Prev: At the extreme of gravity there is a limit
Next: As the length of the list of computable reals->oo, the length of all possible digit sequences on the list->oo.
From: big gus on 1 Jul 2010 23:38 "JSH" <jstevh(a)gmail.com> wrote in message news:57f00266-ebf4-49c6-a844-e16151aa6eb0(a)z15g2000prn.googlegroups.com... > My concern has been that fundamental equations in modular arithmetic > could be exploited rather quickly and it appears with my latest > efforts that that concern may be correct. > > With the approach to discrete logarithms I've found it appears you CAN > optimize the approach, and even though that involves looking for > factors q^2 mod N, near N^2, it appears that it's easy to come up with > a method that would allow factoring numbers on that scale as it's NOT > a factorization where you don't have more tools from the idea itself. > > Some of you may think this situation is a game. I assure you it is > not. > > My own hope had been that the research was far away from a trivial > optimization but it appears that it is closer than I realized. > > I would assume that there are people who are aware of that now as > well. > > It's not clear to me what to do, but my own hope is that some clear > heads will realize the need to notify the US Government. > > Unfortunately there may be enough in postings for a clever person to > work out the details, which was not my wish, but things worked out > faster than I realized until after postings. I often get my best > ideas after posting. > > Some sensible person needs to maybe quietly do their own tests and > notify the US Government. There is no need to post about it on > Usenet. I will not post further if I can help it after this post, and > will not explain further, but may post again as I see necessary to try > and help someone understand the seriousness of the situation. > > Worst case can be a collapse of military grade encryption worldwide. Wrong. Military does not use "products of numbers" for encryption, they use entirely different techniques, factoring is not used. > > NO ONE is to use said information for stock trading. Or for any > financial gain. The money will just be taken back from you later > anyway. No problem, factoring is not used in stock trading, figuring perhaps, complex algorithums, but no factoring. > > Nations who get this message should simply go to procedures put in > place for such an eventuality. World will probably be on various > stages of high alert, indefinitely. rest easy, JSH, the Nations of the world use different techniques and far longer codes than us civilians do, it is easy with memory being cheap, and processing power These are free for anyone, even spys, http://www.thefreecountry.com/sourcecode/encryption.shtml. like the following, SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #8, PKCS #9, PKCS #10, PKCS #11, PKCS #12, S/MIME, X 509 v3 certificates, RSA, DSA, Triple DES, DES, RC2, RC4, SHA-1, MD2, MD5, RC6, MARS, Rijndael, Twofish, Serpent, IDEA, DES, Triple DES (DES-EDE2 and DES-EDE3), DESX (DES-XEX3), RC2, RC5, Blowfish, Diamond2, TEA, SAFER, 3-WAY, GOST, SHARK, CAST-128, Square, CBC padded, CBC ciphertext stealing (CTS), CFB, OFB, counter mode, ARC4, SEAL, WAKE, Sapphire, BlumBlumShub, RSA, DSA, ElGamal, Nyberg-Rueppel (NR), BlumGoldwasser, Rabin, Rabin-Williams (RW), LUC, LUCELG, Elliptic Curve Cryptosystems, PKCS#1 v2.0, OAEP, PSSR, IEEE P1363 EMSA2, Diffie-Hellman (DH), Unified Diffie-Hellman (DH2), Menezes-Qu-Vanstone (MQV), LUCDIF, SHA-1, MD2, MD5, HAVAL, RIPEMD-160, Tiger, MD5-MAC, HMAC, XOR-MAC, CBC-MAC, DMAC, Luby-Rackoff, MDC, ANSI X9.17 appendix C, PGP's RandPool (for pseudo random number generation, PRNG), Shamir's secret sharing and Rabin's information dispersal schemes, DEFLATE (the gzip/zip/unzip compression), 32 bit CRC, prime number generation and verification, etc > > > James Harris
From: Jamie on 2 Jul 2010 09:42
idiot |