Linked by Thom Holwerda on Fri 23rd Sep 2011 22:22 UTC, submitted by kragil
Windows The story about how secure boot for Windows 8, part of UEFI, will hinder the use of non-signed binaries and operating systems, like Linux, has registered at Redmond as well. The company posted about it on the Building Windows 8 blog - but didn't take any of the worries away. In fact, Red Hat's Matthew Garrett, who originally broke this story, has some more information - worst of which is that Red Hat has received confirmation from hardware vendors that some of them will not allow you to disable secure boot.
Thread beginning with comment 490881
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[8]: RSA key example.
by Alfman on Tue 27th Sep 2011 06:59 UTC in reply to "RE[7]: RSA key example."
Alfman
Member since:
2011-01-28

Neolander,

"So when calculating a hash, a function that's relatively easy to reverse in itself is typically applied a large number of times on the incoming data"


I can't say for sure that this is true of all hash functions, but it is of the SHA variants (and many block ciphers as well). Keep in mind that a major design goals for these functions is that they run well on ordinary 32bit CPUs where it'd be relatively difficult to achieve sufficient diffusion using standard opcodes in one pass.

"Just need to get used to a new form of logic (I think I've read somewhere that quantum computers cannot compute operations which destroy information, like AND or OR, and thus require use of new logic gates and reasoning)."

Yep, that's the stuff I need to learn about. I have no excuse not to learn it (other than time).

[deleted rambling personal story]

Reply Parent Score: 2