Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: SJackson; Lazamataz; Nick Danger; Sabertooth; section9; Travis McGee; blam; yonif
"Mathematicians could be on the verge of solving two separate million dollar problems. If they are right - still a big if - and somebody really has cracked the so-called Riemann hypothesis, financial disaster might follow. Suddenly all cryptic codes could be breakable."

That is such typical, uneducated, Eurotrash nonsense.

Ironically, that's the same sort of thinking that had the Germans believing that their Enigma codes were unbreakable in WW2.

But here's the dish: back in WW1, the Great War, an American mathematician proved which codes *can* be broken and which codes *can't* be broken (apparently, Old Europe still hasn't found time to add this mathematical proof into their textbooks).

In 1917, this young American was able to show, mathematically, that to be unbreakable to a brute force attack, your cypher needed to have a completely random key, a key that was longer than the message being transmitted, and that the key could never again be re-used.

Now, no matter what mathematical puzzles are solved, you still aren't going to be able to break a cypher that follows the above proof.

Sheesh...

5 Legislative Days Left Until The AWB Expires

9 posted on 09/06/2004 5:13:59 PM PDT by Southack (Media Bias means that Castro won't be punished for Cuban war crimes against Black Angolans in Africa)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Southack

13 posted on 09/06/2004 5:26:54 PM PDT by rdb3 ("The Republican Party is the ship and all else is the sea." ---Frederick Douglass)
[ Post Reply | Private Reply | To 9 | View Replies ]

To: Southack

Yeah, but that type of encryption, a 'one time pad' is extremely inconveinient to put to practical use. It would be nearly impossible to put to use on the internet as a preplacement for public key encryption.


17 posted on 09/06/2004 5:29:16 PM PDT by seeken
[ Post Reply | Private Reply | To 9 | View Replies ]

To: Southack

I thought they had already solved this in Robert Redford's leading role in movie SNEAKERS???? Have I been misinformed?


32 posted on 09/06/2004 6:11:23 PM PDT by Kackikat
[ Post Reply | Private Reply | To 9 | View Replies ]

To: Southack

The problem with a simple cipher code is that both the sending and the receiving party have to know the key. For millitary or intelligence applications, it may be possible to distribute a key through a secure network to all parties that need the key on a monthly/weekly/daily basis. So encryptions using something like AES may be used for those types of applications.

For e-commerce, there's no easy 'secure network' for distributing unique keys to the all the parties who want to trade information or do business with each other. If the key is transmitted in the first message, then anyone who intercepts the first message can also intercept all the subsequent message. So most e-commerce (including when you type information into a secure web-browser page) makes use of so-called 'public key' encryption techniques.

Public Key encryption schemes are based on finding big prime numbers. An explanation of how public key encryption works, with only one very simple equation, goes like this. Let: C = A x B, where A and B are very big prime numbers. By very big, we might mean 40, 50, or 60 digits long. The public key is C, which you can give out to the whole world, so that they can send you encrypted messages. However, the public key C only lets you encypt the message; it doesn't let you decrypt. In order to decrypt the message, you have to know A or B. Thus your computer can tell anyone in the world how to send it an encrypted message, but only your own computer knows the private keys A & B needed to decrypt the message.

For somebody to intercept the message, they need to know not only know the public key C, but also the two prime factors A & B. If C is 100 digits long, finding those factors is VERY difficult. A computer using a brute force technique (trying every number to see if it divides into C) would take many years to find A & B.

This is where the Reimann Hypothesis comes in, because it says certain things about how prime numbers are distibuted. If the Reimann Hypothesis is proved true for very large numbers, then perhaps there are smarter ways to go about searching for A & B. If instead of checking every number, a bad guy has to check only certain ranges of numbers where A & B are likely to be, it might perhaps be possible to finish the search process in a much shorter period of time, and the public key encryption systems in use today may not be nearly as secure as people believe.

That said, the world banking system isn't going to crumble overnight because of those darn mathematicians. The Reimann Hypothesis does not provide a listing of all the prime numbers, just merely a description of their distribution. It is not clear that knowing the distribution will drastically reduce the time to break specific encryption keys, or that just doubling the number of digits in the keys wouldn't be an effective countermeasure to more efficient searching. The Reimann Hypothesis has already been known for about 100 years, and most mathematicians already believe it to be true. All the mathematicians are debating is whether someone has rigorously proved it.


49 posted on 09/06/2004 6:36:31 PM PDT by CaptainMorgantown
[ Post Reply | Private Reply | To 9 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson