log☇︎
297000+ entries in 0.194s
shinohai: http://btcbase.org/log/2016-06-01#1474857 <<< The sarcasm of "absolutely genuine" was lost on asciilifeform perhaps. ☝︎
asciilifeform: ah that was it.
phf: asciilifeform: yeah, it's in backlog, i need to make a case-insensitive version of KMP
mircea_popescu: https://oeis.org/A105165 << turns out it's actually pretty famous. famous enough for its own strings in the oeis.
mircea_popescu: writing a cannonizer and an algebraic operator on this shouldn't be impossible.
asciilifeform: if you die 'of old age', the medical racket gets it
mircea_popescu: getting back to base phi : two machine words together, 64 bit each, encode a huge chunk of cannonical phinary numbers ; and the machine wouldn't even have to know that's what it's doing.
BingoBoingo: <mircea_popescu> the life policy carries a stated beneficiary << AHAHAHAHAHAHAHAHAHAHHAHAHAHAHAHHAHAHAHHA Welcome to USSA. Beneficiary gets life insurance policy if they took it out on deceased themselves, but otherwise in USistani brokeness many times must first pass "DOes estate have expenses test"
mircea_popescu: in the case here, you determine it from its notation.
mircea_popescu: there seems to me there's a field to graze upon here ; without any such sillyness as "basis is cipher"
mircea_popescu: i dunno the whole thing. the observation however stands that just as there's a way to verify a number ISNT irrational, by the same way in the same manner for the same reason the reverse can also be verified. and there are indeed very hard (as it is the case here, harder than np-complete) problems to do with such numbers, arbitrarily chosen.
deedbot: [Qntra] Bespoke Windows Exploit On The Market - http://qntra.net/2016/06/bespoke-windows-exploit-on-the-market/
asciilifeform: let's have the whole thing then..?
asciilifeform: mircea_popescu: this is more in the 'arab caesar cipher' vein, of cheating self.
asciilifeform: because it is actually not so hard to find, in polynomial time, that 3.1462643699419726 =~ sqrt(2)+sqrt(3).
mircea_popescu: admittedly my thinking being that it's time to stop trying to be clever and "cheat", seeing how the only cheated to date is self.
asciilifeform: this is a pistol that shoots out the wrong end. the only one it makes life harder for is the user.
asciilifeform: e.g., the symbol sqrt(2).
mircea_popescu: it doesn't seem there;s going to be so much cheating here.
mircea_popescu: yes, but as long as the notation is in an irrational base,
asciilifeform: just like how i can't go to my shop and machine a platonic solid.
asciilifeform: except that we don't have machines that work on real numbers.
a111: Logged on 2016-02-10 01:34 mircea_popescu: or to get back to exponential space problems : "decide first order logic propositions with real numbers, adition and comparison" is a very hard problem.
asciilifeform: how is this even possible.
asciilifeform: i had to grep own l0gz
asciilifeform: ^ ought to have found the old l0gz
mircea_popescu: we went through a bunch of examples in one sitting, but i'm not finding it nao
mircea_popescu: nono, we were discussing hard problems and i pointed out the russian guy with the addition
asciilifeform: this has ~nothing to do with provably placing transform's inversion into a complexity class.
asciilifeform: i recall there was thread where mircea_popescu suggested the use of nonstandard bases to frustrate enemy per 'specificity of diddling' principle.
asciilifeform: and what of this ?
mircea_popescu: wouldn't this fit the more useful later definition ?
mircea_popescu: but now take something like... an irrational numeration base. take for instance something like (1+sqrt(5))/2, which is... practically binary!
asciilifeform: poor specification (and moreover deceitful sleigh-of-hand from the usual suspects) is bad for crypto.
mircea_popescu: asciilifeform so here's what i'm thinking : obviously the equivocation between "NP hard" in the sense of "it is not proven this set is empty of NP hard edges" and NP hard in the sense of "this set CONSISTS of NP-hard elements" is bad for crypto.
a111: Logged on 2014-06-11 00:49 asciilifeform: 'At some point during this period, however, I realized that the entire problem was a complete and utter pseudo-problem. ... So I am very confident that neither of these techniques, neither mine nor Sacco and Vanzetti's, has ever been used in practice. There is no need for them, there has never been any need for them, and there will never be any need for them. And this was quite obvious in 1993.'
a111: Logged on 2014-06-11 00:49 asciilifeform: 'My Navrozov moment, of course, was when I approached one of the two - Sacco, I think - and attempted to have an intellectual discussion of this realization. The story is basically the same as Navrozov's, so it would be boring to repeat, but basically I came away with the feeling that I'd told someone his Sicilian grandmother liked to get drunk and fuck her own goats.'
a111: Logged on 2014-06-11 00:49 asciilifeform: 'Which, in fact, I had. Because I'd essentially told him his research was fraudulent. The fact that my research was also fraudulent, and that neither of ours was particularly noteworthy in that regard, did not matter. And why should it? Others' crimes cannot excuse your own.'
a111: Logged on 2014-06-11 00:48 asciilifeform: 'Sacco and Vanzetti came up with an entirely different solution to the slow-MMU problem, one which if I do say so myself was less imaginative than mine, but both more general and more practical. They published theirs in a real conference, received much acclaim for it, and I believe patented it, started a so-called company and eventually sold it to Microsoft.'
asciilifeform: see also the canonical >>> http://btcbase.org/log/2014-06-11#712426 ☝︎
asciilifeform: dunno. but that was the response.
mircea_popescu: what's the candy bar to do
asciilifeform: it is in the l0gz somewhere
asciilifeform: got the ENTIRELY unsurprising 'what, you're a martian?' stare back.
asciilifeform: btw when i went down into the snakepit with several dozen renowned 'cryptographers' earlier this year, i asked a few folks about this. ☟︎
asciilifeform: that's the basic boojum of crypto as practiced by extant 'cryptographers'.
asciilifeform: sure. but my inability to do so says NOTHING about its hardness. only about how MY PARTICULAR hands grow out from my arse.
mircea_popescu: fine, state it like this : when someone proposes a hash, see if you can find a y for which the reverse is trivial.
asciilifeform: 'aes is hard to break' 'says who' 'says me, i haven't broken it yet' ☟︎
asciilifeform: it is 100% exactly the same case as in symmetric cipherdom.
asciilifeform: and point of thread was 'no one has shown with any degree of rigour whatsoever, ~how~ hard' ☟︎
asciilifeform: whole notion of hash is that 'do the inverse' is hard.
mircea_popescu: yes, but if one proposes a f, doing the inverse just to see what happens is a good approach.
asciilifeform: nor any path to the f.
asciilifeform: we haven't the f.
asciilifeform: mircea_popescu: this is quite like those 1980s papers about star drives
mircea_popescu: yeah, /me drops this point
Framedragger: s/you claim that/you claim that he claims that/
Framedragger: mircea_popescu: this is super unimportant but under your analysis, he says that 2 is safer than 1. you claim that 1 is safer than 2. should be inverted, methinks. (the "(less safe)" refers to 1, not to 2.)
mircea_popescu: For any function f, the existence of a (randomized) non-adaptive reduction of NP to the task of average-case inverting f implies that coNP ⊆ AM.
mircea_popescu: If given y one can efficiently compute |f^-1(y)| then the existence of a (randomized) reduction of NP to the task of inverting f implies that coNP ⊆ AM. Thus, it follows that such reductions cannot exist unless coNP ⊆ AM.
mircea_popescu: We consider the possibility of basing one-way functions on NP-Hardness; that is, we study possible reductions from a worst-case decision problem to the task of average-case inverting a polynomial-time computable function f. Our main findings are the following two negative results:
asciilifeform: in other nyooz, jp about to drop $100B of printolade.
mircea_popescu: "She does stink and she should quit. But I don't want it to be because of me. It should be the traditional route; years of rejections and failures till she's spit out the bottom of the porn industry." ☟︎
mircea_popescu: or, to quote seinfeld,
mircea_popescu: http://btcbase.org/log/2016-06-01#1474486 << i'm the worst killer in history ;/ ☝︎
mircea_popescu: they're still dead, irrespective how inconvenient that may turn out to be!
asciilifeform: lose the books, lose 0 stupidity, and ~all shit worth actually knowing.
mircea_popescu: marx needs a name like my turds need individual id papers.
a111: Logged on 2016-06-01 14:36 asciilifeform: or what, the incas read marx and lenin before building their kolhoz ?
mircea_popescu: Framedragger : he says : "1. Assume no X exists for F-ing any A's with b ; 2. Assume no X exists for F-ing all A's with b ; 1 is safer than 2." and he is wrong.
mircea_popescu: well, you could consider pair-of-primes as the key.
asciilifeform: (raw n-bit string that hasn't been fed to nextprime() nor the other tests, is not a key!)
asciilifeform: and the work required to break each.
asciilifeform: keyspace is the space of all possible ~actual keys we might end up with~ at the end of proper key generation.
asciilifeform: that isn't the keyspace.
mircea_popescu: point reimains, quite far from "flat keyspace" in this particular sense.
asciilifeform: (in the sense that K possible bitstrings could end up at the given nextprime())
asciilifeform: a clearer approach would be to state this in terms of how many bits of entropy, such that is used in generating key, are de facto discarded by the nextprime() op.
mircea_popescu: asciilifeform distinct prime pairs that make a 4kb key
Framedragger: "was a terrible answer tho)" (fuckin irc)
mircea_popescu: are there more than possible combinations of 6 character passwords ?
Framedragger: hm. *this* (i.e.: that "no polynomial-time algorithm exists for factoring the product of two random n-bit primes with some good probability") *is* less safe as compared to the safer assumption that "no polynomial-time algorithm exists for always factoring all products of two random n-bit primes". this is a much safer assumption cf. to the one you interpreted it to mean, no? (no baiting this time - just honestly confused). but eh, may
mircea_popescu: let's quantify this hell of a lot together.
a111: 1 results for "prime number theorem", http://btcbase.org/log-search?q=prime%20number%20theorem
asciilifeform: $s prime number theorem
mircea_popescu: asciilifeform the even more hilarious bit is that there just aren't THAT MANY primes to make different keys of a specified size.
asciilifeform: ^ the hilarious bit is that we are smashing 'randomly selected n-bit primes' every day now
mircea_popescu: Framedragger it should have read " This is very different (less safe) from assuming that no polynomial-time algorithm exists for any factoring of any products of two random n-bit primes."
asciilifeform: (an no this has not been done for any extant system other than otp)
asciilifeform: if you could prove what is called 'flat keyspace', you can work as if every key you select requires same work to break.
Framedragger: i don't think 'c)' obtains? no mix-up there. otherwise, sure, blergh re. a) and b)
mircea_popescu: but yes, what he's trying to copy was originally correct : the problem with cryptosystems is that even if they "reference" an actual hard problem, they don't get to stand in for the fucking problem itself! they pick a case, and we've no good hardness measurers for mere cases.
asciilifeform: i.e. problems np-complete in the general case, but very much p in ~every known instance.
asciilifeform: cases of folks stepping on this caltrop abound
mircea_popescu: "Note the "random instances" part. For a concrete example, we might assume that no polynomial-time algorithm exists for factoring the product of two random n-bit primes with some good probability. This is very different (less safe) from assuming that no polynomial-time algorithm exists for always factoring all products of two random n-bit primes."
mircea_popescu: Framedragger chiefly, that it isn't. i posit that nothing good or useful can come of some kid at rutger's self importantly answering questions on a website because some 17 yo kid who thinks himself too cool for his ohio highschool asked a dumb question with the usual smattering of wikipedia his teachers usually A him for.
Framedragger: so wikipedia sux and sometimes you need to glance at it, the way a hasty businessman glances at a dubitable street food stand in a foreign city. sometimes the temporary "before pgp xamarin something" solution is to glance at that damn wikipedia. what of it
asciilifeform: i have been to where they juice the cobras.
mircea_popescu: so some officious schmuck wants me to read "the section on wikipedia" where a set of snakeoil salesmen discuss their imaginary snake oil properties ? the glbgbblglbvrhl!