Irish Girls Encryption Algorithm (Continued) 47
Steven M. wrote a followup to a recent article about
the Girl who discovered a new faster encryption alogorithm.
It was in all the press recently. There is a
new article
with a few more details about it. It's not "Better" just "Different". Apparently
it's a memory hog for starters. But the article talks about
if the algorithm will be publicly released. And it looks like
it. It talks about Encryption needing public review. Sorta
like source code.
my eyes are really hurting from all caps headers (Score:1)
so...? (Score:1)
You're asking because you haven't read the article...one of the few things that it does explain is that the cyphertext is about 5 times larger than one produced by RSA from the same cleartext.
As usual, commercial news just makes we want to find out what they're really talking about. Does anyone have a source for more detailed information about the algorithm and the people involved?
Hmm. I wonder if Distributed.Net can help to test this. A brute-force attack would prove nothing, though, so there'd have to be something cleverer going on...perhaps working transformations on very large matrices? Hell, I dunno how parallelizable that sort of job might be...
so...? (Score:1)
her math that means you can crack the code quickly
by using a larger matrix, somehow.
I'm just making that up -- the example was an
attempt to imagine what, other than brute force,
one might attempt to use to compromise an
encrypted message (or, in this case, the algorithm).
News flash: Women have brains, too. (Score:1)
You have a short or very selective memory.
On August 11, 1998, Slashdot posted a story about a British teen (male) who claimed to have invented an 'unbreakable' 2048bit cypher. The discussion was remarkably similar to this one.
You also apparently know nothing about cryptograpy or cryptanalysis and the process that a proposed cypher must go through before anyone in their right mind would use it. No matter who designed it.
I wonder how she learned... (Score:1)
MICROSOFT! (Score:1)
Open Source Encription (Score:1)
A grammatical chuckle (Score:1)
Rob, watch your punctuation.
MS IS REALLY HURTING FROM OPEN SOURCE AND LINUX (Score:1)
Bill Clinton.Crypto-policy (Score:1)
"Stability can no longer be purchased at the price of liberty".
He was talking about China.
I think this should also apply to his Crypto policy.
Not just memory hog... (Score:1)
She Decided not to Patent it. (Score:1)
the future, or would it become prior art after
being published (she said she was planning on
publishing it for crypto 99.)
She is awsome!
In this case ? (Score:1)
redundancy has increased ? A more detailed
description would be interesting.
Thanks
Don't misunderstand entropy (Score:1)
Once you pull the pin, Mr. Grenade is no longer your friend.
Is faster really better? (Score:1)
Importance of Peer Review (Score:1)
I congratulate Sarah for being level-headed and open, and for looking to publish her results. She does indeed have a bright future.
The press deserves a hearty slap with a moldy trout for truly lousy reporting. You wouldn't report a cancer cure this cavalierly, would you?
there.
Who cares? Yet Another Cold Fusion. (Score:1)
knows that algoritms need to stand the test
of time before they can be taken seriously.
And when did we start to take our news from
the mainstream press? Slashdot is getting
worse every day.
so...? (Score:1)
If you encrypt a session key with a 1024 bit RSA key, the ciphertext will be at most 1024 bits big. If you use this woman's algorithm, it'd be either 4096 bits (which makes sense to me, being a 2x2 matrix) or 8192 bits (which is what the article said).
The problem here is this means a larger message to send across the wire. But, not so much larger that the algorithm is useless. I mean, 8192 bits is 1K, which is smaller than most images on the net, smaller than most text-only email messages, for that matter.
The speed isn't a very big issue either. 20x faster than an RSA encryption sounds good, but it doesn't mean much. You do one RSA encryption per session. The encryption generally takes the better part of a second. From 1 second to
The big deal with her invention is that it isn't patented, and that we obviously have a brilliant girl on our hands. If she can do this now, watch out for her after she's had a real education. Even if the security is totally flawed, she has impress Ron Rivest with her knowledge of number theory. I don't think I had even heard of number theory when I was 16.
Know what you bash (Score:1)
Claiming that the author has no peer is simply silly. Saying that the men and women whose works are the basis for all information security today (including people like Ron Rivest, Taher El Gamal and Whit Diffie) are not good enough to look at the work of the author is completely ridiculous.
Further more, your attitude is not only wrong headed, it is dangerous. If we are to accept this algorithm _before seeing the math and/or code_ simply because the author is female is a recipe for disaster.
You seem to think we are attacking this girl. That is not the case. We are attackign the press who've heralded this algorithm as the next big thing without doing the proper research. We are treating the author's work in the only responsible manner; by refusing to use it until it has undergone intensive study and testing. This peer review has been applied to every algorithm we use (including RSA and DES...the most popular asymmetric and symmetric algorithms) and is continued to be applied (see the articles on the EFF's awesome Deep Crack and the DES III challenge as well as Daniel Bleichenbacher's latest results against RSA with PKCS1 padding).
Your attitude is that of an uneducated child, atacking that which you know nothing about. Please educate yourself before you outdo the imbecility done by the press.
Open Source Encription (Score:1)
Anyone else smell a trace of FUD in this article? (Score:1)
Depends.. (Score:1)
I agree that we certainly must wait.. (Score:1)
The points they made were valid, it's just that we have to keep an eye on the reason *why* they made them. I don't know the people at RSA personally, but with business and profit comes marketing.
Wassenaar Agreement (Score:1)
I could be wrong but hey! if that were so then the world would be a better place, so I'm probably not.
K.
-
I wonder how she learned... (Score:1)
#1 Boring, they don't ever apply it to kewl stuff.
#2 Ask the prof a question that is kewl and their eyes glaze over.
#3 The jargon. It isn't like puter jargon that is kinda hip and easy to learn, it gives you a headache remembering words you can't say. Why don't they label things w/ words we can enjoy, 'scuzzy', 'pizza boxes', 'male-female coupler'.. know what I'm saying?
Y'know I was always great at visualizing logic and inventing my own formulas for solving problems but math teaches flunk you for this even if you can prove it works. Blah math.
Anyone else smell a trace of FUD in this article? (Score:1)
I am really happy for Sarah and I wish her all the best in the future! Way to go!
She Decided not to Patent it. (Score:1)
Uh-oh - she is "looking into" patenting (Score:1)
About half way down the page of this article [independent.ie] is the quote