tag:blogger.com,1999:blog-3722233.post7182233892649746529..comments2024-03-27T19:58:17.387-05:00Comments on Computational Complexity: Cryptography and the NSALance Fortnowhttp://www.blogger.com/profile/06752030912874378610noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-3722233.post-83766270902276874542013-09-12T17:39:18.866-05:002013-09-12T17:39:18.866-05:00Given how far academic researchers have come on ve...<i>Given how far academic researchers have come on <b>very</b> limited resources, </i><br /><br />Oh please. Quantum computing related phenomena research is richly supported, particularly if you include the grants on the physics side, at a tune of about a million dollars a week just in the USA alone.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3722233.post-84286538448024752902013-09-12T17:23:33.245-05:002013-09-12T17:23:33.245-05:00http://www.theguardian.com/commentisfree/2013/sep/...http://www.theguardian.com/commentisfree/2013/sep/10/nsa-matthew-green-takedown-blog-post-johns-hopkinsAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3722233.post-83002097868657890702013-09-12T13:32:37.031-05:002013-09-12T13:32:37.031-05:00Given how far academic researchers have come on ve...Given how far academic researchers have come on very limited resources, probably the NSA DOES have a quantum computer in its basement. This would let them break private RSA keys. But it is still probably too slow to break EVERYBODY's private key, so they have to target it on the most important keys. Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3722233.post-88230370651952679472013-09-12T13:13:12.704-05:002013-09-12T13:13:12.704-05:00I believe Lance's quote of TW actually refers ...I believe Lance's quote of TW actually refers to the possibility of trapdoors in the S-boxes of DES. I am not sure if anyone understands what fuzzy math works behind those S-boxes. In contrast, the S-box devised by Joan Daemen and Vincent Rijmen has nice clean algebraic construction. Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3722233.post-47767862433470928632013-09-12T11:36:35.687-05:002013-09-12T11:36:35.687-05:00To add to above citation from that textbook, I rem...To add to above citation from that textbook, I remember my first interaction with a world class cryptographer. I was working on symmetric key encryption, and his idea about AES competition was, to quote him, "..forget about the fast hardware implementations; AES is *transparent* unlike DES." <br /><br />I am not sure whether the dual EC pseudo-random number generator is actually used in practical systems (I would be rather surprised if the answer is yes), but yes, the credibility of NIST has come in to serious doubts. In any case, in CRYPTO 2007 , there was a rump session talk that talked about weak constants in that particular construction of PRNG. The talk is available here http://rump2007.cr.yp.to/15-shumow.pdf<br /><br />Adding the two bits together, I am not so surprised at the revelation?!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3722233.post-37107530502498640762013-09-12T11:25:13.431-05:002013-09-12T11:25:13.431-05:00The AES was designed by two Belgium researchers, n...The AES was designed by two Belgium researchers, not the NSA.Anonymousnoreply@blogger.com