Difference between revisions of "Obfuscation"
From MgmtWiki
(→Contexts) |
|||
| Line 3: | Line 3: | ||
A process that enables a computer program to hide not just collections of data but the inner workings of itself. | A process that enables a computer program to hide not just collections of data but the inner workings of itself. | ||
| − | ==Problems | + | |
| + | ==Contexts== | ||
| + | * First described in 2018 a program at UCLA<ref>Erica Klarreich, ''Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography.'' Wired (2020-11-15) https://www.wired.com/story/computer-scientists-achieve-the-crown-jewel-of-cryptography/</ref> developed a technique considered prior to that to be impossible. An algorithm that could serve as the basis for nearly any imaginable type of cryptographic protocol. | ||
| + | |||
| + | ==Problems== | ||
* The ability of a computer program to hide its internal operations for view has be a goal, and a claim of many obfuscation methods for decades. | * The ability of a computer program to hide its internal operations for view has be a goal, and a claim of many obfuscation methods for decades. | ||
* As soon as an obfuscation program was release, it as broken. Often within days of its release. | * As soon as an obfuscation program was release, it as broken. Often within days of its release. | ||
* In 2001 the strongest form of obfuscation was proven to be impossible. | * In 2001 the strongest form of obfuscation was proven to be impossible. | ||
| − | |||
| − | |||
| − | = | + | ==Solution== |
| + | |||
==References== | ==References== | ||
[[Category: Cryptography]] | [[Category: Cryptography]] | ||
Revision as of 07:12, 27 November 2021
Full Title or Meme
A process that enables a computer program to hide not just collections of data but the inner workings of itself.
Contexts
- First described in 2018 a program at UCLA[1] developed a technique considered prior to that to be impossible. An algorithm that could serve as the basis for nearly any imaginable type of cryptographic protocol.
Problems
- The ability of a computer program to hide its internal operations for view has be a goal, and a claim of many obfuscation methods for decades.
- As soon as an obfuscation program was release, it as broken. Often within days of its release.
- In 2001 the strongest form of obfuscation was proven to be impossible.
Solution
References
- ↑ Erica Klarreich, Computer Scientists Achieve the ‘Crown Jewel’ of Cryptography. Wired (2020-11-15) https://www.wired.com/story/computer-scientists-achieve-the-crown-jewel-of-cryptography/