Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

With some exceptions, those proofs make assumptions about their primitives like having block ciphers be "unpredictable permutations" or having hash functions be "random oracles". These proofs also make assumptions that information doesn't leak in other ways (like BEAST, heartbleed, timing attacks, poor entropy sources, etc).

In other words, those proofs don't have as much real-world significance as you'd like.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: