About Exploiting Our Limits: Finitude in Information Security
| Authors | Pohly, Devin J. |
|---|---|
| Date | 2023 |
| Conference | 23rd Biennial Conference |
| Proceedings | ACMS Journal and Proceedings |
| Vol / Pages | Vol. 23 pp. 225-238 |
| URL | https://acmsonline.org/wp-content/uploads/2023/05/journal-and-proceedings-2023.pdf |
Type: Conference Paper
Tags: Algorithms, Barth, complexity, computability, computers, encryption, finitude, information theory, modeling, public-key cryptography, security, Technology, Theology, Tillich
Abstract
It is easy to interpret human limits in a negative light, but viewing them instead as a gift from God can reveal blessings that might otherwise be taken for granted. This paper examines the field of information security, discovering that many of its fundamental principles and techniques are designed to account for our created finitude and exploit it toward productive ends. Using this lens, we can appreciate more fully the God-given gift of creaturely finitude. [A]
