From: cme@ellisun.sw.stratus.com (Carl Ellison)
To: cypherpunks@toad.com
Message Hash: 1246dc08f6837863596c755b07395042aa9a3f3d97e688065bdb405e9382f823
Message ID: <9308211614.AA07811@ellisun.sw.stratus.com>
Reply To: N/A
UTC Datetime: 1993-08-21 14:02:24 UTC
Raw Date: Sat, 21 Aug 93 07:02:24 PDT
From: cme@ellisun.sw.stratus.com (Carl Ellison)
Date: Sat, 21 Aug 93 07:02:24 PDT
To: cypherpunks@toad.com
Subject: Re: genetic algorithms for crypto analysis
Message-ID: <9308211614.AA07811@ellisun.sw.stratus.com>
MIME-Version: 1.0
Content-Type: text/plain
The problem I see for finding spikes is that this is still a brute force
approach. The advantage that biological populations have is in growing
new test processors exponentially, so that there is a chance to
attack something which is merely exponential.
An algorithm or breaking method which helps against modern cryptosystems
would have to turn the spikes into gentle hills by some sort of mapping of
the problem space. Biological attack machines would still run up against
limits (e.g., the amoung of carbon in the solar system), so we have to spread
the spikes. In fact, we have to spread them over the whole space since
enlargement of the key space can take a gentle but limited-width hill
and make it look/act like a spike.
Return to August 1993
Return to “cme@ellisun.sw.stratus.com (Carl Ellison)”
1993-08-21 (Sat, 21 Aug 93 07:02:24 PDT) - Re: genetic algorithms for crypto analysis - cme@ellisun.sw.stratus.com (Carl Ellison)