mersenneforum.org  

Go Back   mersenneforum.org > Fun Stuff > Lounge

Reply
 
Thread Tools
Old 2019-09-27, 02:39   #45
jdcs
 
Sep 2019

23 Posts
Default

Quote:
Originally Posted by a1call View Post
Is decripting-computation-cost a function of high cost of Modular-Exponentiation? Would it be easier/easy to decrypt an RSA encrypted message if you could perform significantly faster Modular-Exponentiation than is possible now, without knowing the private key?
No. The modular exponentiation for decryption does take a little longer than for encryption, but it's plenty fast on any modern computer.

The problem is figuring out WHAT the decryption exponent is. To decrypt an encrypted message c, just compute cd mod M1277. The private key is simply d.

But the only known way to find the value of d requires factoring M1277.
jdcs is offline   Reply With Quote
Old 2019-09-27, 02:45   #46
retina
Undefined
 
retina's Avatar
 
"The unspeakable one"
Jun 2006
My evil lair

22×1,549 Posts
Default

Quote:
Originally Posted by jdcs View Post
The modular exponentiation for decryption does take a little longer than for encryption ...
Sure, if you consider ~70 times longer to be "a little".
retina is online now   Reply With Quote
Old 2019-09-27, 02:54   #47
a1call
 
a1call's Avatar
 
"Rashid Naimi"
Oct 2015
Remote to Here/There

3×5×137 Posts
Default

Quote:
Originally Posted by jdcs View Post
No. The modular exponentiation for decryption does take a little longer than for encryption, but it's plenty fast on any modern computer.

The problem is figuring out WHAT the decryption exponent is. To decrypt an encrypted message c, just compute cd mod M1277. The private key is simply d.

But the only known way to find the value of d requires factoring M1277.

Thank you very much for the reply.
Would the algorithm for funding d also work if M1277 had more than 2 prime factors, or it would have to be a semiprime?
ThankS again.

Last fiddled with by a1call on 2019-09-27 at 02:55
a1call is offline   Reply With Quote
Old 2019-09-27, 03:03   #48
jdcs
 
Sep 2019

23 Posts
Default Behold! The world's most secure RSA key: 2^1277-1

Quote:
Originally Posted by a1call View Post
Would the algorithm for funding d also work if M1277 had more than 2 prime factors, or it would have to be a semiprime?
It can work with more than 2 prime factors.

Just send me the factors of M1277, and I'll show you how to compute d.
jdcs is offline   Reply With Quote
Old 2019-09-27, 03:06   #49
a1call
 
a1call's Avatar
 
"Rashid Naimi"
Oct 2015
Remote to Here/There

3·5·137 Posts
Default

Quote:
Originally Posted by jdcs View Post
It can work with more than 2 prime factors.

Just send me the factors of M1277, and I'll show you how to compute d.
Thanks Google confirmed:
Quote:
Having more than two prime factors is supported by the PKCS#1 standard. This is called a "multi-prime" key. On the plus side, this may offer some performance improvement. The Chinese Remainder Theorem still applies (see for instance in section 5.1.2, the description accommodates more than two primes).
As for the factors you will be the 1st one I will let know when I find them.

ETA I can now see the wisdom of choosing such a small exponent as a public key. Very large exponents would facilitate reverse-engineering the private key.

Last fiddled with by a1call on 2019-09-27 at 03:13
a1call is offline   Reply With Quote
Old 2019-09-27, 07:39   #50
LaurV
Romulan Interpreter
 
LaurV's Avatar
 
Jun 2011
Thailand

7·1,373 Posts
Default

Quote:
Originally Posted by a1call View Post
Would it be easier/easy to decrypt an RSA encrypted message if you could perform significantly faster Modular-Exponentiation than is possible now, without knowing the private key?
Definitively yes. Regardless of what other posters said, if you are able to square numbers extremely fast, i.e. if you give me an algorithm that can make "instant squaring" (well, not instant, but "in a blink of an eye", you know what I mean) then I could use it for exponentiation, which in turn used for a Pollard-like algorithm to factor N and get the private key (either Pm1 with a very high B1 or some rho flavor, which are now slow exactly because squaring is slow - think about how far a Rho with a polynomial x^2+/-1 could go with "instant" squaring).


Edit (after a while): reading your question over and over (sorry, English is not my native language), if you ask if we can decrypt the message faster, without finding the key or factoring N, assuming we could do exponentiation faster, then the answer is "no", and my ante-posters were right.

Last fiddled with by LaurV on 2019-09-27 at 08:08
LaurV is offline   Reply With Quote
Old 2019-09-28, 21:49   #51
a1call
 
a1call's Avatar
 
"Rashid Naimi"
Oct 2015
Remote to Here/There

3·5·137 Posts
Default

Thank you for the reply LaurV.
I am afraid your post is a bit too advanced for my level. I had to look up Pollard-Rho factoring, but still can't quite grasp the concept.

https://en.m.wikipedia.org/wiki/Poll..._rho_algorithm

https://en.m.wikipedia.org/wiki/Poll...92_1_algorithm

Would a hypothetical rapid/instant exponentiation facilitate factoring composites by rendering factor p with p-1 powersmooth?

https://en.m.wikipedia.org/wiki/Smoo...smooth_numbers

Thanks again for the clarification.

Last fiddled with by a1call on 2019-09-28 at 22:15
a1call is offline   Reply With Quote
Old 2019-09-29, 05:17   #52
xilman
Bamboozled!
 
xilman's Avatar
 
"𒉺𒌌𒇷𒆷𒀭"
May 2003
Down not across

10,753 Posts
Default

Quote:
Originally Posted by LaurV View Post
Definitively yes. Regardless of what other posters said, if you are able to square numbers extremely fast, i.e. if you give me an algorithm that can make "instant squaring" (well, not instant, but "in a blink of an eye", you know what I mean) then I could use it for exponentiation, which in turn used for a Pollard-like algorithm to factor N and get the private key (either Pm1 with a very high B1 or some rho flavor, which are now slow exactly because squaring is slow - think about how far a Rho with a polynomial x^2+/-1 could go with "instant" squaring).


Edit (after a while): reading your question over and over (sorry, English is not my native language), if you ask if we can decrypt the message faster, without finding the key or factoring N, assuming we could do exponentiation faster, then the answer is "no", and my ante-posters were right.
If by "squaring" you mean modular multiplication of arbitrary values of a specific length, you might be on to something. However, overheads (loop control, modular addition, GCD, comparison, etc) would still be significant. I doubt that rho would be feasible even if multiplication took zero time. If the factors are of similiar size, rho would require 2^(1277/4) iterations. That's a large number.
xilman is offline   Reply With Quote
Reply



Similar Threads
Thread Thread Starter Forum Replies Last Post
I want to factorize 2^1277-1 tanaydin Information & Answers 29 2018-05-14 01:09
Question: Is Our Forum Secure in Some Areas 9021951 Information & Answers 7 2011-11-02 23:29
World Cup Soccer davieddy Hobbies 111 2011-05-28 19:21
Plans for the end of the world Oddball Lounge 4 2011-04-18 04:06
Change the world! Xyzzy Lounge 5 2009-08-31 12:41

All times are UTC. The time now is 22:50.


Fri Jul 16 22:50:56 UTC 2021 up 49 days, 20:38, 1 user, load averages: 1.67, 2.52, 2.79

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.