(no subject)

Date: 2008-01-04 04:51 pm (UTC)
Obviously there are optimization tricks being used now that would have to go out the window. If I have a crypto algorithm I wish to make more efficient than "secure" (i.e., relies on key secrecy and not algorithm secrecy, and the fastest attack is brute force) algorithms by various tricks that render it only secure if the algorithm is hidden, I could do so. But it is no longer "secure" by the full definition provided in the field of cryptography.

So, my question still stands. Your Algorithm A is broken, as you say (in fact, Yahoo worked that way in the Good Old Days, and I know of lots of people who grabbed websites like aardvark.com to exploit that attack.) "Return pages in random order" is not a search algorithm; it's a random retrieval algorithm, and furthermore, doesn't prevent an attacker from analyzing your PRNG and composing pages that are "randomly" selected by the search engine.

Not seeing the proof of impossibility here.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org

Profile

maradydd: (Default)
maradydd

September 2010

S M T W T F S
   1234
567891011
12131415 161718
19202122232425
26 27282930  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags