Today’s Spotlight features an illustration Christine Daniloff/MIT.
Most modern cryptographic schemes rely on computational complexity for their security. In principle, they can be cracked, but that would take a prohibitively long time, even with enormous computational resources.
There is, however, another notion of security, information-theoretic security, which means that even an adversary with unbounded computational power could extract no useful information from an encrypted message. Cryptographic schemes that promise information-theoretical security have been devised, but they’re far too complicated to be practical.
Read full article.
The MIT home page Spotlight showcases the research, technology and education advances taking place at the Institute every day.
What makes it as a Spotlight image is an editorial decision by the MIT News Office based on factors that include timeliness, promotion of MIT's mission, the balance of interest to both internal and external audiences, and appropriateness.
We do welcome ideas and submissions for spotlights from community members, but please note we are not able to accommodate all requests. We are unable to run event previews or promotions as spotlights; for those looking to promote an event, we are happy to include your listing as an event headline on the homepage (when space is available). For more information, e-mail the spotlight team.
Request a Spotlight or Event Headline, here