On Mon, 9 Sep 2013 10:06:59 -0400, John Gilmore wrote:

>Strong encryption can, as a practical matter, ensure the safety of a
>message transmitted from computer S to computer T.
> 
Doesn't the imputed strength of most (all?) prevalent encryption schemes
depend on their somewhat conjectural N-P Complete character?

Of course, if the five-eyes were to discover either a proof or a refutation
of N-P complexity, or an encryption scheme whose strength could be
proven independently of N-P, the mathematics would be kept Top
Secret as long as possible.

(Five-eyes appears to have only a weak notional relationship to Κέρβερος,
who presumably had six eyes.)

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to