Slashback: Sale, Secrecy, Lasers 141
That's a lot of Molsen. Bigger R writes contributes this link to a story in the Calgary Herald with more detail on the sale of Corel's Linux division which was mentioned in vague terms the other day. It's going to a company called Xandros, in exchange for cash and equity, so Corel will still have at least some interest in the continued success of Linux, or at least its distro. A snippet: "Xandros Corp. president Michael Bego, who started the Ottawa company recently in preparation for the deal announced Wednesday, is also a shareowner in Linux Global Partners, a privately held New York venture firm that put up $10 million US to start Xandros."
Small, cheap and fun are all good words. An Anonymous Coward writes "There's an announcement of the winners of the embedded linux journal's design contest over at linuxdevices.com. Cool projects -- voting system, digital audio workstation, solar racing vehicle, GizmoCopter Project, and Hacking BigMouth Billy Bass. Follow the urls for the projects which are given in the announcement to learn about each project. Oh, and the prize for winning each category? An all expense paid trip to Costa Rica. Dang, why didn't I enter?"
Stuff that's hard to read. John Sokol writes with an update on the Cayley-Purser Algorithm mentioned here before.
"This story went through some time back about a 16-year-old girl outdoing RSA, but it lacked any discussion of the actual algorithm. This link is her paper that she now has posted on the net. It seems reasonable. Maybe someone here can find a flaw in it?"
Roll 'em. Slide100 writes: "It seems that there is more to the desktop rover that was posted about on Tuesday.
The marketing manager sent me a PDF file that explains some more - apparently, they just don't have the time to update the website.
Each rover comes with a cable that plugs into the transmitter and software to allow control of the rover from your computer (or through TCP/IP).
Additionally, each rover has 'Laser Tag' as an integral part of the vehicle. 10 hits (including sound effects) and your rover is disabled 'till the next match See it here. BTW - I have nothing to do with the company, I just think its very cool."
Re:No more quickies? (Score:1)
A quickie? sure I got an hour free? (Score:1)
CP Algorithm broken long ago as public key scheme (Score:4, Informative)
Re:CP Algorithm broken long ago as public key sche (Score:2, Interesting)
I'm wondering if it might be worthwhile to do a mixed scheme whereby E is returned using RSA or some other technique and the bulk of the message is encrypted using C-P. If I read the comments correctly one has to retrieve the unique E for each message in order to break the system and read the encrypted text of that message.
The table on the end show that a 250k file takes 50 minutes to encrypt/decrypt with RSA on the P 133 under Mathematica (relatively inefficient), and only a little more than 2 mins for C-P. Even given faster computers and optimized code, it would seem that one might see significant gains in speed if you are encrypting multi-megabyte files.
Any thoughts?
Re:CP Algorithm broken long ago as public key sche (Score:1, Interesting)
Block ciphers like DES and AES are much faster to compute than even C-P, since they don't require multiprecision arithmetic. AES, in particular, screams.
Re:CP Algorithm broken long ago as public key sche (Score:2, Informative)
The encryption/decrytpion of C-P uses only matrices of integers (all operations are modulo n). Having another encryption method might not be needed, but you're objection doesn't seem accurate.
Or is there some meaning for "multiprecision arithmetic" other than multiprecision floating-point arithmetic?
Re:CP Algorithm broken long ago as public key sche (Score:2)
Just curious.
Re:CP Algorithm broken long ago as public key sche (Score:1)
Nobody uses RSA to encrypt multi-megabyte files anyway. Traditionally you use a public key algorythim to encrypt a session key (realistically no bigger than 32 bytes or so), and then use the session key to encrypt the message with a well known and tested symmetric algorythim (like 3Des, Blowfish, IDEA, etc).
Re:CP Algorithm broken long ago as public key sche (Score:2)
Re:CP Algorithm broken long ago as public key sche (Score:1)
It's not even a new update to old news.
Rock'em Sockem (Score:2, Funny)
You know this is a really cool little deal. What is really going to be pretty neat is when you can set up rock'em socke'em robots.
With lasers on them to plug into your computer though a wireless network work. Then play with them though a head mounted camera! -- Opss wait that is Quake.
Re:Up yours (Score:1)
I think you need a little anger management. #1, it was strapping the laser to the head of the robot, which is controlled by the computer. Hence the quake.....You know robot like men running rouand on your computer with lasers shooting at each other. #2 Breath good air in, Breath bad air out, no hum a C# note and think "life is good". Maybe that will help.
Laser tag? (Score:2, Informative)
This page is being modified, Sorry about that -
come back later and we should have the
changes completed. Please Click your
browser's "Back" Button.
Thank You!
Heh. I guess maybe they're trying to add it, or trying to keep from getting slashdotted too badly?
16 y.o. are as flawed as the rest of us (Score:1, Redundant)
that if you know the public key and one encrypted
message then you can break it.
Sarah Flannery (Score:2, Interesting)
I'm confused... (Score:1)
Re:I'm confused... (Score:1)
1) She was comparing at 200 digit length moduli. This is slightly smaller than one would want to use for long term security (10^200 is somewhere around 2^640, as opposed to recommended key lengths of 1024 or 2048) As a point of reference, it's generally assumed NSA can factor 512 bit keys fairly readily.
2) Moreover, trying to bruteforce crack even 2^512 is a ridiculous endeavor. Essentially, imagine having a
Brute force really only works well with symetric ciphers (DES, triple DES, RC5, AES, etc. [and even then, more 'elegant' attacks such as differential cryptoanalysis are more potent in some cases]); with public keys, there are typically more efficient was to attack (Pollard's Rho, Number Field Seives, etc.)
3) There is already an attack against the algorithm; see the postscript of the article.
Re:I'm confused... (Score:2)
No, it was not. (Score:1)
Anyway - factor of 20 is negligible when we I talking about attacks - but not negligible, when we are talking about usage.
Re:I'm confused... (Score:1)
Thoughts on the Cayley-Purser Algorithm (Score:5, Funny)
What I find most interesting is the use of an inverse posiform discombobulator to repel sophisticated man in the middle attacks. Combined with the infix digestive emulator, this will be a key component in the "Digital Nervous System" of the future.
Superficially, the Algorithm appears similary to the Bosun-Smee cipher which has been shown to be vulnerable to chosen plaintext attacks when not run in output feedback mode. Personally I think an approach based on a 4x4 Holmes-Longpole network would have been a preferable starting point, but this would be more vulnerable to differential polyp-cystizing cryptanalyis. This can (theoretically) be compensated for by a field-coit gestation transform, but no one is quite sure how to overcome the slow encryption speed of such a system.
All in all it's a fairly interesting approach and I intend to study it further. I'd love to hear anyone elses opinion though.
--Shoeboy
Bull! (Score:3, Funny)
The right approach is to decompress ontlogogical entropism. You have to do this, or all you're left with is a lot of noise!
Re:Bull! (Score:1)
This is not necessarily the case. If, as cited most notably by Hans Durghstein, we were to apply a series of semi-ontological entropy matrices to the decompression algorithm, we could effectively increase the speed of the retrograde inverses before they're due to be transposed!
We musn't forget our history, gentlemen.
Re:Bull! (Score:1)
spaniard: I see you are using Rosettie's Defence...
man in black: Naturaly, I find it good considering the rocky terain.
spaniard: You must expect me to counter with Capapelle.
man in black: Of course, but I find that Tibult cancels out Capapelle, Don't you?
spaniard: Unless your enemy has studied his Agrippa, which I have!
Re: Thoughts on the Cayley-Purser Algorith and Bul (Score:3, Funny)
Everyone-- me, the old lady next door, the kid down the street, the dog-- knows that field-coit gestation transforms and ontological decompression over a finite field are about as secure as a tipsy girl's chastity on prom night. Field-coit, when push comes to shove, is hardly more than a complex-- but certainly tractable-- hex-stacked XORing from an arbitrary (but by no means random) set of figures of undefined length. And ontological demopression?!? Christalmighty! Not only is it slow (maybe you can wait 1345 months to encrypt "The Old Man in the Sea", but I myself have a wife and dog to feed), but you actually end up with LESS entropy than using, say, triple-DES with unique keys-- which also has the tiny-tiny-twee little advantage of not taking 112 YEARS!!!
This is what I hate about this ENTIRE FIELD: Some gintch in Ireland comes up with a cute (if entirely infeasable)cryptosystem (which, I might add, she has already aknowledged and published the weaknesses of!), and then I have to listen to every blowhard from here to Katamandu go off about how great field-coit and ontological decompression are. Christ, it's wors than talking about laptops with Mac-Addicts!
Some days, I'd rather be flipping burgers.
Re:Thoughts on the Cayley-Purser Algorithm (Score:1, Offtopic)
Re:Thoughts on the Cayley-Purser Algorithm (Score:1)
That seems to be the Star Trek equivalent of "turn it off and back on again".
Re:Thoughts on the Cayley-Purser Algorithm (Score:1)
Re:Thoughts on the Cayley-Purser Algorithm (Score:2)
All in all it's a fairly interesting approach and I intend to study it further.
You're not fooling anyone, Shoeboy! "Intend to study it further" my foot, you're lusting after this poor girl, admit it! What will Heidi say??
Re:Thoughts on the Cayley-Purser Algorithm (Score:2)
Re:Thoughts on the Cayley-Purser Algorithm (Score:1)
Come on !
This is Slashdot!
You're meant to understand stuff like this!
Re:Thoughts on the Cayley-Purser Algorithm (Score:2)
(or does no-one else know of that fine game?)
;-)
That's easily avoided however (Score:1)
Re:Let's hope C-P is secure (Score:1)
--
TBBle
desktop rover (Score:5, Interesting)
Many of the most useful little devices started as toys. For instance the Aztec and Inca civilizations had wheels on their childrens toys but not on their wagons and carts.
This little toy, or at least the model of a cheap travelling rover based on existing tech, could lead to cheaply revolutionized communications in cities and other compact spaces, such as aircraft carriers, etc.
Using these devices as messengers would cut down on traffic and save gasoline and car-use resources in many cities.
It sounds weird to us not because it's scientifically or fiscally implausible but because we are involved in a car culture.
Re:desktop rover (Score:2, Funny)
Not true! Personally, I'm involved in a cdr culture. I'm always chasing some tail....
Re: (Score:2)
Re:desktop rover (Score:1)
Yeah, and always on the positive edge....
Re:desktop rover (Score:1)
It says it's broken itself... (Score:2)
It isn't just 16 year old girls that can crack... (Score:5, Funny)
Re:It isn't just 16 year old girls that can crack. (Score:1, Redundant)
Of course we're not! Can you imagine a beowulf cluster of those things?!
Re:It isn't just 16 year old girls that can crack. (Score:1)
Re:It isn't just 16 year old girls that can crack. (Score:2)
Re:It isn't just 16 year old girls that can crack. (Score:1)
Reminds me of Rainman... (Score:3, Funny)
You're counting cards?
We're counting cards....
Uhh...huh...
Re:It isn't just 16 year old girls that can crack. (Score:2)
Re:It isn't just 16 year old girls that can crack. (Score:1)
Re:It isn't just 16 year old girls that can crack. (Score:1)
Wow... (Score:1)
Re:It isn't just 16 year old girls that can crack. (Score:2)
feature/bug with CP alg (Score:2, Interesting)
Is it a feature or a bug? what's the difference?
FYI (Score:2, Informative)
Re:FYI (Score:1)
There must be troll in what I write. -- Henrik Ibsen
the lazer game (Score:2)
Cayley-Purser algorithm (Score:3, Funny)
Re:Cayley-Purser algorithm (Score:1)
RagManX
partially Uninformed thoughts on the cpa (Score:1)
I just skimmed over the paper, but her algorithm seems a lot like RSA except that she encrypts/decrypts with pre computed matricies instead of exponentiations. There are some easy ways to speed exponentiation up when doing it modulo... I wonder if she took that into account when comparing.
It appears that the matricies that are used as keys instead of the normal RSA keys are the cause of the crack. They give too much extra info to a possible attacker.
I want to look this over better when I have more time, it's pretty interesting. God knows I didn't understand RSA that well when I was 16.
garc
Big Mouth Billy (Score:2)
Of course, that would probably get old really fast, just like the standard sample. Plus, no one really wants to hear Linus say the same thing every day (except maybe his kids, who want to hear the "scary module under the bed" story every night).
I'd really like to replace the current sample with the Talking Heads cover of the same song. Much better. Maybe give Big Mouth Billy a Big David Byrne Suit too.
Re:Big Mouth Billy (Score:2)
Make it worth the time and trouble. Go with the original--Al Green.
Re:Big Mouth Billy (Score:1)
Re:Big Mouth Billy (Score:2)
Re:Big Mouth Billy (Score:1)
Oh yeah there are two other quotes I plan to post as movies on the Hacking Billy Bass website [here-n-there.com].
And of course I have costumes for these quotes. A Barbie scalp for the former, baby sunglasses for the latter.
More sound bite or song suggestions would be appreciated... it's pretty easy to make the Bass say a given phrase. It takes about 10 minutes to transcribe a saying.Desk Rover + X10 Camera = Fun? (Score:1)
Re:Desk Rover + X10 Camera = Fun? (Score:2, Informative)
Re:Desk Rover + X10 Camera = Fun? (Score:1)
Its amazing how much that company is shoving advertising down the throats of internet users.
A chick that can break RSA? (Score:1, Funny)
C-P algorithm (Score:2)
who knows a lot about encryption can answer.
The paper claims there are two lines of attack:
1. B={(AC)^-1}*C
2. G=C^r
For the first attack to be hard we need to
pick p and q carefully. Does this restriction
affect the ease of the second attack?
Also, this negligible probability that the first
attack will be easy seems to have a PR disaster
written all over it. Does RSA have similar
probability issues?
corel linux name? (Score:1)
Sarah Flannery (Score:1)
--
Dave
Re:Sarah Flannery (Score:2, Interesting)
Furthermore, I think the father is right. Most children who get lots of money and or achieve lasting celebrity while they are still children have messed-up lives. I totally agree with the father's decision. Besides, smart as she is, she will most likely make money later in life if that is what she actually wants to do.
MM
--
Re:Sarah Flannery (Score:2)
She is profiting massively from it, in Irish terms, not [insert derogatory term for materialistic rest of world] terms - lots of people who matter know her name, and know she's smart. In Ireland, reputation tends to be much more important than money.
Re:Sarah Flannery (Score:1)
"Her father's just saving her from Evil Consumerist Brainwashing"So why'd he let her do the TV advertisement for a newspaper? TV is the tool of choice for any budding Evil Consumerist Brainwasher.
Re:Sarah Flannery (Score:2)
Now that the economy's slowing down to saner levels, thanks to it's intimate dependence on currently recessional high-tech industries, there's been a bit of a media backlash against the nouveaux riches, at least in a goodly proportion of newspapers. Depends on what circles you move in, of course.
I'm pretty confident her father didn't develop the algorithm, based on experience with other teacher's children here - the teacher's children tend to be the ones who are treated most harshly by the teachers themselves, often having to do at least 2x amount of work for same levels of recognition. I would say that she was motivated to work extra hard and do something outstanding because her father would have been much harder to please - and children tend to automatically want to please their parents (At least until the parent falls from grace by some demonstration of fallibility).
Re:Sarah Flannery (Score:1)
If she did develop it by herself, I would have thought her father would be proud enough to allow her to profit from it. "Profit" doesn't necessarily relate to money or material goods.
Re:Sarah Flannery (Score:1)
Re:Sarah Flannery (Score:2)
Most people I know consider their reputation and their family more important than material wealth. A significant proportion still think that the peculiarly Irish brand of catholicism is more important (although I disagree, being an atheist).
I live Dublin, avoid coffee (because I went cold turkey and went through two days of blinding withdrawal headaches - either drink lots of coffee or drink none - In between is painful!), watch anime, and talk about sports.
I wouldn't consider an interest in sport to be exactly materialistic - in fact, athletic prowess is one of those "other than money" things that people hold in high esteem, along with artistic/creative talent and writing ability.
I certainly didn't say we were a third world country. We haven't been since the 1980s
A disdain for the glorification of capital gain above all else does not mean that one automatically poor, just that one realises that there's more to life. This is an attitude I have picked up from a fair proportion of people I know here in Ireland (and Australia), to a lesser extent in Britain, and much more rarely from Americans, whether they be rich or poor.
The thing is, property and material wealth are much more solid concepts in other cultures - in early Ireland, there was a concept of ownership, but it was transient. People were always stealing eachothers cows, lands, etc. It kept them occupied and made for interesting sagas.
The Irish language doesn't have a verb "To Have", you say "It is with me" - "Tá sé agam". This kindof expresses the transience of the situation of ownership in the Irish psyche, which still persists today, despite British and the current American cultural imperialism.
Re:Sarah Flannery (Score:1)
Re:Sarah Flannery (Score:1)
Laser Tag... IrDA? (Score:2)
Could one hack it to be a remote IrDA port? maybe be used as a second remote control for your TV? There must be some super-cool use for a radio controlled remote control...
At least you'd never lose it!!