#epistemology #computing #computation #rationality #cryptography #encryption-systems #vulnerabilities
# [[Epistemic status]]
#shower-thought
# Related
- [[Philosophy/Rationality/Forecasting]]
- [[Philosophy/Epistemology/Information/The implication of entropy]]
- [[Readwise/Articles/en.wikipedia.org - Second Law of Thermodynamics - Wikipedia]]
- [[Physic/Theory]]
- [[Computing/Cryptocurrency]]
# Determining the priors
Imagine you're playing a guessing game with some friends. You have a few clues, but you're not sure what the answer is. Before you make your final guess, you might think about what you already know about the answer. This is sort of like how researchers in science or math might think about what they know before they guess at an answer.
They call the things they already know "priors." These "priors" can come from their knowledge of the subject or from what other people have studied before. It's important to choose the right "priors" because it can really change the final answer. Scientists and mathematicians have different ways of figuring out what their "priors" should be, but they always try to pick "priors" that make sense and match up with what they believe about the topic they're studying."
Cryptographers use "priors" to make educated guesses about the vulnerabilities of encryption schemes or to think about potential attacks on a system. They might use "priors" about the strength of a particular algorithm, the behavior of attackers, or the characteristics of the data being encrypted. By incorporating these "priors" into their analysis, cryptographers can create stronger and more secure encryption systems that are less likely to be broken by attackers.
What [[The asymmetry of second law of thermodynamics]] imply for cryptography is that it is easier for attackers to break encryption schemes than for defenders to create strong encryption systems. This means that cryptographers must carefully choose their "priors" and continually update their understanding of potential vulnerabilities in encryption systems. They must also be constantly vigilant and proactive in identifying and fixing any weaknesses in their systems as soon as they are discovered. Overall, the asymmetry of the second law of thermodynamics underscores the importance of good "priors" in cryptography and the need for constant innovation and adaptation in the field.