1994-06-17 - Computational Complexity

Header Data

From: mpd@netcom.com (Mike Duvos)
To: cypherpunks@toad.com
Message Hash: d8dcdd3eb90b7f0b099f9d30c32265c8fad4394278b7e61aeb16554d0c82c4f2
Message ID: <199406172149.OAA16165@netcom10.netcom.com>
Reply To: N/A
UTC Datetime: 1994-06-17 21:49:50 UTC
Raw Date: Fri, 17 Jun 94 14:49:50 PDT

Raw message

From: mpd@netcom.com (Mike Duvos)
Date: Fri, 17 Jun 94 14:49:50 PDT
To: cypherpunks@toad.com
Subject: Computational Complexity
Message-ID: <199406172149.OAA16165@netcom10.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


Perry E. Metzger writes:

 > Ahem. He was proposing a mechanism that will work in log(n)
 > time. All current known methods are subexponential. As you
 > SHOULD know, a log function will eventually be smaller than
 > a subexponential one if you only let N grow large enough.
 > This is baby complexity theory. I find it astonishing that I
 > should even have to mention it.

As I read it, he simply asked (and quite nicely at that) if such
a algorithm might exist, and asked if there were any references
to it in the literature.  Now clearly he was hoping that such a
mechanism might offer the opportunity to binary search the key
space efficiently and perhaps those hopes were misplaced, but I
don't think the idea was so off the wall as to be deserving of
the ridicule you heaped upon it.  Far weirder things have been
proposed on this list.

 > Thats not what he was proposing. Obviously one can build
 > such an algorithm given a factoring algorithm, and we know
 > of exponential factoring algorithms. That wasn't the idea.
 > His notion was that there might be a CHEAP algorithm to do
 > this.

I think the key word here is "might."  Hope springs eternal, even
in cryptology. :)

-- 
     Mike Duvos         $    PGP 2.6 Public Key available     $
     mpd@netcom.com     $    via Finger.                      $




Thread