Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Get ready to implement

Name: sage 2014-02-16 20:54

Name: Anonymous 2014-02-16 20:59

nice! thanks for sharing sage-kun

Name: Anonymous 2014-02-18 16:17

Page 9:
Point encoding is clear in both cases. To decode a point on an
Edwards curve with parameter d, one takes the y value and computes
Alternative encodings are used by existing software, and protocol
designers should be aware of this. Alternative encodings may be
useful if preexisting software is to be used without changes.


One takes the y value and computes what?

Name: Anonymous 2014-02-18 20:28

so who's up for a dc implementation?

Name: Anonymous 2014-02-19 9:39

elliptic curves

They're not playing around. This shit is impervious to Shor's algorithm. Implement it far and wide.

Name: Anonymous 2014-02-19 15:23

>>5
http://www.mathcs.richmond.edu/~jad/summerwork/ellipticcurvequantum.pdf That research is nearing 20 years old, but there's also http://arxiv.org/abs/quant-ph/0301141 which is more recent. I don't understand EC crypto myself beyond the basic idea, since I haven't read any actual papers dealing with it, so perhaps I'm wrong. Is Ladd's proposal a modification that is immune to the modified Shor's?

Of course, even if this stuff is only as good as existing crypto, it should be implemented. RSA is not above suspicion, but Caesar's wife must be.

Name: Anonymous 2014-02-19 15:33

>>3
Looks like a failed copy-paste from material referenced in http://www.ietf.org/mail-archive/web/cfrg/current/msg04015.html.

Point encoding is clear in both cases. To decode a point on an Edwards
curve with parameter d, one takes the y value and computes the
valuex^2, then takes the square root. Methods for taking the square
root are sadly highly prime-dependent, but [COHEN] contains a large
number of options.

(Perhaps nobody has raised the issue because they are intimidated by `Point encoding is clear'?)

Name: Anonymous 2014-02-19 15:55

Name: Anonymous 2014-02-19 21:27

>>7
There's really just three possibilities: the prime is 3 mod 4, or it is 5 mod 8, or it is 1 mod 8. In the first two cases there are efficient and deterministic algorithms for taking the square root; in the last case, there are somewhat efficient but non-deterministic algorithms.

Name: >>9 2014-02-19 22:01

Oh yes, and what I meant to say (and forgot) is that all of the Edwards curves listed in the above document are modulo a prime that is either 3 mod 4 or 5 mod 8.

Name: Anonymous 2014-02-19 23:41

The NSA supports elliptic curves though.

Name: Anonymous 2014-02-20 0:59

>>11
That probably means EC isn't perfect, but the links posted already show it's vulnerable to a version of Shor's, so we already know that. I know I'm being foolishly optimistic, but what if that they're just saying ``Yeah, what you're using now is backdoor'd as fuck, but since we've been propping up D-Wave to build fake chips, we're pretty confident that we have the only usable EC breakers. So go ahead and switch to EC before any more someone else finds out that RSA is vulnerable to ROT39. You'll still be no match against, us, but it will be only us.''?

Name: NSA shill !OSYhGye6hY 2014-02-20 3:19

>>12
That was almost coherent. Try again, you're bound to get it right eventually.

Name: Anonymous 2014-02-20 17:08

>>13
Take your epic ``shill'' meme back to the imagereddits, please.

Name: x^2 + y^2 = 1 + dx^2y^2 2014-02-20 17:19

>>14
Kindly suck my anus.

Name: Anonymous 2014-02-20 18:44

The only quantum-resistant cryptosystem is McEliece. Elliptic curve cryptography just scales better with the rise in classical computing power.

The future of cryptography are cryptosystems like McEliece and homomorphic encryption.

Don't change these.
Name: Email:
Entire Thread Thread List