Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Unbreakable Cryptography in 5 Minutes (acm.org)
9 points by bpolania on Feb 10, 2013 | hide | past | favorite | 16 comments



Wow! Does this say that as long as key generation, key distribution, and message authentication are trivial, unbreakable cryptography is a cinch? What a shock, here I thought that all those billions of dollars of research and thousands upon thousands of man-hours devoted to the development of secure communications throughout the last three-thousand years meant that this is a difficult problem. Had all those people simply read this article, we wouldn't have had any sort of issue whatsoever...

Not only are the three problems I mentioned above the most serious open issues in cryptography, but the actual encryption of information might be the least difficult. As long as they are implemented correctly, and no one has some quantum or otherwise impossibly powerful computer lying around someplace that no one knows about (or has solved the Riemann Conjecture), then RSA, El Gamal, AES (w/ proper mode), Blowfish (ditto), and numerous others are unbreakable as well. In fact, with the lack of restrictions the author includes for what constitutes "unbreakable" cryptography, a one-time pad will also work just as well.

And yes, I do realize he gives mention to this at the bottom of the article, but it's still hilarious to title this "unbreakable" cryptography.


I agree that this is a really poor article, but the point underneath is that the OTP really is provably unbreakable given infinite resources. That can't be said of any of the others you mention.

I think your level of scorn is justified, but the target is misplaced, and your tone is unconstructive.


I'll agree I could be a little less demeaning. The point is though that cryptography more then anything else is about its practicality, and so by ignoring the difficult parts of it you render any statement you make pointless. Also, although you are correct about noting that under infinite resources RSA et al is breakable, again, practicality. If it takes longer then the previous amount of time elapsed in the universe to break (assuming proper implementation etc.) then it is, for all intents and purposes, unbreakable.


Do you think that in an article aimed at students that's the right place to start? Side-channel attacks, timing attacks, differential analysis, weaknesses in key exchange, why padding is necessary, biases in pseudo-random number generation, etc, etc, etc ...

Or is it better to start with what crypto is, with key generation, encryption, decryption, then move on into the first level of complexity?


For what it's worth, practical secure cryptosystems only exist under a number of assumptions that, thus far, have no proof. Commonly used public-key systems are in an even more precarious position: even if P!=NP, the RSA and discrete logarithm problems may still be computationally feasible (and thus RSA, Diffie-Hellman, and ElGamal would be insecure). Cryptography based on NP-hard problems is possible (e.g. Atjai's lattice system), but these remain research topics and have seen little real-world use.

The point is this: there is a lot we do not know about cryptography.


XRDS Crossroads is a magazine blog for students, the article presents an actual topic explained for those interested, I think it targets an important part of Hacker News demography and it makes an excellent job in encouraging students to go ahead and develop their own crytographic solution, so I don't know what are you so angry about the article


I'm a student myself. Funny enough, some of us are actually intelligent and can handle complexity. To me, this is the equivalent of teaching military science by telling someone how to shoot a gun. Instead of trying to introduce someone into the field by showing them what questions the field is actually trying solve, you're introducing them into the field by showing them the small subset which those who have no interest in it assume constitutes the entirety of it.

How many mathematicians do you thing have read an article on cryptography, gotten really interested in it, and then realized the most important open question in it revolves around the computer equivalent of spotting a fake ID?


The article explains an implementation of a Vernam Cipher, it's not intended to solve the most important questions in cryptography.

I don't understand how "introduce someone into the field by showing them what questions the field is actually trying solve" could do any good, it's like saying that the first subject in Physics 101 should be the unified field theory instead of Newtonian physics.


"the most important open question in it revolves around the computer equivalent of spotting a fake ID"

I am pretty sure the most important open question in cryptography is whether or not one-way functions exist...


I agree partially and really this wouldn't be a bad article at all if it wasn't for the link-bait title they used.


This article is very poorly written. Few things: author even did not mention the common name "one-time pad" for the technique he explained. one-time pad(OTP) uses the key same length as the data. the key has to come from a true random source that is resistant to side-channel attacks. key transport/exchange is a big issue.

Diffie–Hellman key exchange uses keys shorter than message length using prime field arithmetic. DH key exchange is not really paired with OTP. So author tossing the name of DH key exchange is odd. Good intro about OTP and DH Key exchange is here: http://en.wikipedia.org/wiki/One-time_pad http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exch...


A requirement for a One Time Pad is that the key stream be generated from true random numbers. Computerized number generators are pseudorandom number generators. Even cryptographically secure pseudorandom number generators are not true random numbers.

This article describes some of the requirements for a One Time Pad, but its failure to account for the strict requirements of the definition leave us with something that is not provably "unbreakable."


Why have you lunk to comment 116? Why have you not submitted a link to the article itself? Am I missing something?


Not sure why that happens, I think is an issue with page itself since the link points to the general article.


It does now - it's been fixed. It did have the "#" and comment number at the end. If you check it out here you'll find the original submission pointed at the comment:

http://www.hnsearch.com/search#request/all&q=title%3Aunb...


This is still susceptible to timing attacks, for example. http://codahale.com/a-lesson-in-timing-attacks/




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: