Hacker News new | past | comments | ask | show | jobs | submit login

That's a great example of using a problem solver system to solve a constraint satisfaction problem! It was a fun read.

One nit to pick with the terminology though: solving a cryptogram puzzle is _not the same thing_ as doing cryptanalysis, eg to determine what constitutes a weak DES key. Not even the same ballpark. ;)




Author here: Hello 60654, I fully understand the difference between cracking a run length encoding problem and finding weaknesses in DES. There are many tools at the disposal of a security analyst. Another would be CSP and FDR: https://www.google.com.au/url?sa=t&source=web&rct=j&url=http.... However, that article, like mine, goes to show how logic programming can very well be used to mount cryptanalytic attacks. It differs from quantitative statistical methods as these exploit different weaknesses. Qualitative vs quantitative. Most of the people with skills in the latter work in quantitative trading and hedge funds - including yours truly.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: