Exploiting Our Limits: Finitude in Information Security

About Exploiting Our Limits: Finitude in Information Security

Authors Pohly, Devin J.
Date 2023
Conference 23rd Biennial Conference
Proceedings ACMS Journal and Proceedings
Vol / Pages Vol. 23 pp. 225-238
URL https://acmsonline.org/wp-content/uploads/2023/05/journal-and-proceedings-2023.pdf

Type: Conference Paper

Tags: Algorithms, Barth, complexity, computability, computers, encryption, finitude, information theory, modeling, public-key cryptography, security, Technology, Theology, Tillich

Abstract

It is easy to interpret human limits in a negative light, but viewing them instead as a gift from God can reveal blessings that might otherwise be taken for granted. This paper examines the field of information security, discovering that many of its fundamental principles and techniques are designed to account for our created finitude and exploit it toward productive ends. Using this lens, we can appreciate more fully the God-given gift of creaturely finitude. [A]