20120908, 19:24  #1  
∂^{2}ω=0
Sep 2002
República de California
3·7·19·29 Posts 
Metrosexual/BiCurious Cryptography article
Brian Hayes has an interesting piece about this in his latest American Scientist computingscience column:
Alice and Bob in Cipherspace: A new form of encryption allows you to compute with data you cannot read Quote:


20120909, 02:40  #2 
Jun 2003
Ottawa, Canada
491_{16} Posts 
Very interesting, thanks for posting.

20120909, 02:58  #3 
Undefined
"The unspeakable one"
Jun 2006
My evil lair
2×5×19×31 Posts 
Mathematically speaking this is a nice advancement. But practically speaking what is so enticing about cloud computing? Even if this can be made more efficient the user would still need a local computer available to encrypt the input before sending and later decrypt the output after receiving. So why not just run it natively and forget about all the extra steps required to get someone else to compute it?

20120909, 05:40  #4  
Jun 2009
2^{2}·13^{2} Posts 
Quote:


20120909, 06:43  #5  
"Richard B. Woods"
Aug 2002
Wisconsin USA
2^{2}·3·641 Posts 
Quote:
I was working for a company that sold electronic financial transaction software and services. One day I was asked to analyze the feasibility of incorporating an encryption method that enabled Alice to compute one category of keys used in communication with Bob, without having those keys actually transmitted between Alice and Bob, by substituting a special sequence of sixteen en/decryptions operating on data that Alice (& Bob) already had. Sounds wacky, but though I forget the details, it wasn't just some method of hiding the key among the other data or using other data as a pseudorandom number generator's seed. The analysis boiled down to determining how many instruction cycles the extra sixteenlayer 'cryption sequence required on an IBM mainframe and how that would affect transaction processing time. Last fiddled with by cheesehead on 20120909 at 06:46 

Thread Tools  
Similar Threads  
Thread  Thread Starter  Forum  Replies  Last Post 
..New algorithm shakes up cryptography"?  jwaltos  Operation Kibibit  5  20160130 09:33 
CUDA and cryptography  ET_  GPU Computing  10  20120924 10:27 
GIMPS and cryptography  Rodrigo  Lounge  4  20120731 16:03 
new ECPP article  R. Gerbicz  GMPECM  2  20060913 16:24 
Distributed Internet Cryptography  ewmayer  Math  1  20060821 20:53 