mersenneforum.org  

Go Back   mersenneforum.org > Extra Stuff > Miscellaneous Math

Reply
 
Thread Tools
Old 2009-07-16, 07:13   #89
cheesehead
 
cheesehead's Avatar
 
"Richard B. Woods"
Aug 2002
Wisconsin USA

1E0C16 Posts
Default

Quote:
Originally Posted by Uncwilly View Post
Beating the factor out of someone or buying them off would be faster, cheaper, and more productive than throwing 10,000 cpu's at it.
I think CodeX's explanation in #86 implies that those avenues are out.
cheesehead is offline   Reply With Quote
Old 2009-07-16, 07:26   #90
10metreh
 
10metreh's Avatar
 
Nov 2008

2·33·43 Posts
Default

Quote:
Originally Posted by CodeX View Post
A message to people who think they are funny and instead of getting involved in project and subject trying to say something that they think it's funny, you guys are not funny and if you are not in business or subject, get out of this thread, we are trying to solve something, we are not playing game, for games you can try miniclip.com or rumor4notfunnypeople.com
I think this was aimed at me because I was the person who created the fake private key.
10metreh is offline   Reply With Quote
Old 2009-07-16, 08:25   #91
script kiddie
 
script kiddie's Avatar
 
Jul 2009

1D16 Posts
Default

Thanks for all.

As I said before, I'm expert in reverse engineering and ASM programming... I know all you said, this program even had a lot of checksums but I patched all of them, but again this is not a case for me, because:

1) Program developer is not accessible, even if he become accessible for me, I don't want anyone know that I'm doing such thing.

2) I can't install my modified exe in other computers in network. I can patch my program, how about others? How about server-side program that have Private keys of this program? It will not be able to continue working...

So I need a solution on finding D key without making anything in my network, nobody should know what I'm doing...
script kiddie is offline   Reply With Quote
Old 2009-07-16, 10:11   #92
Batalov
 
Batalov's Avatar
 
"Serge"
Mar 2008
Phi(4,2^7658614+1)/2

9,497 Posts
Default

Here's the summary for the masses
http://xkcd.com/538/

Code:
A Crypto nerd's imagination:
Guy [[Holding Laptop]]: His laptop's encrypted. Let's build a million-dollar cluster to crack it.
Other guy: No good! It's 4096-bit RSA!
Guy: Blast! Our evil plan is foiled!
 
What would actually happen:
Guy [[Holding money tag and wrench]]: His laptop's encrypted. 
Drug him and hit him with this $5 wrench until he tells us the password.
Other guy [[taking the wrench]]: Got it.
 
Actual Actual Reality: Nobody really cares about his secrets.
(Also, I would be hard pressed to find that wrench for $5.)
Batalov is offline   Reply With Quote
Old 2009-07-16, 11:55   #93
Mini-Geek
Account Deleted
 
Mini-Geek's Avatar
 
"Tim Sorbera"
Aug 2006
San Antonio, TX USA

10AB16 Posts
Default

The way I see it, there are roughly five possibilities: (along with my Adam Savage-style chances! if you don't know what I'm talking about, Adam Savage is one of the hosts of "Mythbusters", a US show where repeatable myths are tested/exploded, and he often gives a few different scenarios before an experiment is conducted with his estimated chances of it happening)
  1. This guy's lying and there's a whole other story behind the number and why he wants it factored. (seems unlikely to me from the way he explained it, 10%)
  2. He legitimately needs to know what's going on in the network for his job, and can no longer contact the person who developed this system. (he directly refutes this in #91, "I don't want anyone know that I'm doing such thing." 0.5%)
  3. He wants to know what's going on in the network, but has no particular reason why, just curiosity. (doubt it, seems like too much trouble for just curiosity, 2%)
  4. He wants to know for reasons that are mischievous, but not terribly malicious or illegal. Like reading co-workers's emails or playing pranks on co-workers. (again, doubt it, because it seems like far too much trouble, 2.5%)
  5. He wants to know for reasons that are illegal. What sort of software uses 20 randomly rotating 1536-bit keys unless it is VERY important that it can not feasibly be broken in to? What exactly does it encrypt, and what could he change by knowing what passes through his box? What sort of important communication is encrypted so heavily, but run on all the workstations? I haven't the slightest idea. (This one seems the most likely to me. 85%)
Perhaps you could tell us which option it is, CodeX. (unless it's somehow outside this list)

Last fiddled with by Mini-Geek on 2009-07-16 at 11:55
Mini-Geek is offline   Reply With Quote
Old 2009-07-16, 12:35   #94
cheesehead
 
cheesehead's Avatar
 
"Richard B. Woods"
Aug 2002
Wisconsin USA

170148 Posts
Default

Quote:
Originally Posted by Mini-Geek View Post
  1. This guy's lying and there's a whole other story behind the number and why he wants it factored. < snip >
  2. He legitimately needs to know what's going on in the network for his job, and can no longer contact the person who developed this system. (he directly refutes this in #91, < snip >
  3. He wants to know what's going on in the network, but has no particular reason why, just curiosity. < snip >
  4. He wants to know for reasons that are mischievous, but not terribly malicious or illegal. Like reading co-workers's emails or playing pranks on co-workers. < snip >
  5. He wants to know for reasons that are illegal. < snip >
Let's have a poll.

I think #5 is the one that's consistent with all CodeX's posts.

Quote:
Originally Posted by xilman View Post
I would say that my social engineering attack was entirely successful.
... but CodeX's was doomed to failure for technical reasons, anyway -- social engineering can't get what isn't there.

Last fiddled with by cheesehead on 2009-07-16 at 12:52
cheesehead is offline   Reply With Quote
Old 2009-07-16, 13:32   #95
jasonp
Tribal Bullet
 
jasonp's Avatar
 
Oct 2004

3·1,181 Posts
Default

Quote:
Originally Posted by CodeX View Post
if you are not in business or subject, get out of this thread, we are trying to solve something, we are not playing game
If you don't think our attempt at help is funny, then you should punish us by doing your industrial espionage by yourself.
jasonp is offline   Reply With Quote
Old 2009-07-16, 14:04   #96
bsquared
 
bsquared's Avatar
 
"Ben"
Feb 2007

2×3×587 Posts
Default

Quote:
Originally Posted by jasonp View Post
If you don't think our attempt at help is funny, then you should punish us by doing your industrial espionage by yourself.
Furthermore, we (certainly I), are not trying to help solve anything and don't view this as a collaborative "project". I don't want anything to do with it, and have only tried to help you understand the futility of what you're trying to do. I suspect the "help" you are getting from certain people is done purely for their own amusement.
bsquared is offline   Reply With Quote
Old 2009-07-17, 20:26   #97
script kiddie
 
script kiddie's Avatar
 
Jul 2009

358 Posts
Default

Who cares? Yes, option 5 is correct... I don't need your help anymore... Knowing what I'm doing is not your business, if you had knowledge to help you would...

You should understand a person who's expert in reversing, have access to a super computer is not playing game, he's doing something serious...

I did big mistake by asking/registering in this forum, I had another idea to solve this problem and I got it solved, now you can continue making fun with yourself and I'm going back to my business...

I'm leaving here... Just I have a suggestion to you guys! Next time be more serious in solving problems, next time say that you can't do any help from first time, next time think more before commenting...

Bye
script kiddie is offline   Reply With Quote
Old 2009-07-17, 23:44   #98
cheesehead
 
cheesehead's Avatar
 
"Richard B. Woods"
Aug 2002
Wisconsin USA

22·3·641 Posts
Default

Quote:
Originally Posted by CodeX View Post
You should understand a person who's expert in reversing, have access to a super computer is not playing game, he's doing something serious...
We weren't doubting your sincerity, just your legality. A serious crime is still a crime.

Quote:
I did big mistake by asking/registering in this forum,
No, your mistake, if any, was either (a) thinking you'd sneak a crime past us or (b) expecting an easy answer.

(Note that I'm not categorizing your personality as a mistake. You probably couldn't help that.)

Quote:
I'm going back to my business...
... being very sure that you continue to represent yourself as intellectually superior to others ...

Quote:
Next time be more serious in solving problems,
We were, you dummy!

Quote:
next time say that you can't do any help from first time,
But that wasn't true! We could have helped, if what you wanted had actually been feasible. In some cases that could have fit your initial inquiry, there might have been an easy answer, but in others, there isn't.

Don't mistake your ignorance for our insincerity. We weren't asking you for more information to string you along (no matter how attractive you find conspiracy theories). Our requests were for information we really, truly needed in order to help you. Your continual reluctance to divulge details gave away the illegality of your purposes.

Quote:
next time think more before commenting...
... because it's important to you to obtain our assistance ... and you just hate having your valuable time wasted!

Talk about egotistic ...

Last fiddled with by cheesehead on 2009-07-18 at 00:08
cheesehead is offline   Reply With Quote
Old 2009-07-17, 23:51   #99
mdettweiler
A Sunny Moo
 
mdettweiler's Avatar
 
Aug 2007
USA (GMT-5)

624910 Posts
Default

Hmm...considering as how CodeX admitted to wanting to factor this key for illegal purposes, maybe Xyzzy could nab his IP address and report it to the authorities? Unless, of course, he's using a proxy of some sort...nonetheless, I doubt it would hurt to report him anyway.
mdettweiler is offline   Reply With Quote
Reply

Thread Tools


Similar Threads
Thread Thread Starter Forum Replies Last Post
Factoring a 160 digit RSA key swistak Factoring 6 2010-11-17 23:49
How much digit in the M? Lorenzo Math 17 2010-08-26 16:54
Need a quick factoring for 21-digit number jasong Factoring 5 2007-11-19 17:49
160 digit factor found of 366 digit (PRP-1) AntonVrba Factoring 7 2005-12-06 22:02
Factoring a 617-digit number? Shakaru Factoring 2 2005-02-23 19:22

All times are UTC. The time now is 23:30.


Fri Aug 6 23:30:40 UTC 2021 up 14 days, 17:59, 1 user, load averages: 3.74, 3.84, 3.94

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.