defango

VQC+++ postings Cracking RSA and ECC encryption?

Dec 4th, 2017
222
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.81 KB | None | 0 0
  1. VQC+++ postings Cracking RSA and ECC encryption?
  2. https://8ch.net/cbts/res/672.html#32349
  3.  
  4. Sounds like VQC+++ for Chris Curtis might have broken RSA. Well I might have known about this going on but I do believe we will see how this all fits together
  5. https://8ch.net/vqc/index.html
  6.  
  7. In each cell of the grid ten entries shown for that cell.
  8. The horizontal (column) coord comes first, which is e
  9. The vertical (row) coord comes second, which is n
  10. Each element in a cell is:
  11. {e:n:d:x:a:b}
  12. Where
  13. (d+n)(d+n)-(x+n)(x+n) = c
  14. ab = c
  15. a+x = d
  16. c# source code to follow to create the structure that will hold this grid.
  17. Then an explanation of some of the features of the grid.
  18. This will explain how infinite yet constructable sets that follow a known pattern, can be used as a means for use as a virtual quantum computer.
  19. The grid is the superposition.
  20. The collapse of that superposition will be two input parameters, d and e which can be calculated easily for all integers, c, where c is the difference of two squares.
  21. All products of odd numbers and all products of pairs of even numbers are the difference of two squares.
  22. We will be focusing on the first row where n=1
  23. Each cell at n=1 contains the roots of products in a column.
  24. Columns contain all products that have the same remainder e.
  25. If c is a prime number, it will appear in one column exactly once.
  26. If c is the product of two prime numbers that do not equal each other, c will appear in two cells of one column.
  27.  
  28. Each grid cell can be referenced by coordinates (e,n) e across and n down.
  29. Since each grid cell that contains any elements will contain infinite elements, we can add a third variable t which indexes the elements.
  30. E.g for the first column (containing all products c with a remainder 1 after subtracting the largest square) the first cell is at (1,1) where e=1 and n=1, the first three values of a are 1,5,13
  31. At those cells b = 5,13,25 respectively
  32. 1x5=5
  33. 5x13=65
  34. 13x25=325
  35. At (1,1) for elements t=1,2,3 then for a we can write
  36. (1,1,1)=1
  37. (1,1,2)=5
  38. (1,1,3)=13
  39. Another example:
  40. At (4,1) for the second, third and fourth elements, the values of a are
  41. (4,1,2)=4
  42. (4,1,3)=10
  43. (4,1,4)=20
  44. You may recognise those numbers.
  45. So, t is a index number that allows us to specify an element in a grid location.
  46. Note:
  47. All products (integers) c that are the sum of two squares appear (only) in columns where e=0,1,4,9,16,25,..
  48. This demonstrates that the sum of two squares are closed under multiplication.
  49. All Fermat primes (except 3) would appear in column one. We will discover something new about the conjecture that there are only five Fermat primes.
  50. You may also note that the values of a and b at (1,1) are the related to the length of the longest side in right angled triangles.
  51.  
  52. This a higher of view of what we're working towards.
  53. ab = c
  54. dd+e = c
  55. (d+n)(d+n)-(x+n)(x+n)
  56. The difference of two squares.
  57. a+x = d
  58. xx+e = 2na
  59. a+2x+2n=b
  60. The grid coordinates are (e,n).
  61. Any integer, c which is the difference of two squares…
  62. e = the remainder after substracting the largest square (dd)
  63. and
  64. n = the difference between the square root d and the larger of the two squares (difference of two squares)
  65. n also equals the number you would add to the square root to create a number exactly halfway between a and b
  66.  
  67.  
  68. There are two loops in the program.
  69. An inner loop and an outer loop.
  70. All these loops do is create a series of integers which are the difference of two squares.
  71. It is that simple.
  72. 1,3,4,5,7,8,9,11,12,13,15,..
  73. All these numbers are the difference of two squares.
  74. For the ones that are not the difference of two squares (these are odd when divided by two) you can divide by two to create the difference of two squares.
  75. Therefore, the difference of two squares covers any integer you wish to factorise.
  76. The private key in RSA is based on knowing the two factors of similar length that make up the product used to decrypt anything encrypted with the corresponding public key.
  77. This virtual quantum computer will show you how to calculate the factors of a product of two primes.
  78. The current fastest method is the general number fields sieve that searches for factors.
  79. The virtual quantum computer calculates.
  80. Whereas the general number field sieve is sub-exponential in the time taken to search, the virtual quantum computer is less than the natural logarithm in time to calculate.
  81. A 4096bit RSA private key can be calculated in less than a second from the public key.
  82.  
  83. This is not finished yet.
  84. RSA100 is just for use as an example.
  85. I'll give you an example:
  86. 5x29=145
  87. a=5
  88. b=29
  89. c=145
  90. d=12
  91. e=1
  92. 145 is the product of two primes.
  93. Therefore it has two representations.
  94. 5x29
  95. 1x145
  96. In the grid, it will appear at cells:
  97. (1,5)
  98. (1,61)
  99. for 5x29, n=5 and n=61
  100.  
  101. Public RSA key = large composite number that follows a few rules, plus a public exponent (a fermat prime)
  102. Private RSA key = factors of said number, fi(n) of that number (impossible to calculate with the head-banging algorithms of today)
  103. fi(n) decodes a message in RSA. You can't get it without the private key.
  104. d = (2 * fi(n) + 1) / e
  105. d is decryption exponent, e is public exponent
  106. encryption of message:
  107. m^e mod N = c
  108. m, message, N large composite, e public exponent, c encrypted message
  109. decryption of message:
  110. c^d mod N = m
  111. d is private key (d is derived from the factors of N, the large composite)
  112.  
  113. The x axis is "i" from the C# code
  114. The y axis is "j"
  115. The hyperbola is the graph of all solutions to:
  116. i^2 - j^2 = c
  117. There are only two solutions which land on perfect integer pairs. For the example given, the number 145, the two points are (73,72) and (17,12). The first point is easily found through the simple factorization of 1*145 = 145. However, the other point is not so easily found without knowing the two prime factors.
  118. Interesting note: at (73,72), the height straight up from that point to the asymptote (dotted blue line) is exactly 1, and always will be exactly one, because it is actually "a".
  119. a = i - j
  120. That means that the vertical height to the asymptote at (17,12) is the a we need, one of the two hidden prime factors. There may be a way to pattern the zero point or some other aspect of the graph in order to determine the proper green line connecting the two points, which could be converted to give the map points and all the parameters.
  121.  
  122. https://media.8ch.net/file_store/72de15dc7ed41e53517d88c133f83c2c8009e4a51abcd3f3664b83c2ba5fdc76.png
  123.  
  124. Grid Code
  125. http://rextester.com/VNZ56795
  126. https://pastebin.com/J5mrWkCk
  127.  
  128. RSA Challenge
  129. http://rextester.com/QCJ73458
  130. https://pastebin.com/BcuVjU0A
  131.  
  132. https://en.wikipedia.org/wiki/RSA_numbers
  133. https://www.youtube.com/watch?v=wXB-V_Keiu8
  134.  
  135. https://www.youtube.com/watch?v=9FeROMe0KBU
  136.  
  137. Firmate
  138. youtube.com/watch?v=nUN4NDVIfVI
  139.  
  140. https://media.8ch.net/file_store/9f61cc444b10950f6a486fcc88d7a9bbeb6f7cc81dbfde1f4e3f62cb1669fee3.png
  141. http://archive.fo/Ua2an'
  142. http://archive.is/ND7yN
Add Comment
Please, Sign In to add comment