Breaking RSA semiprimes

Similar documents
Cryptography. 2. decoding is extremely difficult (for protection against eavesdroppers);

Number Theory and Public Key Cryptography Kathryn Sommers

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

Application: Public Key Cryptography. Public Key Cryptography

ULS Systems Research Roadmap

Intellectual Property

Number Theory and Security in the Digital Age

1. The chance of getting a flush in a 5-card poker hand is about 2 in 1000.

INTELLECTUAL PROPERTY OVERVIEW. Patrícia Lima

Equivalent Fractions

Programs for Academic and. Research Institutions

MA/CSSE 473 Day 9. The algorithm (modified) N 1

Grade 6 Math Circles. Divisibility

Launchpad Maths. Arithmetic II

Diffie-Hellman key-exchange protocol

Manufacturing Readiness Assessment Overview

State of the Arts: Pre-Raphaelites

IDEAS from IBM transcript

Understanding Cryptography: A Textbook For Students And Practitioners PDF

Trade Secret Protection of Inventions

MORGAN STATE UNIVERSITY PROCEDURES ON PATENTS AND TECHNOLOGY TRANSFER APPROVED BY THE PRESIDENT NOVEMBER 2, 2015

Cyber Risks in Additive Manufacturing Threaten to Unravel the Digital Thread

Keeping secrets secret

CESEL: Flexible Crypto Acceleration. Kevin Kiningham Dan Boneh, Mark Horowitz, Philip Levis

Radio Spectrum Management. Executive Level Training for Regulators and Policy-Makers Hotel Kowloon Shangri-la, Hong Kong, China December 2-3, 2006

DES Data Encryption standard

MAT199: Math Alive Cryptography Part 2

The number theory behind cryptography

Identifying and Managing Joint Inventions

Math 319 Problem Set #7 Solution 18 April 2002

MA/CSSE 473 Day 13. Student Questions. Permutation Generation. HW 6 due Monday, HW 7 next Thursday, Tuesday s exam. Permutation generation

As a Patent and Trademark Resource Center (PTRC), the Pennsylvania State University Libraries has a mission to support both our students and the

Logarithmic Functions

INTELLECTUAL PROPERTY POLICY

Research Valorization Process.

Cartesian Coordinate System. Student Instruction S-23

Understanding DARPA - How to be Successful - Peter J. Delfyett CREOL, The College of Optics and Photonics

Education Resources. This section is designed to provide examples which develop routine skills necessary for completion of this section.

Disruption Opportunity Special Notice. Fundamental Design (FUN DESIGN)

Public Key Encryption

By Scott Fallstrom and Brent Pickett The How and Whys Guys

DUBLIN CITY UNIVERSITY

CS 4984 Software Patents

Sheet 1: Introduction to prime numbers.

Artificial intelligence, made simple. Written by: Dale Benton Produced by: Danielle Harris

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

EXPLORING POLAR COORDINATES WITH THE GEOMETER S SKETCHPAD

11th Annual Patent Law Institute

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

4th Grade Common Core Math Vocabulary

Modular Arithmetic. Kieran Cooney - February 18, 2016

THE REALITY OF COLLABORATIVE ROBOT DEPLOYMENTS. Chris Harbert, Global Director of Sales Hannover Messe 2016

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

Measuring Intangible Assets (IP & Data) for the Knowledge-based and Data-driven Economy

Analysis on Digital Radio Service Deployment in Thailand TIME Consulting, 13 December 2017

PATENT COOPERATION TREATY (PCT) WORKING GROUP

Introduction to Modular Arithmetic

Searching Lesson Plan

How To Draft Patents For Future Portfolio Growth

An Intuitive Approach to Groups

Math Fundamentals for Statistics (Math 52) Unit 2:Number Line and Ordering. By Scott Fallstrom and Brent Pickett The How and Whys Guys.

Introduction to Computer Science

The Mathematics Behind Sudoku Laura Olliverrie Based off research by Bertram Felgenhauer, Ed Russel and Frazer Jarvis. Abstract

A. Project title: Design and Development of an Open-Source Enterprise Network

ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES

Slicing a Puzzle and Finding the Hidden Pieces

Patents. What is a patent? What is the United States Patent and Trademark Office (USPTO)? What types of patents are available in the United States?

DRM vs. CC: Knowledge Creation and Diffusion on the Internet

Numbers 01. Bob Albrecht & George Firedrake Copyright (c) 2007 by Bob Albrecht

EE320L Electronics I. Laboratory. Laboratory Exercise #6. Current-Voltage Characteristics of Electronic Devices. Angsuman Roy

Ai Group Submission. in response to the REVIEW OF ELECTRICITY (CONSUMER SAFETY) ACT 2004 ISSUES PAPER

Patterns and Graphing Year 10

ADDITIVE MANUFACTURING FOR INNOVATIVE DESIGN AND PRODUCTION

Cryptography, Number Theory, and RSA

The 9 Sources of Innovation: Which to Use?

We are going to begin a study of beadwork. You will be able to create beadwork on the computer using the culturally situated design tools.

Trial version. Microphone Sensitivity

Standing Committee on the Law of Trademarks, Industrial Designs and Geographical Indications

Future Directions in Intellectual Property. Dr Peter Tucker. General Manager, Business Development. and Strategy Group.

ACCENTURE INNOVATION ARCHITECTURE USES AN INNOVATION-LED APPROACH TO HELP OUR CLIENTS DEVELOP AND DELIVER DISRUPTIVE INNOVATIONS, AND TO SCALE THEM

Establishing a Development Agenda for the World Intellectual Property Organization

#27: Number Theory, Part II: Modular Arithmetic and Cryptography May 1, 2009

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Google reveal. their secret to a successful IP Litigation strategy. Catherine Lacavera, Director of IP and Litgation, Google

Ideas beyond Number. Teacher s guide to Activity worksheets

The Official Rules of the HRM s

Computer Science as a Discipline

(a) Left Right (b) Left Right. Up Up 5-4. Row Down 0-5 Row Down 1 2. (c) B1 B2 (d) B1 B2 A1 4, 2-5, 6 A1 3, 2 0, 1

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees.

TOKEN SALE AGREEMENT

Patent Agenda. Egyptian National Group of AIPPI

Under the Patronage of His Highness Sayyid Faisal bin Ali Al Said Minister for National Heritage and Culture

Submitted November 19, 1989 to 2nd Conference Economics and Artificial Intelligence, July 2-6, 1990, Paris

The bottom number in the fraction is called the denominator. The top number is called the numerator.

Using Deep Learning for Sentiment Analysis and Opinion Mining

1: Assemblage & Hierarchy

LETTER OF MOTIVATION INDEPENDENT EXPERT

INTEL INNOVATION GENERATION

Introduction. Chapter Time-Varying Signals

Physics. AC Circuits ID: 9525

Transcription:

Factorial impact on number theory and understanding discreet logarithms A mouse can eat an elephant but it has to do it a bite at a time. The security of RSA asymmetric public key systems rests on the belief that no one can solve the problem of discreet logarithms. The factorial process described below is a mechanical process as opposed to a mathematical process. However, they are equivalent because we know this approach can factor a number in a second when we are told that should take a billion-billion years etc. Our networks are already getting picked apart without having to directly break keys. The fact that this kind of discreet logarithm problem can be solved with this following mechanical approach that will factor semiprimes means that accomplished mathematicians have a real-case demonstration and description of how a mechanical solution solves the problem. When one of these mathematicians publishes the equivalent mathematical description then they will have achieved a significant milestone in number theory. This paper was first written about a decade ago for submission to the formal cryptographic archive eprint. A previous event through eprint indicated that this portal that controls the cryptographic science publishing space is like too many others and is a system of agendas and hidden agendas. They allowed an unfounded claim to be published on their archives and they refused to allow a rebuttal (the mathematical proof) to be published as a fair response. The eprint process was easily shaped to selfinterest and hidden agendas likely at the level of large corporations and governments. Just as has happened with the Common Criteria and so many certification systems what was intended to be an open forum for scientific discussion has morphed into a gatekeeper. Because of this, this paper was not submitted for eprint. It is fairly easy to recognize manipulation when you see it. An additional consideration in not publishing it at that time was it held a different level of riskiness that it might be misused. It is not the same relative observational perspective at this point in time. It is obvious that it is simply much easier to steal keys then to break them. Rapid Factorization of Prime Number Composites or RSA semiprimes: A mouse can eat an elephant but he has to do it a bite at a time. It comes down to how fast it can eat. An alternative to the Sieve Method Unlike the encryption algorithms submitted to Advanced Encryption Standards competition, Whitenoise is not a free algorithm. We encourage aggressive and widespread testing of Whitenoise. However, any unauthorized use or deployment

in any non-academic context, or in any context with commercial implications, without written authorization or a license from the owners is strictly prohibited. The patent firm of Oyen Wiggs Green and Mutala fully intends to be diligent in enforcing all Intellectual Property rights associated with United States patent application no. 10/299,847, and other patents pending, and with the Patent Cooperation Treaty filing for patent rights in 125 countries. Abstract This paper introduces a new technique for the rapid factorization of prime number composites. The cornerstone of Public Key Cryptography as well as several other security utilities is the fact that while it is easy for anyone with a calculator to be able to multiply two prime numbers together, it is considered a functional impracticality to rapidly factor the prime number composite into its two distinct factors. Surfing the internet will bring one to many sites where factoring challenges abound and the current prevalent methods for achieving this factorization is either brute force or sieve methods. These techniques are so slow as to not pose any risk for the security of these types of systems. It was noted that if one takes the 6 th derivative of two points within a range on a normal curve, the larger point divided by the smaller point, that the closer you are to the solution the more volatile the remainder becomes. This then becomes the primary criteria in a decision tree in deciding which way to jump if one is deploying a bisection method to try to locate a prime number factor. On a basic system deploying this technique it is possible to factor a 60 to 80-bit prime number composite in under a second. It is believed that expanding upon this technique will make the factoring of large prime number composites an easy task and hold out great possibilities for the manipulation of primes and composite primes in general number theory. It is to be noted that this is not a simple mathematical shortcut but because of the ready access to computers and even the basic computational speed of a simple desktop computer, it is a technique that should be far superior to existing techniques and hold out great possibilities.

Rapid Factorization Architecture Breaking RSA semiprimes If one looks at a Cartesian plane and a [very poor] rendition of a normal curve, the following elements are readily identifiable. 1. We can draw a normal curve with the endpoint of the curve on the X-axis being equal to the prime number composite [P#C]. 2. We can take the square root of the prime number composite and this becomes the mean. 3. We know that one of each of the two factors we are looking for will reside somewhere on either side of the mean. 4. Looking at the graph above, we will search for the smaller prime factor of the prime number composite. Our first step is to bisect the smaller area of the curve along the x-axis and in this example it is labeled bisection. 5. First we rapidly test to see whether the point of bisection is a whole number. If it is (unlikely) then we have found one of our factors. If this was the case, we simply divide this number into the semiprime. 6. The challenge now is to decide on which direction of the bisection line we should jump in order to make the next bisection. It was noted that if one takes the 6 th derivative of two points within a range on a normal curve, the larger point divided by the smaller point, that the closer you are to the solution the more volatile the remainder becomes. This then becomes the primary criteria in a decision tree in

deciding which way to jump if one is deploying a bisection method to try to locate a prime number factor. Written by: Stephen Boren email sboren@bsbutil.com Andre Brisson email abrisson@bsbutil.com Created: 6/24/2002 Modified:7/24/2003 December 10, 2015 A more recent view from a paper for the Telecom Council of Silicon Valley Deep Dive on Security in the Snowden Era this year 2015 shows this idea on just a number line that is easier for some to see the behavior. It was in preparation for demonstrating this capacity to factor semiprimes that is was sadly recognized that a simple prime number dictionary attack could accomplish the same thing. It was noted that if one takes the 6th derivative of two points within a range on a normal curve, the larger point divided by the smaller point, that the closer you are to the solution the more volatile the remainder

becomes. This then becomes the primary criteria in a decision tree in deciding which way to jump if one is deploying a bisection method to try to locate a prime number factor. This nugget, the recognition of starting with a square root of a semiprime and the behaviors of derivatives was a Boren insight.