Breakthrough in factoring primes

Discussion in 'other security issues & news' started by Pieter_Arntz, Mar 10, 2003.

Thread Status:
Not open for further replies.
  1. Pieter_Arntz

    Pieter_Arntz Spyware Veteran

    Joined:
    Apr 27, 2002
    Posts:
    13,491
    Location:
    Netherlands
    How does that hurt you?

    I copied al lot of the article since the page is not readable for everyone.

    Many of the world's foremost mathematicians will gather in Palo Alto, California, this month to investigate a recent breakthrough in number theory that could have enormous implications for cryptography and the security of communications and economic transactions on the Internet.

    While the details of the mathematics may be understood by relatively few people, anyone who has ever bought something online and paid by credit card - or anyone who has sent an encrypted message - should pay attention to these developments and what comes next. The security of online communications may be at stake.

    Prime numbers - like 7, 13 and 29 - are evenly divisible only by themselves and 1. Here again, if the number is small, it is relatively easy to determine whether it is prime or not by trying all possible divisors. But when the number is very large, there are too many possibilities to try all of them, and there hasn't been any other way to determine with certainty whether the number is prime. Until now.

    The Indian team's solution was completely unexpected, and it turned out to be relatively simple - only 12 lines of computer code. Its simplicity stunned mathematicians, many of whom wondered aloud how they could have overlooked it all these years.

    As it happens, the RSA cryptosystem, which is most often used to protect Internet communications, uses both prime numbers and factoring. To encrypt a message or a credit card number using RSA, your computer manipulates it using an extremely large number that is the product of two extremely large primes, both of which are kept secret.

    To decrypt the message, you have to know what those two prime factors are. The product of the two primes can be and is made public - hence the name, public-key cryptography - and that is how people are able to send encrypted messages. But only those who know the two prime factors can decrypt it. As long as those two prime factors remain secret, the code is uncrackable, and eavesdroppers can't read the message.

    Public-key cryptography based on primes and factoring has been unbreakable. But the recent achievement in primality testing has made people look again.


    Source: http://www.iht.com/articles/89163.html
     
  2. root

    root Registered Member

    Joined:
    Feb 19, 2002
    Posts:
    1,723
    Location:
    Missouri, USA
    WOW !! :eek:
     
  3. controler

    controler Guest

    Well I will be jiggered. I didn't know Edgar Alan Poe was a cryptographer.

    Also here is the link to the PDF file on the the theory of operation.

    www.cse.iitk.ac.in/primality.pdf.
     
  4. spy1

    spy1 Registered Member

    Joined:
    Dec 29, 2002
    Posts:
    3,139
    Location:
    Clover, SC
    Gee, betcha' military people are messing their britches all over the planet! Pete
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.