Search

Showing posts with label computer algorithms. Show all posts
Showing posts with label computer algorithms. Show all posts

Internet Security: Is There Such A Thing As An Unbreakable Code?

For centuries, people have been searching for ways to keep information from getting into the hands of the public. Cryptography gave them an answer to that. Cryptography has been used, both in its basic and sophisticated forms to hide sensitive information. Egyptian hieroglyphics contain the first known and verified example of ancient cryptography. In our age where internet is so rampant and people want to keep their personal information private, cryptography is gaining traction. But one cycle exists for all cryptography. First, someone finds a good code and starts using it, it becomes effective for some time and eventually someone somewhere breaks the code, rendering it ineffective. Because of this, people ask: Is there such a thing as an unbreakable code?

 

Can all encryption be broken

To help them answer this question and solve it, scientists came up with the concept of one-way functions. One-way functions are functions that are easy to compute on the given inputs but hard to invert. That is, you cannot get the inputs from the output when reversing it. One-way functions could make good candidates for code that cannot be easily broken. That is, it would be close to impossible to find an algorithm that would revert the output. Unfortunately, one-way functions are just a conjecture. But that conjecture has been behind much tools that have been built in cryptography, authentication, personal identification, and other data security applications.

Getting a one-way function that is feasible has huge ramifications in the internet age. It could solve the Internet security problem for good. Industries such as banking, telecommunications, and e-commerce would be in a hurry to apply it. Yes, it has been elusive but that is not to say that there have not been candidates.

One well known candidate for one-way functions involves the multiplication and factoring of prime numbers. To get the outputs, two prime numbers are given to a function and their product is computed. This function takes a quadratic time complexity. It is really hard to factor out the prime numbers given the output although it can be done in exponential time. Another candidate is the Rabin function which gave rise to the Rabin cryptosystem on the assumption that the Rabin function is one-way.

The two candidates above can be broken though if a really good mathematician knows how to write an efficient algorithm.

This problem was what Rafael Pass, Professor of computer science at Cornell Tech wanted to tackle. He believes that if he could find a really good and valid one-way function, then all internet security problem could be solved. Internet encryption would be safe for all. According to his postulate, a good one-way function is like lighting a match. After a match is lit, you cannot get back the sticks. They are now ashes. So, a good one-way function would be an encryption scheme in which the decryption would lie only in the hands of the person who encrypted it. To get a candidate, he looked to mathematics and to a field that is unrelated to cryptography – quantifying the amount of randomness in a string of numbers, or what is known as the Kolmogorov complexity.

The Kolmogorov complexity of an object is defined as the length of the shortest computer program that can generate that object as an output. The Kolmogorov complexity of a string that has a definite pattern to it, like ababababababab, which is writing ab 7 times, can easily be computed. But what if you have some random string? asdwer2345tgdhncjmckkjkd? How do you compute the Kolmogorov complexity in an efficient manner? It has been found that the Kolmogorov complexity for such random strings is computationally close to impossible. What makes it more infeasible is computing the time bounds of such an algorithm.

Taking from this idea, Professor Pass focused his research on whether an algorithm can solve the time-bounded Kolmogorov complexity. If such an algorithm exists, his research posits, then all cryptography can be broken. On the other hand, if no efficient algorithm exists for such a time-bound Kolmogorov complexity, then one-way functions do exist and they can be found.

His research has implications for encryption schemes that are widely used in the Internet. Popular social media platforms use encryption to make their platforms more secure, banks in e-banking platforms rely on encryption being more unbreakable, and overall, we depend on making sure our internet lives are kept free from the prying public. So, Professor Pass’ theory is of great interest and only time will tell when a really good algorithm can be found based on his research that would make sure our Internet security is compromised no matter what platform we are using.

Source for this article was from Cornell University.

When computer algorithms for artworks can match art historians, accuracy will match precision


Title picture
Biker and Son, Poster art. credit: Flickr.com, Moriza
When art historians evaluate an artwork, they ask and answer questions such as the time and place where the artwork was done, what school of art the artist represents as well as his influences, and the artists his work has influenced. Asking a computer using an algorithm to do this would be very difficult. This is a field where human intelligence is very much required. Yet, computers and computer algorithms can still help us novices evaluate a work of art.

Algorithms have been developed that demonstrates computer ability to perceive and understand art the same way expert art critics would. The algorithms work on the composition of colors and easily measurable artistic qualities of an artwork.

Computers as art historians: Good job done!

In a recently published experiment in the ACM Journal of Computing and Cultural Heritage, using approximately 1,000 paintings of 34 well-known artists,
Advert
205747_Holiday 30% off card and calendars
researchers showed that a computer was clearly able to identify different art styles and even little nuances between art schools using only visual content. The results obtained were largely in agreement with the perception of art historians and dwarfed what one can obtain from untrained humans in the analysis of artworks.

A similar algorithm that was designed to place artworks in particular artistic periods using artificial vision algorithms also gave outstanding results. The computers were able to “understand” images and also differentiate between artistic styles based on low-level pictorial information.

Low-level pictorial information encompasses aspects such as brush thickness, the type of material and the composition of the palette of color. Humans on the other hand perform art analysis more abstractly. They employ medium-level information which differentiates between objects and scenes in a picture and the type of painting, and high-level information that takes the historical context and artist’s knowledge along with artistic trends into consideration.

Computer algorithms for arts not yet fully explored.

The future is stillborn as to the scope and extent visual algorithms can be used in evaluating works of art. At least, when it involves broad artistic differentiation, usually amongst art schools and periods, computer algorithms can beat an untrained human in arts analysis but fall short in precisely dating art periods or styles. According to Miquel Feixas, one of the authors of the study that was published in the ACM journal, “it will never be possible to precisely determine mathematically an artistic period or to measure the human response to a work of art, but we can look for trends.”

This is not the only technique that has been expended towards paintings. Physicists sometimes use ion beams to determine paintings and painting authenticity. This is the first time though a machine has gone one step better than humans, whether trained or untrained, in evaluating and analyzing works of art. It is hoped that this work will also open the way for further work in developing image viewing and analysis tools, classifying and searching for collections in museums, creating public information and entertainment equipment and to better understand the interaction between humans, computers and works of art. Digital technology will not replace art historians at all, just as software has not replaced human mathematicians, but with digital technology, art historians have an arsenal that makes their work stand out with more precise accuracy.

Advert


follow me on twitter, @emeka_david or be a friend on facebook, odimegwu david

Matched content