Brute Force is not Ignorance
نویسندگان
چکیده
Chaitin’s notion of program elegance, that is of the smallest program to satisfy some specification, does not explicitly take account of the balance between a formal notation’s expressive power and the richness of its semantics. To explore this wider space of elegance, we are investigating realisations of the Busy Beaver game (BBG) which involves finding programs of given size that produce maximal outputs. Like elegance, BBG is undecidable. Canonically, BBG is represented using Turing machines, but there has been very little investigation into alternative formulations. Thus, we are exploring BBG in a number of classic models of computability, using empirical and analytic heuristics to find optimal BBG instances. Such experiments will be used as a basis for drawing comparisons between the expressive power of Turing machines and other models of computation with a view to gaining a deeper understanding of the expressive power of computer languages. In this paper, we re-introduce the Random Access Stored Program machine (RASP) and build an analogue of the BBG for these machines. Though the BBG for any fixed precision RASP model is trivially computable, the expressivity of the model renders exhaustive search infeasible as we increase the size of our machine. Thus, we explore the space of BBG RASP machines using both brute force and genetic search methods.
منابع مشابه
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملOrdering Selection Operators Using the Minmax Regret Rule
Optimising queries in real-world situations under imperfect conditions is still a problem that has not been fully solved. We consider finding the optimal order in which to execute a given set of selection operators under partial ignorance of their selectivities. The selectivities are modelled as intervals rather than exact values and we apply a concept from decision theory, the minimisation of ...
متن کاملSigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures
Brute force scanning of kernel memory images for finding kernel data structure instances is an important function in many computer security and forensics applications. Brute force scanning requires effective, robust signatures of kernel data structures. Existing approaches often use the value invariants of certain fields as data structure signatures. However, they do not fully exploit the rich ...
متن کاملEncryption Schemes using Finite Frames and Hadamard Arrays
We propose a cipher similar to the One Time Pad and McEliece cipher based on a subband coding scheme. The encoding process is an approximation to the One Time Pad encryption scheme. We present results of numerical experiments which suggest that a brute force attack to the proposed scheme does not result in all possible plaintexts, as the One Time Pad does, but still the brute force attack does ...
متن کاملTOPASE: Detection and Prevention of Brute Force Attacks with Disciplined IPs from IDS Logs
Brute force attacks are used to obtain pairs of user names and passwords illegally by using all existing pairs to login to network services. These are a major security threat faced by network service administrators. In general, to prevent brute force attacks, administrators can set limitations on the number of login trials and shut down the traffic of brute force attacks with an intrusion preve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013