![]() |
![]() |
#12 |
Tribal Bullet
Oct 2004
67438 Posts |
![]()
Random paper on this subject
This is a nice paper, because it's an interesting question and AFAIK has only previously been addressed by some of the tinfoil hat crowd in sci.crypt. Note that the author presumes that breaking RSA would threaten to cause armageddon, which I don't think is warranted. Nonetheless, I think that if you can break RSA in polynomial time, you should - forget about becoming rich or famous - anonymously publish the factorization of RSA2048 - (year later, if ever) anonymously publish the algorithm The first step is necessary to help ensure your continued safety and that of your loved ones. Make sure to use lots of anonymous proxies chained together :) Last fiddled with by jasonp on 2009-03-20 at 17:16 |
![]() |
![]() |
![]() |
#13 |
Jul 2006
Calgary
6518 Posts |
![]()
You propose we should call a moritorium on researching factoring algorithms so that encryption such as RSA can continue to protect stuff like our banking system.
It seems obvious that if all the morally "good" people quit looking for ways to break our cherished current way of life that it means the only people who will discover such are "bad" people. If some "good" people would have thought a bit more about flying airplanes into buildings then perhaps we would have been able to prevent some "bad" people from doing so. Or are you saying we should keep such research secret. Should we restrict such knowledge to those like the CIA and NSA who persue such professionally and keep the results to themselves secret from both the good guys and the bad? The problem I see with this is we are many and they are few. They may be good at it but we have numbers and can chase ideas for which they lack time, people and money. There remains also a problem, what does the CIA or NSA do when they see a problem? They keep it secret which sometimes implies not fixing the problem in order to keep it secret. The secrecy becomes more important than fixing the problem. If they're not going to keep it secret then why not just do the whole thing in the open? Last fiddled with by lfm on 2009-03-24 at 10:01 |
![]() |
![]() |
![]() |
#14 | ||||
"Bob Silverman"
Nov 2003
North of Boston
22×1,877 Posts |
![]() Quote:
It assumes facts that are not in evidence and shows gross ignorance on the part of the O.P. RSA is not used for encryption. It is used for key establishment and digital signatures. It is easily replaced by (say) DH, DSA, or EC based schemes. SSL would be temporarily interrupted until it is reconfigured with a different algorithm, and certifying authorities would need to resign certificates with a different signature scheme. It would be a minor, temporary nusisance. Quote:
Quote:
responsibilities are. And the CIA neither invents nor breaks ciphers. Quote:
The answer is that they DON'T keep it secret. Look up Kerchoff's principles. Look up what is published on the NSA's web site. It is always assumed that one's methods are known. One does not rely upon keeping the algorithm secret. |
||||
![]() |
![]() |
![]() |
#15 | ||
"Bob Silverman"
Nov 2003
North of Boston
22×1,877 Posts |
![]() Quote:
Quote:
I certainly would NOT worry about my safety. And I could make a lot of money from it. [consider the stock market; what would happen to the price of stock of security companies in the short term???]. And why would anyone sane care about becoming famous? The satisfaction would lie in having solved a well-known and old mathematical problem. It would enhance one's reputation among mathematicians, and might get one an academic position, but that is hardly 'fame'. This entire discussion represents a lot of ignorant and unjustified paranoia. Last fiddled with by R.D. Silverman on 2009-03-24 at 12:37 Reason: fixed typo |
||
![]() |
![]() |
![]() |
#16 | |
"Bob Silverman"
Nov 2003
North of Boston
22·1,877 Posts |
![]() Quote:
would create GREAT, GREAT, GREAT problems: a fast method for discrete logs in a general ring. |
|
![]() |
![]() |
![]() |
#17 |
Tribal Bullet
Oct 2004
32·5·79 Posts |
![]()
Antivirus company employees have started needing to keep a low profile, because international organized crime has now moved into the malware business. You think the same is impossible when the world's intelligence agencies threaten to become involved? You should have seen the number of non-mathematicians at CADO.
As with most things, I think the true impact of a fast factoring algorithm lies between the two extremes of 'armageddon' and 'nothing'. |
![]() |
![]() |
![]() |
#18 |
(loop (#_fork))
Feb 2006
Cambridge, England
2×7×461 Posts |
![]()
Affiliations at factoring conferences are always fun to look for, and the attendees list is an excellent way to pick up the addresses of the NSA-equivalents of most of Europe. I wonder if anyone got a decent photo of the two Russian gentlemen at CADO?
Attending such things as a private citizen, so without an affiliation on your badge, gets you some interesting looks ... (SHARCS seems to be over; if there's to be a CADO conference this year I'd have expected an announcement by now, but there might be something in 2010) |
![]() |
![]() |
![]() |
#19 |
"Nancy"
Aug 2002
Alexandria
2,467 Posts |
![]()
There are no plans for another CADO workshop at the moment. This doesn't completely rule out that there'll be another one... but we haven't planned anything at this time.
Alex |
![]() |
![]() |
![]() |
#20 | ||
Oct 2005
Fribourg, Switzerlan
FC16 Posts |
![]() Quote:
Please, read the thread. Questions were asked, that's all. |
||
![]() |
![]() |
![]() |
#21 |
May 2009
Loughborough, UK
1011002 Posts |
![]()
CADO = ?
One time pads are provably secure, and used in many military applications. Pink Floyd's Dark Side Of The Moon CD (with the white space taken out and a suitable smoothing function gives half a gigabyte of encryption and gives a choice of start point and skip length. |
![]() |
![]() |
![]() |
Thread Tools | |
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Is it worth persisting with this machine? | stebbo | Hardware | 6 | 2017-05-27 04:05 |
How to (is it worth?) fix GTX580 with sucky fans | fivemack | GPU Computing | 25 | 2016-03-01 01:02 |
Is it worth keeping the relations? | fivemack | Factoring | 2 | 2013-05-19 18:40 |
Successful TF worth more than unsuccessful TF?! | NBtarheel_33 | PrimeNet | 5 | 2010-06-17 00:17 |
Worth running on Atom? | db597 | Hardware | 8 | 2009-01-28 09:45 |