biological systems and cryptography

John Kelsey kelsey.j at ix.netcom.com
Thu Jan 2 10:02:17 PST 2003


At 08:55 PM 1/1/03 -0800, Michael Cardenas wrote:
>On Tue, Dec 31, 2002 at 12:23:51PM -0800, Tim May wrote:
...
> > Strong crypto is, ipso facto, resistant to all of the above. For the
> > obvious reason that the specific solution to a cipher is like a Dirac
> > delta function (a spike) rising above a featureless plain, this in
> > terms of the usual hill-climbing or landscape-learning models which all
> > of the above use in one form or another.
>
>People do break cyphers, by finding weaknesses in them. Are you saying
>that you think that current cyphers are unbreakable?

Well, there's a difference between a system to recover plaintext given 
ciphertext (which ought not to work for any decent cipher, given a 
hill-climbing sort of approach), and a system to help a human work out the 
right way to cryptanalyze a system.  Hill-climbing techniques make sense 
when analyzing a component of a cipher, say.  (I know people have done 
stuff like this in various places, but I'm away from my library, so you'll 
have to look it up yourself.)

>Also, what about using biological systems to create strong cyphers,
>not to break them?

This ought to just be the other side of using these systems to do 
analysis.  If you can find an especially good way to partition the set of 
texts for a partitioning attack, you can use that to decide how to design 
your cipher to resist the attacks, for example.
--
>michael cardenas       | lead software engineer, lindows.com
>hyperpoem.net          | GNU/Linux software developer
>people.debian.org/~mbc | encrypted email preferred

--John Kelsey, kelsey.j at ix.netcom.com





More information about the cypherpunks-legacy mailing list