Cryptography Reference
In-Depth Information
Herman Munster</a>
<div class="adr">
<span class="type">Work</span>:
<div class="street-address">1313 Mockingbird Lane</div>
<span class="locality">Mockingbird Heights</span>,
<abbr class="region" title="California">CA</abbr>
<span class="postal-code">94301</span>
<div class="country-name">USA</div>
</div>
<div class="tel">
<span class="type">Work</span> +1-650-556-1234
</div>
<div class="tel">
<span class="type">Fax</span> +1-650-556-1235
</div>
<div>Email:
<span class="email">info@munster.com</span>
</div>
</div>
There are similar formats for calendars ( hCalendar ), opinions
( hReview ), social networks ( XFN ), geography ( geo )andafewothers.
All are designed to add the information in a way that will be ignored
by the browser. It will slip by the web browser like a dinosaur because
the web browser isn't looking for it.
21.3.2 Rice's Theorem
One of the more interesting theorems from computer science theory
suggests that it may be theoretically impossible for anyone to exam-
ine a program and determine whether it is packing extra information
in a data file. This theorem is worth mentioning even if it may not
have much practical use.
A casual version of the theorem, due to Henry Gordon Rice, states
that a software program can't be counted on to detect whether an-
other program is conforming to some standard for a file format.
The theorem itself says that the problem is undecidable , a term that
means that the program is guaranteed to halt and give a definitive
answer. If it doesn't halt, it could go on checking, rechecking or look-
ing for some complex answer.
This theorem may help establish a theoretical limit to checking
for secret messages in file formats, but it may not be of practical value
because the theoretical result is based on asking a computer program
to examine itself, a sort of logical tongue-twister that can have odd
Search WWH ::




Custom Search