[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Digital Cash



-----BEGIN PGP SIGNED MESSAGE-----

> Quite a bit of work has already been done on this concept.
> Basically one generates a very large sequence of machine
> instructions which computes the image of the output of an
> algorithm under a strong cipher from the image of the input under
> the cipher.  A controlled amount of redundant information is
> added to both the input and output.  This yields a piece of code
> so obtuse and complex that nothing may be gleaned about what
> algorithm it is executing by observing it run.  Figuring out what
> it actually is doing is a cryptanalytically hard problem.  Also,
> determining a way of modifying the code which does not break it
> is a similarly hard problem.

> Once encased in such a module, an algorithm may be distributed
> with no fear that it will be stolen.  This raises interesting
> poblems with software patents, since one can not tell from such a
> module whether it is performing a function in a way which
> infringes.

Fascinating!!  Almost unbelievable!

Can you provide references?

	John E. Kreznar		| Relations among people to be by
	[email protected]	| mutual consent, or not at all.

-----BEGIN PGP SIGNATURE-----
Version: 2.3a

iQCVAgUBLZJwqMDhz44ugybJAQHYDQP/Qz7MyegFvt8DlwOlE81DjDTlogZeui8Q
SvOzliEsPJmuepPFNzltTp8W9AsWSKI3oq4608TmCO5A0oLlMiEhGKbsjxIuWZ5d
GjNUmOMVqtU3kPmp3ZfluXKW87z5Wx6KUXcibhVilTG0POC8KOboOPYjXaPWjr9j
MnFs7yG/dU4=
=E5iE
-----END PGP SIGNATURE-----