[8373] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Cryptographic Algorithm Metrics

daemon@ATHENA.MIT.EDU (Greg Rose)
Wed Jan 3 16:49:00 2001

Message-Id: <4.3.1.0.20010104081709.01d6fc38@127.0.0.1>
Date: Thu, 04 Jan 2001 08:25:02 +1100
To: John Young <jya@pipeline.com>
From: Greg Rose <ggr@qualcomm.com>
Cc: cryptography@c2.net
In-Reply-To: <200101032011.PAA09528@smtp6.mindspring.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

At 03:06 PM 1/3/2001 -0500, John Young wrote:
>Yes, the one-time pad. However, I wondered if Smith
>was hinting at another cipher(s) not yet publicized,
>perhaps computational -- or more exotic technology
>such as quantum, DNA, ultra-spectral and beyond.

It always amazes me that people single out the OTP here. There are any 
number of other algorithms that are unconditionally secure. The simplest is 
Shamir's secret sharing, when you don't have enough shares. At Crypto a 
couple of years ago the invited lecture gave some very general results 
about unconditionally secure ciphers... unfortunately I can't remember 
exactly who gave the lecture, but I think it might have been Oded 
Goldreich... forgive me if I'm wrong. The important result, though, was 
that you need truly random input to the algorithm in an amount equal to the 
stuff being protected, or you cannot have unconditional security. The OTP 
is just the simplest realisation of this.

Greg.


NOTE NEW ADDRESS AND PHONE NUMBERS BELOW!

Greg Rose                                       INTERNET: ggr@qualcomm.com
Qualcomm Australia          VOICE:  +61-2-9817 4188   FAX: +61-2-9817 5199
Level 3, 230 Victoria Road,                http://people.qualcomm.com/ggr/
Gladesville NSW 2111    232B EC8F 44C6 C853 D68F  E107 E6BF CD2F 1081 A37C



home help back first fref pref prev next nref lref last post