home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   comp.misc      General topics about computers not cover      21,759 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 21,232 of 21,759   
   Ethan Carter to Richard Kettlewell   
   Re: Some naive musings about RSA   
   08 Jul 25 21:55:36   
   
   From: ec1828@somewhere.edu   
      
   Richard Kettlewell  writes:   
      
   > Ethan Carter  writes:   
   >> Sylvia Else  writes:   
   >>> Sometimes in an idle moment, I find myself wondering about possible   
   >>> ways to attack RSA. Spoiler alert, I haven't found one.   
   >>>   
   >>> But in passing, I found myself thinking about this:   
   >>>   
   >>> For the uninitiated, RSA is based on the fact that if p and q are   
   >>> large primes, then the product p*q is a large number that is   
   >>> computationally infeasible to factorise - which is to say, no one's   
   >>> found a way, though quantum computers offer a possibility.   
   >>>   
   >>> Let m be p * q, and n be (p-1)(q-1). Then RSA further depends on the   
   >   
   > Noting again for reference that conventional notation here is n=pq.   
      
   Noted.  (I wanted to keep most of the choices of the OP.)   
      
   >>> fact that for any integer a, co-prime with m, a^n modulo m is 1. Since   
   >>> 2 will be co-prime with m, that means that 2^n modulo m is also 1. We   
   >>> can write that equivalently as   
   >>>   
   >>> 	2^n - 1 = k * m   
   >>> where k is an unknown integer. Actually, there are an infinity of   
   >>> possible k, but we're interested in the lowest (ignoring the trivial   
   >>> case of k = 0).   
   >>   
   >> I suggest you should not use the word ``unknown'' here because the   
   >> equation is true for all integers k, as you observe on the following   
   >> sentence.  The equation is saying that 2^n - 1 is a multiple of m.   
   >> Mathematical lingo is such that ``an unknown integer'' means a /fixed/   
   >> number k (that we don't which it is), but your k here is not fixed.   
   >> (You can say ``an arbitrary integer'' instead.)   
   >   
   > I covered this in another post. For a given RSA key there’s only one k   
   > and it’s straightforward to write down an expression for it, just not   
   > practical to compute the value of that expression. I don’t know why   
   > Sylvia thought there might be more than one, or for that matter why k=0   
   > would work since it’s obviously not possible for any RSA key.   
   >   
   >>> If we knew k, then that would give us n, or a factor of n (n is never   
   >>> prime, it is at least divisible by 4).   
   >>   
   >> Something isn't quite right here.  We trivially know the smallest   
   >> positive k that satisfy the equation---that's k = 1.  For example, take   
   >> p = 3, q = 5 so that m = 15 and n = 8.  Then the equation   
   >>   
   >>   2^8 - 1 = k * 15   
   >>   
   >> is trivially satisfied by taking k = 1, which is the smallest /positive/   
   >> integer you're looking for.   
      
   What was I thinking?  I somehow thought 2^8 = 16.   
      
   >> So I did not really understand the rest of your post.  You seemed to be   
   >> looking for a factor of n.  You're then looking for a factor of   
   >>   
   >>   p - 1 or q - 1.   
   >>   
   >> If these numbers would have /small/ factors, you could find them by   
   >> trial division, say.  That would indeed be a weakness.  RSA is not   
   >> safe if we pick p, q such that p - 1 or q - 1 have small factors.   
   >   
   > p-1 and q-1 are always divisible by 2, as small a factor as you can   
   > possibly get.   
      
   You're right.  I'm totally mistaken.  Scratch it all.  Thanks!   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca