[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Digital Cash
-----BEGIN PGP SIGNED MESSAGE-----
> Quite a bit of work has already been done on this concept.
> Basically one generates a very large sequence of machine
> instructions which computes the image of the output of an
> algorithm under a strong cipher from the image of the input under
> the cipher. A controlled amount of redundant information is
> added to both the input and output. This yields a piece of code
> so obtuse and complex that nothing may be gleaned about what
> algorithm it is executing by observing it run. Figuring out what
> it actually is doing is a cryptanalytically hard problem. Also,
> determining a way of modifying the code which does not break it
> is a similarly hard problem.
> Once encased in such a module, an algorithm may be distributed
> with no fear that it will be stolen. This raises interesting
> poblems with software patents, since one can not tell from such a
> module whether it is performing a function in a way which
> infringes.
Fascinating!! Almost unbelievable!
Can you provide references?
John E. Kreznar | Relations among people to be by
[email protected] | mutual consent, or not at all.
-----BEGIN PGP SIGNATURE-----
Version: 2.3a
iQCVAgUBLZJwqMDhz44ugybJAQHYDQP/Qz7MyegFvt8DlwOlE81DjDTlogZeui8Q
SvOzliEsPJmuepPFNzltTp8W9AsWSKI3oq4608TmCO5A0oLlMiEhGKbsjxIuWZ5d
GjNUmOMVqtU3kPmp3ZfluXKW87z5Wx6KUXcibhVilTG0POC8KOboOPYjXaPWjr9j
MnFs7yG/dU4=
=E5iE
-----END PGP SIGNATURE-----