Score:2

Significance of theoretical weaknesses?

cn flag

What is the significance of theoretical weaknesses? Any real life incident where a theoretical weakness was ignored and later it compromised the system? Whats the dividing line between theoretical and practical weakness? Are there any other categories? How quantifies a practical weakness as what seems impossible for one person might be doable by another?

DannyNiu avatar
vu flag
That's an interesting research subject to write about, but as it stands, this question asked here is too broad to be properly answered. For starters, PKCS#1 v1.5 RSA encryption had a theoretical weakness that's exploitable in practice.
Maarten Bodewes avatar
in flag
TBH I am wondering if this question is "too broad", or to mark my answer "community wiki", but I think we can provide an answer with objective reasoning. Of course my reasoning my conflict with somebody elses reasoning so marking it as "community wiki" doesn't work either. Won't oppose any close votes though. (if just because mod voting is not really "voting", it's "doing").
Score:3
in flag

A theoretical weakness is IMHO defined as one that hasn't been attacked in practice. Sometimes it is clear that it never will be attacked (e.g. an attack on AES that leaves 126 bits of security instead of 128), but at other times it will be close enough (SHAttered) or attacks can be improved (the attacks on MD5).

Are there any other categories? I don't think so as the definition of a theoretical attack consist of the negation of the definition of a practical attack. Maybe there is a bit of grey area (a computer being at 80% of an attack that is known to work) but negation doesn't leave much space for other categories.

A practical attack considers all possible adversaries; if only one of those breaks the algorithm then it is a practical attack. Let's do a little thought experiment and have a baby be amongst the adversaries. We would not call it a theoretical attack just because the baby isn't able to break the algorithm.

Of course a source of information could always break with the above definition by providing enough context, e.g. by singling out the NSA or a company secretly having a quantum computer. And that also gives rise to the other problem: what's counted as a theoretical attack to one person might be a practical attack to somebody that has performed it.

We can easily replace the baby of the previous thought experiment with an advanced civilization at the other end of the universe. Maybe that makes the attacks on, say, large-size RSA practical, but we'd still call them theoretical.

Maarten Bodewes avatar
in flag
... in the thought experiment. In practice, not so much...
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.