home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.math
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!sgiblab!zaphod.mps.ohio-state.edu!cis.ohio-state.edu!news.sei.cmu.edu!fs7.ece.cmu.edu!crabapple.srv.cs.cmu.edu!asp
- From: asp+@cs.cmu.edu (James Aspnes)
- Subject: Re: ok, i'll bite.
- Message-ID: <BxtvDG.Jr7.1@cs.cmu.edu>
- Sender: news@cs.cmu.edu (Usenet News System)
- Nntp-Posting-Host: mixo.soar.cs.cmu.edu
- Organization: School of Computer Science, Carnegie Mellon
- References: <92320.214859RVESTERM@vma.cc.nd.edu>
- Date: Mon, 16 Nov 1992 21:22:23 GMT
- Lines: 19
-
- In article <92320.214859RVESTERM@vma.cc.nd.edu> RVESTERM@vma.cc.nd.edu writes:
- >i understand "cryptography". i understand "np". someone please
- >explain the connection.
-
- If you can solve any problem in NP, and you have a polynomial-time test for
- whether a string could be a message, you can decrypt messages encrypted with
- any efficient (small keys, small description of algorithm, algorithm is fast)
- algorithm as follows:
-
- 1. Guess the key and the algorithm (this is where non-determinism comes in).
- 2. Decrypt the message according to the key/algorithm you have guessed.
- 3. Test to see if the result is a plausible message.
-
- The only tricky part is the test for plausibility, since you don't want it to
- answer yes too often. For public-key systems the test is straightforward; you
- encrypt the alleged decryption using the public key and see if it matches.
- For private-key systems you have to know something about the space of possible
- messages (e.g. that they are ASCII English-language text followed by a 64-bit
- CRC checksum :-]), but in practice this shouldn't be much of a problem.
-