mersenneforum.org  

Go Back   mersenneforum.org > Factoring Projects > Factoring

Reply
 
Thread Tools
Old 2022-05-29, 03:20   #56
a1call
 
a1call's Avatar
 
"Rashid Naimi"
Oct 2015
Remote to Here/There

2·11·103 Posts
Default

So you are proposing that there is a central source who creates semiprimes by multiplying 2 known primes. Wouldn’t such a central entity defeat the purpose of blockchains which as I vaguely understand is a decentralizing concept?
Again asking because I don’t know.
Thank you for your patient.

Last fiddled with by a1call on 2022-05-29 at 03:21
a1call is offline   Reply With Quote
Old 2022-05-29, 03:24   #57
VBCurtis
 
VBCurtis's Avatar
 
"Curtis"
Feb 2005
Riverside, CA

123648 Posts
Default

Quote:
Originally Posted by factorn View Post
@a1call
....Just find two large primes and multiply them together......

..... Also, semiprimes are composites without known factors in the FACT0RN PoW design.
How, in your design, are you going to know you're using "strong semiprimes" unless you factor them first? Your system is designed to use numbers without known factors, but you don't have any other way to be sure they're semiprimes.

Good planning. You really have this designed well. You can't even make a feature wishlist without contradicting yourself.
VBCurtis is offline   Reply With Quote
Old 2022-05-29, 03:37   #58
factorn
 
Feb 2022

24·3 Posts
Default

@a1call, I strongly suggest you read the whitepaper. You will learn a lot. Who knows? You might even have to drop the "I don't know" on every post you make of how much you will learn. Save yourself a few dozen questions by reading the whitepaper.


@VBCurtis,

Quote:
How, in your design, are you going to know you're using "strong semiprimes" unless you factor them first?
You are correct. They must be factored first to know they are "strong semiprimes".

Quote:
Your system is designed to use numbers without known factors, but you don't have any other way to be sure they're semiprimes.
The design is: hash the current block data and the last block data to generate a random number W, allow users to submit any number N = |W+wOffset| -- Where |wOffset| < 16* (number of binary digits of W). You must submit N, wOffset and the smallest factor of N. The system checks if N is a strong semiprime from this, if not reject your submission. Note that the W is generated from a known algorithm, so it need not be submitted, the blockchain will know how to generate it.


See appendix A for a full example.



No one could make such a list when statements are taken out of context, not even Kurt Gödel. I would suggest reading more carefully perhaps?

Last fiddled with by factorn on 2022-05-29 at 03:38
factorn is offline   Reply With Quote
Old 2022-05-29, 04:15   #59
a1call
 
a1call's Avatar
 
"Rashid Naimi"
Oct 2015
Remote to Here/There

2·11·103 Posts
Default

What is the advantage of:

* Having a source that creates semiprimes from known primes and is subject to hacking, insider-leaks/cheats and otherwise accessing the same known source primes via figuring its generating algorithm/s

Over:

* Using any of the following !PRP's which have remained !factored for centuries and yet are regularly factored by folks around here with gradual progress:

https://www.mersenne.ca/prp.php?show...=1000&max=4000

?

Last fiddled with by a1call on 2022-05-29 at 04:32
a1call is offline   Reply With Quote
Old 2022-05-29, 04:35   #60
factorn
 
Feb 2022

608 Posts
Default

@a1call
It is good to see you move from "I don't know nor have I read the FACT0RN Blockchain whitepaper, but let me ask basic questions" to "I still haven't read your whitepaper nor can I be bothered to, but let me still ask basic questions". Progress? I guess?
Quote:
* Having a source that creates semiprimes from known primes and is subject to hacking and otherwise accessing the same known source primes via figuring its generating algorithm
Speaking from ignorance is so wonderful, isn't it? If only there were a whitepaper that talked about this stuff? Nonetheless, here we go:
1. known by whom?
2.Technically, what isn't subject to hacking?
3. Try reversing sha3-512, Whirpool, shake2b and Scrypt simultaneously...see how that goes.
4. An attack using hashing is described in the paper along with its cost...its cheaper to factor. Who knows? Reading the whitepaper might help. Just saying.


You have clearly not read this thread in its entirety. That point was addressed previously. Just to name a few: it has a several technical loopholes, security holes, missing properties and impractical impediments. But, who am I? I am just some uneducated idiot on the internet, apparently.

Last fiddled with by factorn on 2022-05-29 at 04:35
factorn is offline   Reply With Quote
Old 2022-05-29, 05:18   #61
Batalov
 
Batalov's Avatar
 
"Serge"
Mar 2008
Phi(4,2^7658614+1)/2

9,901 Posts
Default

Quote:
Originally Posted by factorn View Post
I am just some uneducated idiot on the internet, apparently.
Passive-aggressiveness is a great way to influence people and win new friends
...not.
Batalov is offline   Reply With Quote
Old 2022-05-29, 07:09   #62
a1call
 
a1call's Avatar
 
"Rashid Naimi"
Oct 2015
Remote to Here/There

2·11·103 Posts
Default

Well I did try to read the PDF, but 12 pages of the complex subject is too much for my resources.
I am asking genuine questions so please do not take my posts personally.
I did some thinking and what I can figure that may or may not be what you are intending is that:
You have block chains that take random numbers of specific size and test them to be PRP’s. This is done in a distributed network and not a centralized server. Upon finding two such PRP’s per node a/many semiprime/s is/are generated and then are mined/factored by miners. So in effect you are replacing the SHA-256-hash encryption by “encrypting” 2 random PRP’s into a semiprime. That’s what I can figure with my limited knowledge.
Regardless, thank you for your posts.

ETA: I assume the advantage of constructed semiprimes over using existing composites without known factors would be that you can adjust the difficulty level at will.

Last fiddled with by a1call on 2022-05-29 at 07:19
a1call is offline   Reply With Quote
Old 2022-05-29, 10:42   #63
factorn
 
Feb 2022

24×3 Posts
Default

Quote:
Originally Posted by Batalov View Post
Passive-aggressiveness is a great way to influence people and win new friends
...not.
If you read this thread and never read past the second page of posts you will walk away with the impression that indeed I am an uneducated idiot. If you add the private messages I receive its get even worse faster than you can say "passive aggressiveness". So, that was an observation.


@a1call
There is no testing of any kind by the blockchain when generating the number around which miners will look for primes. It literally generates a pseudo random number using hashing. That's it. No testing whatsoever. It is the job of the miner to find a strong semiprime around that pseudo-random number generated within the very limited range around it that is allowed. If nothing is found in around the number, generate another pseudo-random number and try again until you do.There is no coordination either for generating the pseurandom number. There is a way in which after you submit all the work, everyone else can confirm that what you have submitted is valid and that you did not defraud the system.

The testing is done after you submit a solution to make sure that your submission is within the limited range you were allowed to search for, that your prime actually divides the generated random number plus the offset you submitted, and that both factors are reasonably prime (50 rounds Miller-Rabin plus Baillie-PSW Primality Test).

The reason it must be this way is that, if anything changes in the block being submitted then the random number generated will change, which means that the solution will change, which means that the block will be rejected, which means people cannot steal rewards, or maliciously change anything unless they mine the block properly....that's why the security of the block is tied to the this process...also why the work must be the same at every difficulty level for long as the computational power of the blockchain remains at that level.

Last fiddled with by factorn on 2022-05-29 at 10:43
factorn is offline   Reply With Quote
Old 2022-05-29, 11:51   #64
a1call
 
a1call's Avatar
 
"Rashid Naimi"
Oct 2015
Remote to Here/There

2×11×103 Posts
Default

Are you saying that, the “puzzle” to solve by miners, is to find semiprimes within some given set parameters (size, range, factors-separation/offset) by performing factoring and subsequent primality tests, rather than factoring some given semiprimes?
a1call is offline   Reply With Quote
Old 2022-05-29, 12:09   #65
factorn
 
Feb 2022

24×3 Posts
Default

Quote:
Originally Posted by a1call View Post
Are you saying that, the “puzzle” to solve by miners, is to find semiprimes within some given set parameters (size, range, factors-separation/offset) by performing factoring and subsequent primality tests, rather than factoring some given semiprimes?
Correct. The miner's job is to find semiprimes by way of factoring/sieving within some parameters rather than factoring a given semiprime or simply generating a semiprime.
factorn is offline   Reply With Quote
Old 2022-05-29, 16:46   #66
chalsall
If I May
 
chalsall's Avatar
 
"Chris Halsall"
Sep 2002
Barbados

294F16 Posts
Default

Quote:
Originally Posted by factorn View Post
Correct. The miner's job is to find semiprimes by way of factoring/sieving within some parameters rather than factoring a given semiprime or simply generating a semiprime.
The more I read people's questions, and the answers you (sometimes) give, the less and less I think your idea will ever be useful. To anyone.

Also, it is not useful to get emotional when defending an idea. Particularly when more and more holes are pointed out in said idea.
chalsall is offline   Reply With Quote
Reply

Thread Tools


Similar Threads
Thread Thread Starter Forum Replies Last Post
Why integer factorization is in P/FP? tetramur Factoring 4 2019-01-23 20:51
Integer factorization? bearnol2 Information & Answers 7 2010-12-09 02:50
Integer factorization with q < 2p mgb Math 36 2009-11-07 15:59
Integer Factorization mgb Math 16 2007-12-17 10:43
Integer Factorization 2 mgb Math 5 2007-07-23 12:55

All times are UTC. The time now is 01:05.


Tue Aug 9 01:05:37 UTC 2022 up 32 days, 19:52, 1 user, load averages: 0.80, 1.00, 1.02

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2022, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.

≠ ± ∓ ÷ × · − √ ‰ ⊗ ⊕ ⊖ ⊘ ⊙ ≤ ≥ ≦ ≧ ≨ ≩ ≺ ≻ ≼ ≽ ⊏ ⊐ ⊑ ⊒ ² ³ °
∠ ∟ ° ≅ ~ ‖ ⟂ ⫛
≡ ≜ ≈ ∝ ∞ ≪ ≫ ⌊⌋ ⌈⌉ ∘ ∏ ∐ ∑ ∧ ∨ ∩ ∪ ⨀ ⊕ ⊗ 𝖕 𝖖 𝖗 ⊲ ⊳
∅ ∖ ∁ ↦ ↣ ∩ ∪ ⊆ ⊂ ⊄ ⊊ ⊇ ⊃ ⊅ ⊋ ⊖ ∈ ∉ ∋ ∌ ℕ ℤ ℚ ℝ ℂ ℵ ℶ ℷ ℸ 𝓟
¬ ∨ ∧ ⊕ → ← ⇒ ⇐ ⇔ ∀ ∃ ∄ ∴ ∵ ⊤ ⊥ ⊢ ⊨ ⫤ ⊣ … ⋯ ⋮ ⋰ ⋱
∫ ∬ ∭ ∮ ∯ ∰ ∇ ∆ δ ∂ ℱ ℒ ℓ
𝛢𝛼 𝛣𝛽 𝛤𝛾 𝛥𝛿 𝛦𝜀𝜖 𝛧𝜁 𝛨𝜂 𝛩𝜃𝜗 𝛪𝜄 𝛫𝜅 𝛬𝜆 𝛭𝜇 𝛮𝜈 𝛯𝜉 𝛰𝜊 𝛱𝜋 𝛲𝜌 𝛴𝜎𝜍 𝛵𝜏 𝛶𝜐 𝛷𝜙𝜑 𝛸𝜒 𝛹𝜓 𝛺𝜔