Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Dear Slashdot: Messaging is broke (Score 1) 75

Am I imagining this?

A long time ago, before beta was even a twinkle in some dreadlocked UXtard's eye, you could reply to a comment or follow an external link and when you came back you were at the very place you left from, rather than the top of the accursed page?

And recently, for just a few days, you could again. And now you can't again?

Spam

Profanity-Laced Academic Paper Exposes Scam Journal 137

Frosty P writes: A scientific paper titled "Get Me Off Your F****** Mailing List" was actually accepted by the International Journal of Advanced Computer Technology. As reported at Vox and other web sites, the journal, despite its distinguished name, is a predatory open-access journal. These sorts of low-quality journals spam thousands of scientists, offering to publish their work for a fee. In 2005, computer scientists David Mazières and Eddie Kohler created this highly profane ten-page paper as a joke, to send in replying to unwanted conference invitations. It literally just contains that seven-word phrase over and over, along with a nice flow chart and scatter-plot graph. More recently, computer scientist Peter Vamplew sent it to the IJACT in response to spam from the journal, and the paper was automatically accepted with an anonymous reviewer rating it as "excellent," and requested a fee of $150. Over the years, the number of these predatory journals has exploded. Jeffrey Beall, a librarian at the University of Colorado, keeps an up-to-date list of them to help researchers avoid being taken in; it currently has 550 publishers and journals on it."

Submission + - What Does The NSA Think Of Cryptographers? (i-programmer.info)

mikejuk writes: A recently declassified NSA house magazine, CryptoLog, reveals some interesting attitudes between the redactions. What is the NSA take on cryptography?
The article of interest is a report of a trip to the 1992 EuroCrypt conference by an NSA cryptographer whose name is redacted.We all get a little bored having to sit though presentations that are off topic, boring or even down right silly but we generally don't write our opinions down. In this case the criticisms are cutting and they reveal a lot about the attitude of the NSA cryptographers. You need to keep in mind as you read that this is intended for the NSA crypto community and as such the writer would have felt at home with what was being written.
Take for example:
Three of the last four sessions were of no value whatever, and indeed there was almost nothing at Eurocrypt to interest us (this is good news!). The scholarship was actually extremely good; it’s just that the directions which external cryptologic researchers have taken are remarkably far from our own lines of interest.
It seems that back in 1992 academic cryptographers were working on things that the NSA didn't consider of any importance. Could things be the same now?
The gulf between the two camps couldn't be better expressed than:
The conference again offered an interesting view into the thought processes of the world’s leading “cryptologists.” It is indeed remarkable how far the Agency has strayed from the True Path.
The ironic comment is clearly suggesting that the NSA is on the "true path" whatever that might be.
Clearly the gap between the NSA and the academic crypto community is probably as wide today with the different approaches to the problem being driven by what each wants to achieve. It is worth reading the rest of the article.

Comment Re:Why bother? (Score 2) 50

There are lots of pressing problems.

Cyphers, as opposed to codes, have well-defined functions (be it an algorithm or a lookup table) which map the input to the output. The same functions are applied in the same way across the entire input. Unless the functions are such that the output is truly indistinguishable from a random oracle (or, indeed, any other Oracle product), information is exposed, both information about the message and information about the method for producing the cyphertext. Since randomness can tell you nothing, by definition, the amount of information exposed cannot exceed the the information limit proposed by Shannon for a channel whose bandwidth is equal to the non-randomness of the output.

(A channel is a channel is a channel. The rules don't care.)

So, obviously you want to know how to get at the greatest amount of the unencrypted data that's encoded in the non-randomness, and how do you actually then extract the contents?

In other words, is there a general purpose function that can do basic, naive cryptanalysis? And what, exactly, can such a function achieve given a channel of N bits and a message of M bits?

In other words, how much non-randomness can a cypher have before you definitely know there's enough information leakage in some arbitrary cypher for the most naive cryptanalysis possible (excluding brute-force, since that's not analytical and isn't naive since you have to know the cypher) to be able to break the cypher in finite time? (Even if that's longer than the universe is expected to last.)

Is there some function which can take the information leakage rate and the type and complexity of the cypher to produce a half-life of that class of cyphers, where you can expect half of a random selection of cyphers (out of all cyphers with the same characteristics) to be broken at around that estimated half-life point?

If you can do that, then you know how complex you can make your cypher for a competition page, and how simple you can afford it when building a TrueCrypt replacement.

Comment Re:Clock -- Time is running out! (Score 1) 50

Damn. I was hoping he was going to say that the solution was written down but the piece of acid-free archival paper had been cut into segments, placed in acid-free envelopes, in turn placed in argon-filled boxes, which in turn were buried at secret locations, with the GPS coordinates for each segment written in encrypted format in the will.

Slashdot Top Deals

The one day you'd sell your soul for something, souls are a glut.

Working...