18. Loose Ends and Miscellaneous Topics


THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666, 1994-09-10, Copyright Timothy C. May. All rights reserved. See the detailed disclaimer. Use short sections under "fair use" provisions, with appropriate credit, but don't put your name on my words.

18.2. SUMMARY: Loose Ends and Miscellaneous Topics

18.2.1. Main Points

18.2.2. Connections to Other Sections

18.2.3. Where to Find Additional Information

18.2.4. Miscellaneous Comments

18.3. Quantum Cryptography

18.3.1. "What is quantum cryptography?"

18.3.2. "What about quantum cryptography?"

18.4. Chaotic Cryptography

18.4.1. the oscillator scheme was broken at Crypto '94

18.5. Neural Nets and AI in Crypto

18.5.1. "What about neural nets and AI in crypto?"

18.5.2. Evolutionary or Genetic Programming

18.6. Miscellaneous Advanced Crypto Ideas

18.6.1. "Why have provably "NP-complete" problems not found uses in crypto?"

18.6.2. "Can cellular automata, like Conway's "Game of Life," be used for cryptography?"

18.7. Viruses and Crypto

18.7.1. "What's the connection between Cypherpunks and viruses?"

18.7.2. "What about the "encryption viruses," like KOH?"

18.7.3. "What about viruses? Are there any ties to crypto and Cypherpunks themes?"

18.7.4. "What interests do Cypherpunks have in viruses?"

18.8. Making Money in Crypto

18.8.1. "How can I make money in crypto?"

18.9.1. Limitations of the current net

18.10. Duress Switches, Dead Man Switches

18.10.1. "What about "duress" codes for additional security?"

18.10.2. Duress switches, dead man switches, etc.

18.10.3. Personal security for disks, dead man switches

18.11. Can Encryption be Detected?

18.11.1. "Can messages be scanned and checked for encryption?"

18.12. Personal Digital Assistants, Newtons, etc.

18.12.1. "Are there cryptographic uses for things like Newtons?"

18.13. Physical Security

18.13.1. "Can fiber optical cables be tapped?"

18.14. Attacking Governments

18.14.1. "termites" (rumors, psy-ops) that can undermine governments, followed by "torpedoes" (direct attack)

18.14.2. WASTE (War Against Strong, Tamper-resistant Encryption).

18.15. Cypherpunks List Issues

18.15.1. too much noise on the list?

18.16. Tamper-Resistant Modules

18.16.1. TRMs--claims that "Picbuster" processor can be locally overwritten with focussed or directed UV (OTP)

18.16.2. tamper-resistant modules have some downsides as well

18.17. Deeper Connections

18.17.1. In several places I've referred to "deep connections" between things like crypto, money, game theory, evolutionary ecologies, human motivations, and the nature of law. By this I mean that there are deeper, unifying principles. Principles involving locality, identity, and disclosure of knowledge. A good example: the deep fairness of "cut-and-choose" protocols- -I've seen mention of this in game theory tesxts, but not much discussion of other, similar protocols.

18.17.2. For example, below the level of number theory and algorithms in cryptology lies a level dealing with "identity," "proof," "collusion," and other such core concepts, concepts that can almost be dealt with independent of the acual algorithms (though the concrete realization of public key methods took this out of the abstract realm of philosophy and made it important to analyze). And these abstract concepts are linked to other fields, such as economics, human psychology, law, and evolutionary game theory (the study of evolved strategies in multi-agent systems, e.g., human beings interacting and trading with each other).

18.17.3. I believe there are important questions about why things work the way they do at this level. To be concrete, why do threats of physical coercion create market distortions and what effects does this have? Or, what is the nature of emergent behavior in reputation-based systems? (The combinatiion of crypto and economics is a fertile area, barely touched upon by the academic cryptology community.) Why is locality is important, and what does this mean for digital cash? Why does regulation often produce more crime?

18.17.4. Crypto and the related ideas of reputation, identity, and webs of trust has introduced a new angle into economic matters. I suspect there are a couple of Nobel Prizes in Economics for those who integrate these important concepts.

18.18. Loose End Loose Ends

18.18.1. What the core issues are...a tough thing to analyze

18.18.2. Price signalling in posts...for further information

18.18.3. "What should Cypherpunks support for "cable" or "set-top box" standards?

18.18.4. minor point: the importance of "But does it scale?" is often exaggerated


Revision #1
Created 23 June 2022 04:05:42 by c0mmando
Updated 23 June 2022 04:06:08 by c0mmando