factorization would make a good trap-door one-way function.
Re:unimpressive (Score:2)
First, it's Ralph Merkle. Second, the scheme he invented with Martin Hellman was broken. It looked cool at the time, but someone came up with a neat way to break it. So things come to naught even with the best prepartions and reputation.
Re:unimpressive (Score:1)
Cool... (Score:2, Funny)
Let me get my smart-ass remarks in (Score:2)
A few points here:
It looks like he's already working on taking people for rides.
At my next development meeting should I recommend we watch the Little Mermaid for inspiration on database design?
Hold on now (Score:1)
A senior research chemist, well holy smokes! This is the only freakin guy you could get for a quote on this new "unbreakable" cryptography system. What was the janitor at lunch!? Not only that, but its his father to boot, not to knock his extensive work in engine/oil products but come on!
Hey while we're at it...My 4 year old sister says that my newly developed RDBMS is 120 times more efficent than Oracle's, so now can I have the $20,000 to patent it, thanks.
Hello (Score:1)
bwahahaha you will never break my..... (Score:1)
Math and animation (Score:2)
Um. Has this guy never met a math or science student before?!
Google? (Score:3, Informative)
Jason finds way to recycle used oil [udayton.edu]
gives a more technical view [udayton.edu] of the current discovery (its a prng by the way)
Re:Google? (Score:2)
His dad is most likely very intelligent, but a bit of a spin-meister:
"Jason is so far outside of the box with his thinking that he can't find the box..."
Puleeze!
Good luck with the research...but there are a number of PRNGs out there already. Sounds like Jr. has learned a thing or two about how to spin a story from his dad...
two words: SNAKE OIL (Score:5, Insightful)
Yup, all the tell-tale signs are there:
My guess is, he found some "smooth noise" generator and thought that it would make a good source of "random numbers", used, e.g., as a key schedule algorithm, and as soon as the patent is published (which it will be, thanks to the dumb patent office), it will be broken (it probably has a short "key" to set initial conditions, which will be easy to break) and this guy will be forgotten.
Though the cartoon connection is kinda cute and might get some press attention.
Next?
Re:two words: SNAKE OIL (Score:2)
There's lots of work to be done on encryption algorithms. A system based on an algorithm with a provable lower bound on solution time would be helpful. Some popular algorithms have "bad keys" that are easier to crack than the average key. A reliable way to detect man-in-the-middle attacks automatically would be useful. Systems that synch up fast on noisy channels would help.
But another scheme based on a psuedorandom number generator isn't useful.
"No new encryption algorithm is worth looking at unless it comes from someone who has already broken a very hard one" - Friedman
Can't Find Jason Kauffman's Pat. App. (Score:1)
Hmm.
Stupid encryption tricks. (Score:2)
Basically, your key is the equivalent of a randomly shuffled deck of cards with each possible messages written on a card. Your ciphertext tells where to cut the deck to find the card with your message on it. Each deck is used for only one message, then destroyed. Hence the name.
It has the interesting property that if you don't have the deck, even if you know the plaintext exactly, any changes to the ciphertext will result in a completely random plaintext (except that it's not the same).
and what do you do for a living again? (Score:2)
I have this vision of an FBI agent watching tons and tons of porn in his cubicle. The boss comes by and starts scolding him. He then says:
"Please calm down. It is possible to hide secret messages in images now. Here is a printout of a slashdot article about it. I am just looking for hidden terrorist messages in this porn found on Al-Quida PC's. I think her breasts are jiggling to a descernable pattern, so I am trying to plot the jiggle pattern here."
Boss: "Then why are you sweating like that?"
Good one! (Score:2)
Snow White was used to plan the attacks....
Sheesh
Anyone Know His Dorm Number? (Score:2, Interesting)
That is complete B.S.
Triple-DES is a 112-bit algorithm, and perhaps even stronger that Rjindael (AES), since it's been subjected to rigorous cryptanalysis for many, many years.
It seems as if the encryption technology might be secure, but without any information on it, I am very skeptical.