{"id":3918,"date":"2013-09-16T14:20:24","date_gmt":"2013-09-16T14:20:24","guid":{"rendered":"http:\/\/pimedios.es\/?p=3918"},"modified":"2013-09-16T14:20:24","modified_gmt":"2013-09-16T14:20:24","slug":"un-fallo-en-la-utilizacion-de-la-asymptotic-equipartition-property","status":"publish","type":"post","link":"http:\/\/pimedios.jesussoto.es\/?p=3918","title":{"rendered":"Un fallo en la utilizaci\u00f3n de la Asymptotic Equipartition Property"},"content":{"rendered":"<p><a href=\"http:\/\/noticiasdelaciencia.com\/upload\/img\/periodico\/img_15598.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3919\" alt=\"muriel\" src=\"http:\/\/pimedios.es\/wp-content\/uploads\/2013\/09\/muriel.jpg\" width=\"300\" height=\"199\" \/><\/a>NCYT (Noticiasdelaciencia.com \/ Amazings.com) nos informan sobre una presunci\u00f3n que durante los comienzos de la Teor\u00eda de la Informaci\u00f3n se consider\u00f3 cierta y ahora han probado que no lo es. La noticia, titulada\u00a0<a href=\"http:\/\/noticiasdelaciencia.com\/not\/8231\/_un_fallo_de_encriptacion_arrastrado_durante_65_anos_\/\" target=\"_blank\">\u00bfUn fallo de encriptaci\u00f3n arrastrado durante 65 a\u00f1os?<\/a>, no aclara cu\u00e1l es el fallo en la encriptaci\u00f3n.<\/p>\n<p>Una lectura, no muy detallada, del art\u00edculo <a href=\"http:\/\/arxiv.org\/pdf\/1301.6356.pdf\" target=\"_blank\"><em>Brute force searching, the typical set and Guesswork<\/em><\/a>, \u00a0muestran que la aplicaci\u00f3n del teorema de\u00a0<a href=\"http:\/\/mathworld.wolfram.com\/AsymptoticEquipartitionProperty.html\" target=\"_blank\">Asymptotic Equipartition Property<\/a>(AEP) a la encriptaci\u00f3n es err\u00f3neo y, por consiguiente, las deducciones que se deriven de \u00e9l.<\/p>\n<p>M\u00e1s esclarecedor es el pen\u00faltimo p\u00e1rrafo: \u00abEl equipo de Ken Duffy, Mark Christiansen, Muriel M\u00e9dard y Fl\u00e1vio du Pin Calmon duda que el fallo en la hip\u00f3tesis de uniformidad signifique que los sistemas de encriptaci\u00f3n de uso com\u00fan hoy en d\u00eda adolecen de brechas graves de seguridad. Lo que si puede ocurrir es que algunos de ellos sean un poco menos seguros de lo que esper\u00e1bamos\u00bb.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Puesta en duda el uso de la Asymptotic Equipartition Property(AEP) en criptograf\u00eda<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[89],"class_list":["post-3918","post","type-post","status-publish","format-standard","hentry","category-actualidad","tag-criptografia","entry"],"_links":{"self":[{"href":"http:\/\/pimedios.jesussoto.es\/index.php?rest_route=\/wp\/v2\/posts\/3918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/pimedios.jesussoto.es\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/pimedios.jesussoto.es\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/pimedios.jesussoto.es\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/pimedios.jesussoto.es\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3918"}],"version-history":[{"count":2,"href":"http:\/\/pimedios.jesussoto.es\/index.php?rest_route=\/wp\/v2\/posts\/3918\/revisions"}],"predecessor-version":[{"id":3921,"href":"http:\/\/pimedios.jesussoto.es\/index.php?rest_route=\/wp\/v2\/posts\/3918\/revisions\/3921"}],"wp:attachment":[{"href":"http:\/\/pimedios.jesussoto.es\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/pimedios.jesussoto.es\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3918"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/pimedios.jesussoto.es\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}