After a month of rest I had to join the job. I had to do cryptanalytic attacks on the codes of the terrorists. It was for a government organization (I cannot reveal more about my job). Cryptanalytic attacks vary in potency and how much of a threat they pose to real-world cryptosystems. The majority of results found in modern cryptanalytic research are of this type. Essentially, the practical importance of an attack is dependent on the answers to the following three questions:
- What knowledge and capabilities are needed as a prerequisite?
- How much additional secret information is deduced?
- How much effort is required? (What is the computational complexity?)
In simple words, this was puzzle solving once again!
No comments:
Post a Comment