To: stripes1776
If now there is some algorithm that can predict where those primes exist, them it would be possible to use that algorithm to break the public key. Good-bye security.I am mathematically challenged but if it can be used to break a current key, could not the decoders go back to previous messages and break them also? If so, lots of new worriesd in the intelligence community.
45 posted on
05/10/2009 7:56:22 PM PDT by
Oatka
("A society of sheep must in time beget a government of wolves." –Bertrand de Jouvenel)
To: Oatka
I am mathematically challenged but if it can be used to break a current key, could not the decoders go back to previous messages and break them also? If so, lots of new worriesd in the intelligence community.Yes, I think you are correct. If you could use an algorithm to break a key, it would not matter when that key was generated--now, in the past, in the future.
47 posted on
05/10/2009 8:29:50 PM PDT by
stripes1776
("That if gold rust, what shall iron do?" --Chaucer)
To: Oatka
I am mathematically challenged but if it can be used to break a current key, could not the decoders go back to previous messages and break them also? If so, lots of new worries in the intelligence community. The common practice is to use of level of encryption that is unbreakable before the value of the information expires. If a message details troop movements tomorrow morning, but takes a week to crack, that is good enough. Just because you figured out the key for one message, you haven't accomplished much. The keys will be changed before the next message goes out.
49 posted on
05/10/2009 8:36:52 PM PDT by
Myrddin
To: Oatka
I am mathematically challenged but if it can be used to break a current key, could not the decoders go back to previous messages and break them also? If so, lots of new worriesd in the intelligence community. We were doing that with the Soviets after the second world war.
http://en.wikipedia.org/wiki/VENONA
50 posted on
05/10/2009 8:42:24 PM PDT by
Brellium
("Thou shalt not shilly shally!" Aron Nimzowitsch)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson