tag:blogger.com,1999:blog-3993498847203183398.post4154210900314878130..comments2023-03-30T14:13:03.371+01:00Comments on RevK<sup>®</sup>'s ramblings: Ban multiplication!RevKhttp://www.blogger.com/profile/12369263214193333422noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-3993498847203183398.post-85757761059804880202015-08-26T11:13:54.616+01:002015-08-26T11:13:54.616+01:00Did you see that I already posted this in May http...Did you see that I already posted this in May http://blog.adamspiers.org/2015/05/09/tories-limit-maths-via-snoopers-charter/ in response to one of your previous posts?<br /><br />I already shared the link with you:<br />http://www.revk.uk/2015/01/z226etuo57q9m6brbblz6ztkpea5ct23rmex0vl.html?showComment=1431167015160#c8490384704943048650Adam Spiershttps://www.blogger.com/profile/12358018165405210062noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-4658054354554599112015-07-10T23:27:44.998+01:002015-07-10T23:27:44.998+01:00On a similar line, I wrote a blog post a few weeks...On a similar line, I wrote a blog post a few weeks after reading your one-time pad blog and youtube clip - http://blog.stevenwilmot.com/2015/06/is-it-possible-to-ban-encryption.html<br /><br />As you say, steganography, one-time pads, and the fact that there is no way of telling which "communication data" is actually encrypted data rather than just a random byte-stream makes the whole idea of legislating against encryption so utterly ludicrous.<br /><br />I think swapping encryption for "multiplication" is a great analogySteven Wilmothttps://www.blogger.com/profile/00771671711326044189noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-32100684871819786392015-07-10T22:56:47.034+01:002015-07-10T22:56:47.034+01:00Let them ban multiplication...
Firstly, you don&#...Let them ban multiplication...<br /><br />Firstly, you don't need a multiply, or even an add instruction in silicon, you can get away with subtraction and division<br />X + Y == X - ( 0 - Y )<br />X * Y == X / ( 1 / Y )<br />Some particularly irritating hardware has done just this.<br /><br /><br />Secondly, all they have to do is wait, judging by the latest intake of trainees I've seen at WeProcessBettingSlips, it appears that any form of mathematics must now be an entirely optional component of the school syllabus. Eventually all the old-timers (i.e. those who have calculators with real buttons, not touch-screens) will retire, resign, or just give up in disgust, and I'll be able to charge extortionate fees for doing niche or bespoke work, such as long division.<br /><br />They need to read:<br />http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=8<br /><br />Co-authored by Whitfield Diffie (Co-inventor of public key encryption), and Ronald L. Rivest (The 'R' in RSA), and many other luminaries in the field..<br />Jimhttps://www.blogger.com/profile/12140573685208190299noreply@blogger.comtag:blogger.com,1999:blog-3993498847203183398.post-85479538782597829342015-07-10T16:57:12.188+01:002015-07-10T16:57:12.188+01:00Neal Stephenson's Cryptonomicon describes an e...Neal Stephenson's Cryptonomicon describes an encryption algorithm, designed by Bruce Schneier, that uses a deck of cards to provide encryption that's effectively unbreakable: https://www.schneier.com/solitaire.html<br /><br />That's a pretty good analogy to your "people could just do it by hand" step.nickjohnsonhttps://www.blogger.com/profile/10246332335331785919noreply@blogger.com