{"title":"Previous Research","authors":"S. Hoory","doi":"10.2307/j.ctv172wq.10","DOIUrl":null,"url":null,"abstract":"In general I am interested in real world problems that can be attacked with mathematical tools. For example, I ask the following question: Is the secure mode of Internet browsers really secure? The underlying cryptographic standard is DES. Therefore, the natural interpretation of the problem is to ask whether there exists a polynomial time algorithm for breaking DES-like constructions. However, proving such a statement involves separating P from NP . Instead of confronting this fundumental open question, I reformulated the problem as an information theoretic question, and obtained concrete results using the well developed machinery of Markov chains. My past research has direct applications to cryptography, coding, proof systems, and complexity, using tools from graph theory, especially Markov chains and expander graphs.","PeriodicalId":426566,"journal":{"name":"English Comparative Correlatives","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"English Comparative Correlatives","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2307/j.ctv172wq.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In general I am interested in real world problems that can be attacked with mathematical tools. For example, I ask the following question: Is the secure mode of Internet browsers really secure? The underlying cryptographic standard is DES. Therefore, the natural interpretation of the problem is to ask whether there exists a polynomial time algorithm for breaking DES-like constructions. However, proving such a statement involves separating P from NP . Instead of confronting this fundumental open question, I reformulated the problem as an information theoretic question, and obtained concrete results using the well developed machinery of Markov chains. My past research has direct applications to cryptography, coding, proof systems, and complexity, using tools from graph theory, especially Markov chains and expander graphs.