![]() |
|
|
#1 | |
|
∂2ω=0
Sep 2002
República de California
19·613 Posts |
Brian Hayes has an interesting piece about this in his latest American Scientist computing-science column:
Alice and Bob in Cipherspace: A new form of encryption allows you to compute with data you cannot read Quote:
|
|
|
|
|
|
|
#2 |
|
Jun 2003
Ottawa, Canada
3·17·23 Posts |
Very interesting, thanks for posting.
|
|
|
|
|
|
#3 |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
622410 Posts |
Mathematically speaking this is a nice advancement. But practically speaking what is so enticing about cloud computing? Even if this can be made more efficient the user would still need a local computer available to encrypt the input before sending and later decrypt the output after receiving. So why not just run it natively and forget about all the extra steps required to get someone else to compute it?
|
|
|
|
|
|
#4 | |
|
Jun 2009
12548 Posts |
Quote:
|
|
|
|
|
|
|
#5 | |
|
"Richard B. Woods"
Aug 2002
Wisconsin USA
22×3×641 Posts |
Quote:
I was working for a company that sold electronic financial transaction software and services. One day I was asked to analyze the feasibility of incorporating an encryption method that enabled Alice to compute one category of keys used in communication with Bob, without having those keys actually transmitted between Alice and Bob, by substituting a special sequence of sixteen en-/decryptions operating on data that Alice (& Bob) already had. Sounds wacky, but though I forget the details, it wasn't just some method of hiding the key among the other data or using other data as a pseudorandom number generator's seed. The analysis boiled down to determining how many instruction cycles the extra sixteen-layer 'cryption sequence required on an IBM mainframe and how that would affect transaction processing time. Last fiddled with by cheesehead on 2012-09-09 at 06:46 |
|
|
|
|
![]() |
| Thread Tools | |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| ..New algorithm shakes up cryptography"? | jwaltos | Operation Kibibit | 5 | 2016-01-30 09:33 |
| CUDA and cryptography | ET_ | GPU Computing | 10 | 2012-09-24 10:27 |
| GIMPS and cryptography | Rodrigo | Lounge | 4 | 2012-07-31 16:03 |
| new ECPP article | R. Gerbicz | GMP-ECM | 2 | 2006-09-13 16:24 |
| Distributed Internet Cryptography | ewmayer | Math | 1 | 2006-08-21 20:53 |