mersenneforum.org  

Go Back   mersenneforum.org > Great Internet Mersenne Prime Search > Software

Reply
 
Thread Tools
Old 2004-12-27, 22:35   #12
cheesehead
 
cheesehead's Avatar
 
"Richard B. Woods"
Aug 2002
Wisconsin USA

22×3×641 Posts
Default

Quote:
Originally Posted by jinydu
Isn't someone going to come to defend the current system? Seriously, there must be some safeguard against this, right?
1) The security code (not really a checksum) is the principal safeguard. But the security code can be faked.

2) Behind the scenes, there is triple-checking (of all "verified" [matching first-time and doublecheck] results) going on by one or more folks, but its current progress is way behind the trailing edge of doublechecking, and it'll be several years before a current double-fake is detected. But real mathematicians are patient. :-)

Last fiddled with by cheesehead on 2004-12-27 at 22:46
cheesehead is offline   Reply With Quote
Old 2004-12-28, 00:04   #13
jinydu
 
jinydu's Avatar
 
Dec 2003
Hopefully Near M48

2×3×293 Posts
Default

But all verified exponents are ultimately triple-checked by trusted people, right?

At least its only possible to fake a composite. A prime is checked several times immediately, so any attempt to fake it would be caught immediately. Still, it would be sad if someone faked an exponent as composite, but it was in fact prime, and that went undiscovered for years.

Last fiddled with by jinydu on 2004-12-28 at 00:06
jinydu is offline   Reply With Quote
Old 2004-12-28, 00:57   #14
Prime95
P90 years forever!
 
Prime95's Avatar
 
Aug 2002
Yeehaw, FL

19×397 Posts
Default

The triple-checking effort is only done on exponents that were tested and double-checked by the same userid.
Prime95 is offline   Reply With Quote
Old 2004-12-28, 03:41   #15
jinydu
 
jinydu's Avatar
 
Dec 2003
Hopefully Near M48

2·3·293 Posts
Default

Then what safeguard is there against the potential problem I mentioned above?
jinydu is offline   Reply With Quote
Old 2004-12-28, 07:19   #16
Prime95
P90 years forever!
 
Prime95's Avatar
 
Aug 2002
Yeehaw, FL

165678 Posts
Default

There are only 2 safeguards against reporting a false composite and matching double-check.

1) The security code or checksum is hard to forge. This is the only source code that is not published. However, anyone handy with a disassembler could fake it.

2) There is no glory in pulling off the stunt. You won't get famous. You can't really climb the stats chart because you have to use different userids for the two tests -- and if tens or hundreds of tests and doublechecks came in from the same user that would be suspicious too.

Any ideas for improving security are, of course, welcome
Prime95 is offline   Reply With Quote
Old 2004-12-28, 08:59   #17
cheesehead
 
cheesehead's Avatar
 
"Richard B. Woods"
Aug 2002
Wisconsin USA

22×3×641 Posts
Default

Quote:
Originally Posted by cheesehead
Behind the scenes, there is triple-checking (of all "verified" [matching first-time and doublecheck] results) going on by one or more folks,
Quote:
Originally Posted by Prime95
The triple-checking effort is only done on exponents that were tested and double-checked by the same userid.
Oh, rats. That's what I get for not going back to check the Mersenne Digest postings I recalled. I still can't find my copy right now, but I think what I referred to above was a triple-checking of all exponents for which GIMPS had only one 64-bit residue recorded. That is, folks [Brian Beesley and others?] were running another GIMPSian LL test on all the low exponents that had been tested before GIMPS then doublechecked by GIMPS, but for which all pre-GIMPS tests had recorded residues of fewer than 64 bits (and the GIMPS doublechecks had matched as many residue bits as were recorded for the earlier tests).

Last fiddled with by cheesehead on 2004-12-28 at 09:02
cheesehead is offline   Reply With Quote
Old 2004-12-28, 11:34   #18
jinydu
 
jinydu's Avatar
 
Dec 2003
Hopefully Near M48

2·3·293 Posts
Default

Unfortunately, I can't think of a surefire way of catching someone who tried such a strategy. The best method I can think of is for trusted people to do regular, random triple-checks of double-checked exponents. Then, if any discrepancies are confirmed, put extra scrutiny on the two offending user accounts. If you find consistently incorrect residues in a small group of accounts that are always checking each other, that could be cause for suspicion.
jinydu is offline   Reply With Quote
Old 2004-12-28, 16:27   #19
Prime95
P90 years forever!
 
Prime95's Avatar
 
Aug 2002
Yeehaw, FL

19×397 Posts
Default

Quote:
Originally Posted by cheesehead
Oh, rats. That's what I get for not going back to check the Mersenne Digest postings I recalled. I still can't find my copy right now, but I think what I referred to above was a triple-checking of all exponents for which GIMPS had only one 64-bit residue recorded.
You're right. Brian makes sure all exponents have two 64-bit residues returned. He may have completed that project by now. He also does the triple-checking I mentioned.
Prime95 is offline   Reply With Quote
Old 2005-01-05, 13:48   #20
garo
 
garo's Avatar
 
Aug 2002
Termonfeckin, IE

22·691 Posts
Default

Yes, the project for making sure every exponent had matching 64-bit residues was completed almost two years ago. The project for triple-checking exponents with results returned by the same userID is ongoing but is keeping pace with the doublechecking effort.
garo is offline   Reply With Quote
Reply

Thread Tools


Similar Threads
Thread Thread Starter Forum Replies Last Post
Doublecheck efforts; S66/S79 to start with gd_barnes Conjectures 'R Us 16 2014-08-07 02:11
Doublecheck always have shifted S0 value? ATH PrimeNet 11 2010-06-03 06:38
All things doublecheck!! masser Sierpinski/Riesel Base 5 44 2006-09-24 17:19
DoubleCheck vs LL assignments Unregistered PrimeNet 9 2006-03-26 05:48
doublecheck - results TheJudger Data 4 2005-04-04 08:54

All times are UTC. The time now is 22:07.


Fri Aug 6 22:07:23 UTC 2021 up 14 days, 16:36, 1 user, load averages: 3.17, 3.06, 2.83

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.