Re: not yet done

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I think it would actually likely be harder, since modern ciphers like 
RIJNDAEL are designed in such ways to make their output look like a 
random data, I once saw an analogy, that if you want to have a random 
number generator as a programmer, you can use a stream cypher and push 
zeroes to it, which could yield bytes of a homogenous random 
distribution. So in other words, the binary path from encrypted text to 
the original is a set of modifications long like the original data, so 
in other words, it would be like trying to guess a key big like a file, 
which is unimaginable using brute force.

This is one of the reasons I'm in such a deep love with mathematics, the 
way it protects blockchains for example. Human laws and principles, 
including those regarding finances, are just words, they apply only as 
long as the authorities are willing to stick with them, which can break 
any time and even if it does not, various individuals always find ways 
around to push through malicious intentions.

Blockchain, on the other hand, as long as there are enough people on 
board, is impenetrable, you can bribe, cheat, seize, deceive, sue, 
force, intimidate people, institutions, or even countries, but 
mathematics doesn't care.

Best regards

Rastislav

Dňa 11. 2. 2024 o 14:25 'Kyle' via blinux-list@xxxxxxxxxx napísal(a):
> I could be wrong, but I believe the reason something like this hasn't
> been and probably cannot be done is because it is possible to patch a
> file to match the checksum, but there are multiple combinations,
> especially on large files, that can produce the same checksum. There is
> also the problem of the infinite number of combinations, one of which
> would have to hit just right to make something that will match. You
> would have to find the exact bytes that will match the entire file, and
> that could take anywhere from an hour to a million years to find the one
> that hits just right. It wouldn't be as tough as breaking strong
> encryption, but it is very difficult for commercial-grade computers. I
> think a quantum computer can do it, but those are not widely available
> in 2024. Even today's AI cannot produce a binary identical file whose
> copy is broken in some way without having the original file for
> comparison. And if you have the original file, you may as well just
> recopy it to replace the broken version.
>
> ~Kyle
>
> --
> You received this message because you are subscribed to the Google Groups "blinux-list@xxxxxxxxxx" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to blinux-list+unsubscribe@xxxxxxxxxx.
>

-- 
You received this message because you are subscribed to the Google Groups "blinux-list@xxxxxxxxxx" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blinux-list+unsubscribe@xxxxxxxxxx.





[Index of Archives]     [Linux Speakup]     [Fedora]     [Linux Kernel]     [Yosemite News]     [Big List of Linux Books]