With the revelation that NSA and other agencies have worked to crack encryption codes and processes widely used by industry and the internet, coupled with their efforts to deliberately insert weaknesses or backdoors in encryption protocols, the need for encryption techniques that can withstand these attacks seems ever more urgent. Keep in mind that if the NSA can do it, the US isn't the only repository of supercomputers used for the job. Russia has them, China probably is close, and some Asian countries can bring computer power to bear, which places all encryption at risk.
I was at a recent seminar where there was some brief but explicit discussion by "hacker types" of something they called "mutating encryption," where the encryption software changes itself without outside triggers or intervention. Apparently some of these exploratory encryption software patterns can also self-alter if the software detects an attempt to download the encryption key.
Has anyone else run across this mutating encryption idea elsewhere?
I was at a recent seminar where there was some brief but explicit discussion by "hacker types" of something they called "mutating encryption," where the encryption software changes itself without outside triggers or intervention. Apparently some of these exploratory encryption software patterns can also self-alter if the software detects an attempt to download the encryption key.
Has anyone else run across this mutating encryption idea elsewhere?