diff options
| -rw-r--r-- | Makefile | 32 | ||||
| -rwxr-xr-x | make | 26 | ||||
| -rw-r--r-- | paper.ms | 41 | ||||
| -rw-r--r-- | refer | 70 |
4 files changed, 127 insertions, 42 deletions
@@ -1,35 +1,9 @@ -default: pdf -build: - @ls -1 | grep target || mkdir target - @wc paper.ms - @cat paper.ms|\ - sed "s/^{/.[\n/g" |\ - sed "s/}{/\n.]\n.[\n/g" |\ - sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\ - refer -C -Ss -p refer |\ - tr "^" " "> target/temp - #sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W -D \"\2\" -A -- \2\n|g" |\ - #sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W \2\n|g" -pdf: build - @cat formatting.ms target/temp |\ - groff -Eket -Tpdf -ms -P-pa4 > target/paper.pdf -html2: build - cat header.html > target/paper.html - cat formatting.ms target/temp| sed "s/.nr LL*/.nr LL 6i/g" |\ - groff -Tascii -c -ms |\ - sed "1,2d" | ansi2html -piml >> target/paper.html - echo "</pre>" >> target/paper.html -html: build - @groff -E -Thtml -ms target/temp |\ - sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1<a href=\2>\2</a>|g" |\ - sed -E "s|^(http[s]?://[^[:space:]]*)|<a href=\1>\1</a>|g" |\ - sed "1,6d" > target/temp2 - @cat header.html target/temp2 |\ - sed -E '34 i <a href="./paper.pdf">See this as a pdf</a><br>'> target/paper.html +default: + ./make read: zathura target/paper.pdf& clean: rm -rf target - install: pdf html +install: default cp target/paper.html /var/www/git-bin/epq cp target/paper.pdf /var/www/git-bin/epq @@ -0,0 +1,26 @@ +#!/bin/sh +ls -1 | grep target || mkdir target +wc paper.ms +cat paper.ms|\ + sed "s/}\./}\REMOVEME./g" |\ + sed "s/}\,/}\REMOVEME,/g" |\ + sed "s/^{/.[\n/g" |\ + sed "s/}{/\n.]\n.[\n/g" |\ + sed "s/{/\n.[\n/g" | sed "s/\}\ /\n.]\n/g" | sed "s/\}/\n.]\n/g" |\ + refer -C -Ss -p refer |\ + grep -v "^\.lf" |\ + sed "s/\ \ (/ (/g"|\ + sed "s/)(?!.*\.)/) /g" |\ + perl -0pe 's/\nREMOVEME//g' |\ + tr "^" " "> target/temp +#sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W -D \"\2\" -A -- \2\n|g" |\ +#sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1\n.pdfhref W \2\n|g" +# awk '{printf "%s%s", $0, (/)$/ ? "" : ORS)}' |\ +cat formatting.ms target/temp |\ + groff -Eket -Tpdf -ms -P-pa4 > target/paper.pdf +groff -E -Thtml -ms target/temp |\ + sed -E "s|([^\"\'\>=])(http[s]?://[^[:space:]]*)|\1<a href=\2>\2</a>|g" |\ + sed -E "s|^(http[s]?://[^[:space:]]*)|<a href=\1>\1</a>|g" |\ + sed "1,6d" > target/temp2 +cat header.html target/temp2 |\ + sed -E '34 i <a href="./paper.pdf">See this document as a pdf</a><br>'> target/paper.html @@ -3,9 +3,9 @@ short-label D.y sort spec .R2 .TL -Title +Cryptography, crime, terror, and surveillance .AU -Mohit Agarwal +\f[TI]Mohit Agarwal .AI February 2022 .LP @@ -46,7 +46,9 @@ crime or terror? Is combatting encryption an effective way to combat crime/terror? .LP -An argument is often made against digital privacy in the interest of +An argument is often made against allowing widespread use of +encryption and generally against widespread effective operations +security (OPSEC)in the public sector in the interest of national security. With access to communications and usage history law enforcement and government can quickly discover large amounts of information useful in a criminal investigation or in preventing @@ -127,8 +129,7 @@ followed the increase in popularity of cars in areas such as the UK and US, regulation will no doubt follow the newfound popularity of heavy encryption. There are however, difference in the case of encryption when compared to cars. The rate of change with modern -technology is far greater. There are already discussions about quantum -computers and their potential to overcome current encryption methods. +technology is far greater. In the case of encryption regulation will continuously struggle to control encryption methods due in part to how quickly they change, but perhaps moreso due to their decentralised nature, where a government @@ -171,6 +172,27 @@ chip manufacturing bill} and Chinese governments (cite) are respectively showing (the US and China are the two largest chip manufacturers (cite, reword)). +In addition, the rate of development in unconventional computing +methods is increasing rapidly. Effective quantum computing will +mean that existing popular cryptographic algorithms such as RSA will +no longer be secure due to the potential for computations that would +take unreasonable amounts of time on classical computers to be solved +quickly (reword) such as prime factorisation on which RSA encryption +relies {lily chen quantum}. RSA encryption is currently in use for +applications such as private communications and digital signatures. +Significant research such as at IBM in recent years (cite) has shown +feasibility in current ideas surrounding quantum computing and +promising results in development towards quantum supremacy and in the +future the breakdown of current cryptographic methods. + +Indeed, there +have already been claims (although disputed) to quantum supremacy from + +Once more, the significant research is occuring as afformentioned in +the US and in China {quantum research in china}. Both in the US at +Google {google supremacy nature} and in China {china quantum +advantage}{science photons quantum advantage}. + Is discussion on this useful? Individuals around the world have clearly expressed interest in matters of privacy and encryption (cite) and open source software @@ -265,4 +287,13 @@ Privacy https://www.flurry.com/blog/ios-14-5-opt-in-rate-att-restricted-app-tracking-transparency-worldwide-us-daily-latest-update/ https://www.bloomberg.com/news/articles/2021-07-14/facebook-fb-advertisers-impacted-by-apple-aapl-privacy-ios-14-changes +Quantum computing + https://sci-hub.se/10.1007/978-3-540-88702-7_1 + https://aapt.scitation.org/doi/abs/10.1119/1.1891170 + https://ieeexplore.ieee.org/abstract/document/8490169 + https://digitalcommons.dartmouth.edu/senior_theses/23/ + https://www.sciencedirect.com/science/article/abs/pii/S1361372317300519 + https://arxiv.org/abs/1804.00200 + + {firewall} @@ -35,14 +35,7 @@ %A Elizabeth C. Economy %D 2018 %J The Guardian -%O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown - -%T Intel's Management Engine is a security hazard, and users need a way to disable it -%A Erica Portnoy -%A Peter Eckersley -%D May 2017 -%J Electronic Frontier Foundation -%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022) +%O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown . %T Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles %J The Conversation @@ -110,6 +103,15 @@ %O https://www.theregister.com/2022/02/05/us_house_passes_america_competes/ (Accessed 6th February 2022) +-- Intel management engine + +%T Intel's Management Engine is a security hazard, and users need a way to disable it +%A Erica Portnoy +%A Peter Eckersley +%D May 2017 +%J Electronic Frontier Foundation +%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022) + %T Intel ME controller chip has secret kill switch %J The Register %A Thomas Claburn @@ -123,6 +125,8 @@ %O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/ (Accessed 6th February 2022) +-- Spectre, meltdown + %T Researchers Discover Two Major Flaws in the World’s Computers %J The New York Times %D Jan 2018 @@ -130,3 +134,53 @@ %A Nicole Perlroth %O https://www.nytimes.com/2018/01/03/business/computer-flaws.html (Accessed 7th February 2022) + +-- quantum + +%T Report on Post-Quantum Cryptography +%A Lily Chen +%A Stephen Jordan +%A Yi-Kai Liu +%A Dustin Moody +%A Rene Peralta +%A Ray Perlner +%A Daniel Smith-Tone +%J National Institute of Standards and Technology +%D April 2016 +%O https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf . + +%T Quantum information research in China +%A Qiang Zhang +%A Feihu Xu +%A Li Li +%A Nai-Le Liu +%A Jian-Wei Pan +%D Nov 2019 +%J Quantum Science and Technology +%V 4 040503 +%O https://iopscience.iop.org/article/10.1088/2058-9565/ab4bea/ . + +%T Physicists in China challenge Google’s ‘quantum advantage’ +%A Philip Ball +%D Dec 2020 +%J Nature +%O https://www.nature.com/articles/d41586-020-03434-7 +(Accessed 13th January 2022) + +%T Hello quantum world! Google publishes landmark quantum supremacy claim +%A Elizabeth Gibney +%D Oct 2019 +%J Nature +%O https://www.nature.com/articles/d41586-019-03213-z +(Accessed 13th January 2022) + +%T Quantum computational advantage using photons +%A Han-Sen Zhong^et^al +%D 2020 +%G DOI: 10.1126/science.abe8770 + +%T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back +%J NPR +%D Oct 2019 +%A Paolo Zialcita +%O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back . |
