Nevertheless there are some drawbacks to the concrete security approach.
For one thing,
the concrete security approach doesn't really lead to a clean theory.
It's a little hard to go into the details of why that's the case.
You may have a better sense of why this is the case after the,
after you take the rest of this course.
But one thing we can immediately observe is that the parameter t is
very sensitive to the exact computational model.
Right, if we measure t in terms of years, then we have to be
concerned with what kind of computer the attacker is running on.
Whether the attacker is running, computers in parallel.
Whether the attacker is using, a particular operating system.
Whether they're using a particular type of machine,
a particular programming language.
And all these details will impact ultimately the values of t
that we care about.
Now this is actually a problem that we must deal with in the real world.
In the real world we have to worry about some particular attacker.
And we may actually want to know what machine they're running on,
what programming language they're using.
And whether they're running sequentially or
whether they're running a bunch of mis, machines in parallel.
Nevertheless, from a theoretical point of view, it makes things rather messy.