1996-07-07 - Re: NYT/CyberTimes on CWD article

Header Data

From: norm@netcom.com (Norman Hardy)
To: cypherpunks@toad.com
Message Hash: 431955e18d60b8154835423557d40286cba2596395170b54b362b5662bde5ba4
Message ID: <ae049d8601021004b2d9@DialupEudora>
Reply To: N/A
UTC Datetime: 1996-07-07 00:52:53 UTC
Raw Date: Sun, 7 Jul 1996 08:52:53 +0800

Raw message

From: norm@netcom.com (Norman Hardy)
Date: Sun, 7 Jul 1996 08:52:53 +0800
To: cypherpunks@toad.com
Subject: Re: NYT/CyberTimes on CWD article
Message-ID: <ae049d8601021004b2d9@DialupEudora>
MIME-Version: 1.0
Content-Type: text/plain


At 9:17 AM 7/6/96, Declan McCullagh wrote:
>"We are writers, not crytographers."
>
>-Declan
....
This seems to be an application for Bloom filters.
See page bottom of page 561 in Knuth's "Searching and Sorting", First Edition.
(Vol 3 of Art of Computer Programming)

With a Bloom filter you can hide which URLs you reject yet quickly rejecting
particular URLs.

Compute SHA(URL) yielding 160 bits. Divide that into 16 ten bit quantities
b[i], for 0<=i< 10.
Reject the access if P[b[i]] = 1 for each i. P is an array of 1024 bits
computed by someone
with the index prohibitorum. (pardon my Latin)

Yes, this excludes 1/1024 "falsely accused" URLs, but you get the idea.







Thread