From: big gus on

"JSH" <jstevh(a)gmail.com> wrote in message
news:57f00266-ebf4-49c6-a844-e16151aa6eb0(a)z15g2000prn.googlegroups.com...
> My concern has been that fundamental equations in modular arithmetic
> could be exploited rather quickly and it appears with my latest
> efforts that that concern may be correct.
>
> With the approach to discrete logarithms I've found it appears you CAN
> optimize the approach, and even though that involves looking for
> factors q^2 mod N, near N^2, it appears that it's easy to come up with
> a method that would allow factoring numbers on that scale as it's NOT
> a factorization where you don't have more tools from the idea itself.
>
> Some of you may think this situation is a game. I assure you it is
> not.
>
> My own hope had been that the research was far away from a trivial
> optimization but it appears that it is closer than I realized.
>
> I would assume that there are people who are aware of that now as
> well.
>
> It's not clear to me what to do, but my own hope is that some clear
> heads will realize the need to notify the US Government.
>
> Unfortunately there may be enough in postings for a clever person to
> work out the details, which was not my wish, but things worked out
> faster than I realized until after postings. I often get my best
> ideas after posting.
>
> Some sensible person needs to maybe quietly do their own tests and
> notify the US Government. There is no need to post about it on
> Usenet. I will not post further if I can help it after this post, and
> will not explain further, but may post again as I see necessary to try
> and help someone understand the seriousness of the situation.
>
> Worst case can be a collapse of military grade encryption worldwide.

Wrong.
Military does not use "products of numbers" for encryption, they use
entirely different techniques, factoring is not used.

>
> NO ONE is to use said information for stock trading. Or for any
> financial gain. The money will just be taken back from you later
> anyway.

No problem, factoring is not used in stock trading, figuring perhaps,
complex algorithums, but no factoring.


>
> Nations who get this message should simply go to procedures put in
> place for such an eventuality. World will probably be on various
> stages of high alert, indefinitely.

rest easy, JSH, the Nations of the world use different techniques and far
longer codes than us civilians do, it is easy with memory being cheap, and
processing power

These are free for anyone, even spys,
http://www.thefreecountry.com/sourcecode/encryption.shtml. like the
following, SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #8, PKCS #9, PKCS #10,
PKCS #11, PKCS #12, S/MIME, X 509 v3 certificates, RSA, DSA, Triple DES,
DES, RC2, RC4, SHA-1, MD2, MD5, RC6, MARS, Rijndael, Twofish, Serpent, IDEA,
DES, Triple DES (DES-EDE2 and DES-EDE3), DESX (DES-XEX3), RC2, RC5,
Blowfish, Diamond2, TEA, SAFER, 3-WAY, GOST, SHARK, CAST-128, Square, CBC
padded, CBC ciphertext stealing (CTS), CFB, OFB, counter mode, ARC4, SEAL,
WAKE, Sapphire, BlumBlumShub, RSA, DSA, ElGamal, Nyberg-Rueppel (NR),
BlumGoldwasser, Rabin, Rabin-Williams (RW), LUC, LUCELG, Elliptic Curve
Cryptosystems, PKCS#1 v2.0, OAEP, PSSR, IEEE P1363 EMSA2, Diffie-Hellman
(DH), Unified Diffie-Hellman (DH2), Menezes-Qu-Vanstone (MQV), LUCDIF,
SHA-1, MD2, MD5, HAVAL, RIPEMD-160, Tiger, MD5-MAC, HMAC, XOR-MAC, CBC-MAC,
DMAC, Luby-Rackoff, MDC, ANSI X9.17 appendix C, PGP's RandPool (for pseudo
random number generation, PRNG), Shamir's secret sharing and Rabin's
information dispersal schemes, DEFLATE (the gzip/zip/unzip compression), 32
bit CRC, prime number generation and verification, etc




>
>
> James Harris


From: Jamie on
idiot