daemon@ucbvax.UUCP (08/24/84)
From MCGREW@RUTGERS.ARPA Thu Aug 23 21:24:26 1984 HUMAN-NETS Digest Thursday, 23 Aug 1984 Volume 7 : Issue 48 Today's Topics: Computer Networks - Telephone Taps on Int'l Calls (2 msgs) & Crack the Data Encryption Standard? Information - Re: Low level microwaves and cancer Chess - Number-Cruncher vs. Humans: 9th Move ---------------------------------------------------------------------- Date: Wed, 22 Aug 84 22:06:39 pdt From: fair%ucbarpa@Berkeley (Erik E. Fair) Subject: Re: Telephone Taps on Int'l Calls The USENET link to Europe goes at 1200 baud from Merrimack, NH to Amsterdam, Holland. Do you think the NSA will be interested in huffman coded netnews? Only 16Mbytes per month! curious, Erik E. Fair ucbvax!fair fair@ucb-arpa.ARPA P.S. Among other things, this digest goes over that link... ------------------------------ Date: 23 August 1984 03:56-EDT From: Jerry E. Pournelle <POURNE @ MIT-MC> Subject: U.S. may tap lines to halt software smuggling by phone To: Rutenberg.pa @ XEROX What did the article SAY? It is rotten journalism. one official is named; he is quoted as saying that "discussion took place", not that he thought tapping phones would be any use. he is also quoted as saying that "it will be a problem to us." All the rest of the article is speculation, or quuotes ananymous sources, with no possible verification. It may be that they're planning to do something about telephoned software, but you sure can't prove that by anything in the article, which seems to be pure spec. ------------------------------ Date: Wed, 22 Aug 84 14:33:45 pdt From: E. Howard Alt <alt%sri-terra@sri-tsc> Subject: Crack the DES? I don't remember if the DES and cryptography have been brought up here before (I was probably asleep or somthing), but I guess I'd like to comment about the DES, etc. The effort to develop the DES (Data Encryption Standard) was a joint effort between the No Such Agency and the Incredible Bowel Movment. IBM developed a cryptographic scheme that is fairly changable (key length, internal variables, etc). NSA specified the various parameters (key length, internal variables, etc). There are 2 ways to break a cryptographic system. The first is to discover the key that was used to generate the ciphertext. The second is to break the system itself so you don't need the key. The first situation is easy to solve (in theory), all you have to do is make the key so big that it would take too long to run through all possible combinations (and protect it... but that is a different sort of attack). The other method is based on finding a shortcut through the algorithm so you can find the key. There are people in the (non government) cryptographic world that believe one could (today) spend $20 million and build a machine that could mount a known plaintext attack and discover a key. Note that the requires the bad guy to have some plaintext-ciphertext pairs. Also note that a ciphertext only attack is not possible under this machine. The idea is that we went out and stole some messages that were sent, and we also have a copy of the encrypted version of the message. We are assuming that further messages we might want to read are encrypted under the same key. The way we discover the key is to do an exaustive search over the 10^17 possible keys. If we could check one key every microsecond, we could do all of the keys in 10^11 seconds (or 10^6 days). Now, if we build a million of these little machines (10^6), and each are checking one key, it only takes one day to solve for a key. If the key were 128 or 256 bits, it would cost $2 X 10^25. In fact, quantum mechanical and thermodynamic considerations rule out exhaustive searches on keys of several hundred bits. The DES is pretty complicated, and I don't feel like looking in the fips pub and describing it here. In a very general way, here it is: There are 3 user supplied part to the DES, the plaintext, the ciphertext and the key. The plaintext is split up into 64 bit chunks to be applied to the 56 bit key, and out pops the 64 bit ciphertext (this is encryption if you haven't guessed). Between the popping in and popping out, the 64 bits gets shifted, permuted and xored according to various parameters. The parameters are all variable are set by the NSA for the standard. According to the cryptographic heavys, the NSA chose very funny numbers for these parameters. In fact, they say that one could just about pick the parameters at random, and chances are very good that they would be better than the ones NSA chose. These people are pretty much convinced (at least this is what they say) that NSA didn't pick these parameters to create a trap door in the DES (although they did believe this at one time). Oh yes, I should mention something else. I have been mumbling a lot about NSA, but you chould know (if you don't already) that NBS (National Bureau of Standards) is the group that is the official part of the government responsible for DES. I doubt NSA is officially responsible for anything (other than keeping an eye on things like this... hi guys). If some company wanted thier encrypted data to be secure (although non standard), all they would have to do is change the DES parameters around a bit, or do a more sophisticated application of DES (there are several well known methods that make DES much more secure). Pretty exciting, eh? I always fall asleep in talks about this sort if thing... I almost fell asleep writing it... Howard. ------------------------------ Date: 23 August 1984 04:00-EDT From: Jerry E. Pournelle <POURNE @ MIT-MC> Subject: Low level microwaves and cancer To: vortex!lauren @ RAND-UNIX So that's why the Russians were beaming microwaves at our Embassy? ------------------------------ Date: Thu Aug 23 14:47:43 1984 From: mclure@sri-prism To: ailist@sri-ai Subject: number-cruncher vs. humans: 9th move The Vote Tally -------------- Folks, the moves are in and have been tallied. The winner is: 8 ... cxd4. A total of 20 moves were cast. Please relay this message to any friends you have who might be interested in participating. This includes non-net people. The Machine Moves ----------------- Depth Move Time for search Nodes Machine's Est 8 ply cxd4 18 hours, 7 minutes 6.5x10^7 += Humans Move # Votes BR ** -- BQ BK BB -- BR 8 ... cxd4 8 8 ... Qe7 1 ** BP ** BB ** BP BP BP 8 ... Qc7 3 BP ** BN BP -- BN -- ** 8 ... Be7 3 ** -- ** -- BP -- ** -- 8 ... Qb6 1 -- ** -- WP WP ** -- ** 8 ... e6 1 ** -- ** -- ** WN ** -- 8 ... b5 1 WP WP -- ** -- WP WP WP 8 ... d5 1 WR WN WB WQ WR WB WK -- 8 ... Bg4 1 Prestige 8-ply Note that the machine now thinks it is ahead positionally. The Game So Far --------------- 1. e4 c5 6. Re1 a6 2. Nf3 d6 7. Bf1 e5 3. Bb5+ Nc6 8. d4 cxd4 4. o-o Bd7 9. cxd4 5. c3 Nf6 Commentary ---------- Goodell@xerox, USCF ? I think 8 ... Be7 would be a good move now to prepare for castling to the strong side. My second choice would be g6 followed by Bg7, but I think it would take too long. BLee.ES@xerox, USCF ? 8 ... Qb6 a) develops the queen, b) attacks d4 again, c) discourages movement of white's queen bishop, d) prepares castling long. Tli@Usc-Eclb, USCF ? Unfortunately, the voting will also keep out the inspired moves. So we get an average game of all playing.... SLOAN@WASHINGTON 8. ... b5 It is worth noting a classical problem here in building a chess program: 1) The machine was following its book until this move, 2) As White, the machine should enjoy AT LEAST EQUALITY in the first position following "book" recommendations, 3) However, having switched from "book" evaluation to its own opening/middle game evaluation, the machine now decides that it doesn't much like this position after all! There are several possibilities: 0) Black is superior in the starting position (unlikely!) 1) the book (at least this line) is inferior, and the machine should discard it (anyone out there think that the Prestige will do this?) 2) the book is (objectively) correct, but this line does not match the playing "style" of the machine (i.e., the position is OK, but the machine doesn't know the correct thematic continuations, and hence will indeed find the position to be difficult.) This last possibility is most likely, and is not limited to machine play. Many human players have the same problem when they memorize columns and columns of analysis without understanding the REASONS for the evaluations at the ends of the columns. This leads to post-mortem conversations of the form "That master isn't so strong; I had him CRUSHED in the opening...but he SOMEHOW escaped to a dead drawn ending - he didn't even know that it was theoretically drawn- he refused my draw offer! - I was so mad at him for that that I lost my concentration for 1 move and hung a piece." CMP.WERNER@UTEXAS-20, USCF ? Qc7 risky, but requiring a non-trivial evaluation by white. JPERRY@SRI-KL, USCF 1893 I vote that Black's eighth move should be 8... cd The reason I voted for this move is that Black can occupy the thematic QB file sooner than white by taking with the QBP. The move 8...ed seems to be a blunder because white can try to prepare favorable complications on the K file with e5. 8... Be7 seems plausible but allows 9. d5 and then Black has no counter play on an open file. All in all, 8...cd seems like Black's most logical retort to the bold 8. d4. tpeters@BBNCCP, USCF ? I vote for 8. ...Be7. I disagree with the computer's assessment. Black may have equalized or white may have a slight advantage, but there is no reason to think that black is better. The following is taken from Sizilianisch II by Rolf Schwarz. It should be viewed as a guideline and source of ideas, not as infallible gospel. 8.d4: A. 8. ...Be7 9.d x c5! d x c5 10. Na3 slight advantage to white [but why not 10. ...b5 equal? TP] B. 8. ...c x d4 9. c x d4 Bg4 10. d5 Nd4 11. Be3! N x f3+ 12. g x f3 Bh5 with slight advantage to white I picked 8. ...Be7 because white's advantage in B. seems small but quite clear. He (it?) has pressure down the c file and the white light-square bishop can become very active on h3. Moreover, his doubled pawns are nowhere near as weak as they may seem to some. At any rate it just doesn't seem reasonable to open the center by 8. ...c x d4 while the kingside is underdeveloped. Schaer.dlos@XEROX, USCF ? I vote for 8 ... cd Cannot stand d5. Don't know what I intend to do after 9. cd, but probably 9 ... Be7 and worry about 10. d5 later. EWG@Cmu-Cs-Ps1, USCF ? The comment that the group of humans won't have a long term strategy is, I think, naieve. It is just as easy for us to analyze lines of play (e.g. kingside vs queenside attack, try to trade off and queen a pawn, etc.) as it is for us to analyze the single position. If anything it's somewhat easier, since we think about that anyway. Why not solicit votes on that level as well and at least report the judgement (if not allowing it to directly choose the move at hand, which would be rash). A suggestion for later in the game, at least. This harkens back to memories of 10 or so years ago when I was still reading the chess books, and ran across a comment by one of the grandmasters (Sam Reshevski, I think?) who liked to play blitz and always used the style of spending a significant time thinking about lines of play at the start of the middle game. His strategy was to have the lines firmly in mind for later play. The comment was that his opponents often got bored waiting for him to reply at that time and wasted the real time; he could then play at blitz pace much better as the game progressed and the opponent struggled for the right line(s) of play. It also had the surface appearance of him putting himself deliberately in time trouble, which wasn't the case. rod@Maryland, USCF 2115 My rating is USCF 2115. I didn't want to enter until you were in the middle game but 7....,e5??? is a mistake. Now, either you allow 9. d5 in which case your queen-knight will be difficult to develop, or you open the game which is very dangerous becouse your king is in the middle and it will take some time to 0-0. If the machine plays right you will end up with an isolated pawn or with d5 which will constraint you. Now here are some of my thoughts: if 8....,cxd5 9cxd4 Nc6 10 Nc3! (no yet d5 so your bishop-king will not go out) and now you are almost forced to get an isolated pawn and the machine is in much better posiiton. In this position oyu may try 10....Qb6 but after 11 dxe dxe 12 Be3! you can't play 12....Qxb2 because of 13 Nb5!+- Let's get back to our initial position. You may try 8...., Nc6 9 Bg5 Rc8 (no 9....,Be7 10d5 Nb8 and the rook can't go out) 10 Na3 Nc6 11 dxe dxe 12 Nc4 Qc7 13 Bxf6 gxf (no 13...,Bxf6 14Nd6+) 14 Ne3 and you are in a very difficult position in spite of the pair of bishops. As you can see is very easy to get out of the book but is much difficult to play well. It much better to think that you are playing the game of your life and that you have to play the best you possible can. Find the best move in every position, no matter who you are playing with. Let's go back again. An interesting move although a little dangerous is the following: 8...., Bc6!? if 9 d5 then 9....,Bd7 you have lost one move but you have close the position so it doesnt matter that much. You will then develop your Q-Knight via a6-c7 and then try b5, a5 and c4. Here comes the interesting part 9 dxe Nxe4 10 exd Qxd6 and no 10...,Bxd6 11 Qc2!! (no 11Kfd2 0-0! 12Kxe4 Bxe4 13Rxe4 Bxh2+! FORGET the last line. 10...., Bxd6 is good! 11 Ng5 0-0!! 12 Bf4+ Kh8 13 Kf7+ Rxf7 14 Bxf7 Bxh2+!+- You will end up much more developed than the machine. So I think she'll play safely 9 d5. Solicitation ------------ Your move, please? Replies to Arpanet: mclure@sri-unix or Usenet: sri-unix!mclure. DO NOT SEND REPLIES TO THE ENTIRE LIST! Just send them to one of the above addresses. ------------------------------ End of HUMAN-NETS Digest ************************