[Cryptography] Intel experimental tool....

Brian M. Waters brian at brianmwaters.net
Sat May 3 21:08:06 EDT 2014


On Mon, 28 Apr 2014 19:46:18 -0700
Tom Mitchell <mitch at niftyegg.com> wrote:
> If Cryptography code can be reduced in complexity yet return the same
> result then the resulting code might present a model that is easier to
> attack than the author of the code or crypto model/standard might
> think.
> 
> With modern large clusters the logic of some decryption/ encryption
> pairs might be proved fragile especially if it can be reduced to FPGA
> logic gates.

I'm not sure I follow. Breaking modern cryptography is hard
(computationally hard), as far as anyone can tell. This is independent
of implementation issues like optimization or FPGA/ASIC-ization.

BMW

-- 
Brian M. Waters
Burlington, Vermont, USA
+1 (908) 380-8214
brian at brianmwaters.net
https://brianmwaters.net/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: not available
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20140503/a8bf321e/attachment.pgp>


More information about the cryptography mailing list