[e2e] Re: [Tsvwg] Really End-to-end or CRC vs everything else?

David P. Reed dpreed at reed.com
Mon Jun 11 14:42:06 PDT 2001

At 04:48 PM 6/11/01 -0400, Craig Partridge wrote:
>I think you've missed the point.  In a prior note, you suggested a line of
>thinking of assume an adversary.  Implicitly, that's an error model.

You're right, it's a model.  But there are advantages in not forcing the 
model to be statistical.  Instead you can bound, say, the adversary's 
computational complexity - which is what you do when thinking about a 
cryptographic adversary, since inversion of one-way functions is blocked by 
computational complexity considerations.

When you are trying to think through what kinds of errors software and 
hardware design flaws might introduce, it helps to classify them by 
computational complexity - it takes resources to screw stuff up in a 
complicated way.

The computational complexity needed to screw up cryptographic hash is known 
to be high, whereas there are computationally simple functions that can 
screw up  simple checksums.

More information about the end2end-interest mailing list