[Cryptography] Intel experimental tool....
Brian M. Waters
brian at brianmwaters.net
Sat May 3 21:08:06 EDT 2014
On Mon, 28 Apr 2014 19:46:18 -0700
Tom Mitchell <mitch at niftyegg.com> wrote:
> If Cryptography code can be reduced in complexity yet return the same
> result then the resulting code might present a model that is easier to
> attack than the author of the code or crypto model/standard might
> think.
>
> With modern large clusters the logic of some decryption/ encryption
> pairs might be proved fragile especially if it can be reduced to FPGA
> logic gates.
I'm not sure I follow. Breaking modern cryptography is hard
(computationally hard), as far as anyone can tell. This is independent
of implementation issues like optimization or FPGA/ASIC-ization.
BMW
--
Brian M. Waters
Burlington, Vermont, USA
+1 (908) 380-8214
brian at brianmwaters.net
https://brianmwaters.net/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: not available
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20140503/a8bf321e/attachment.pgp>
More information about the cryptography
mailing list