Advertisement
defango

NEWST

Apr 8th, 2019
345
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.98 KB | None | 0 0
  1. https://8ch.net/templeos/res/1914.html#1950
  2.  
  3. My hand is forced.
  4.  
  5. The next set of post will show a virtual quantum computer with unlimited qubits.
  6.  
  7. By the end, you will be able to factor the remaining RSA Challenge Numbers in less than a second.
  8.  
  9. It is a simple process.
  10.  
  11. By the end you will be able to extrapolate to elliptic curves.
  12.  
  13. Your prize will be the ability to spend the BitCoin by the inventors that are unspent in the BlockChain.
  14.  
  15. By the end, you will realise that only messages can be secure.
  16.  
  17. Nothing stored digitally on the internet can be secured.
  18.  
  19. This virtual quantum computer is called The End.
  20.  
  21. You will see that one exists already to calculate digits of Pi without knowing the first digits before.
  22.  
  23. Like God, virtual quantum computers always exist, you just need to be willing and able to seek.
  24.  
  25. Godspeed and good luck.
  26.  
  27. God Bless Trump.
  28.  
  29. Familiarise yourself with Fermat and Fermat Factorisation.
  30.  
  31. Note: Fermat's Last Theorem was proved by showing two objects in number theory were the same type of object.
  32.  
  33. It took over 350 years because you do not understand numbers.
  34.  
  35. There are families of numbers.
  36.  
  37. When the language is so bad you cannot tell when two types are identical, the language is not fit for purpose.
  38.  
  39. Equality is the root of mathematics, the language of God.
  40.  
  41. We will be working with a 2D grid.
  42.  
  43. Each cell of the grid will have zero or infinite entries (elements).
  44.  
  45. If a grid cell has elements, all elements are constructable from a finite set of root elements.
  46.  
  47. The maths will be very simple.
  48.  
  49. There will only be seven variables in any element.
  50.  
  51. Only three variable are required to identify an element in a grid cell.
  52.  
  53. The other four variables for an element can be derived from those three.
  54.  
  55. The variables are:
  56.  
  57. a,b,c,d,e,n,x
  58.  
  59. The grid use e on the horizontal axis
  60.  
  61. The grid uses n on the vertical axis
  62.  
  63. ab=c
  64.  
  65. dd+e=c
  66.  
  67. (d+n)(d+n)-(x+n)(x+n)=c
  68.  
  69. The difference of two squares.
  70.  
  71. d=a+x
  72.  
  73. b=a+2x+2n
  74.  
  75. 2a=xx+e
  76.  
  77. For All c, where c is the difference of two squares.
  78.  
  79. All integers that are 2 mod 4 are ignored or divided by two.
  80.  
  81. By the time I am finished this walkthrough, expect to see BitCoin plunge as holders exit.
  82.  
  83. By the time I demonstrate with RSA100, which has been previously factored, some of you will already have enough to open the door which can then be shut.
  84.  
  85. The Internet will go dark.
  86.  
  87. You will be creating a grid.
  88.  
  89. The columns will be e, the remainder of an integer c after the largest square is removed.
  90.  
  91. c is the product of a and b.
  92.  
  93. d is the square root.
  94.  
  95. e is the remainder.
  96.  
  97. n is what you would add to d to be exactly halfway between a and b
  98.  
  99. n will be the coordinate for the rows
  100.  
  101. x is what you add to a to make d
  102.  
  103. Each cell in the grid will have zero or more entries for each value of c
  104.  
  105. c is the number you are factorising.
  106.  
  107. Hint: the key is the first row, n=1
  108.  
  109. Hint: the product of two primes appear in exactly two cells in one column.
  110.  
  111. Once I walk through, you will see it.
  112.  
  113. c is any number that is the difference of two squares, so every odd number is included.
  114.  
  115. RSA encryption relies on you not being able to factor the product of two primes.
  116.  
  117. I am going to show how to do it in a complexity of less than O(log t) where log t is the natural log of the length of c in bits.
  118.  
  119. It will be much clearer once you see it and have the source code to play with it.
  120.  
  121. Then we will move onto elliptic curve cryptography.
  122.  
  123. Then we will process video footage through a perfect resonator using the Mandelbrot set.
  124.  
  125. All three are designs of virtual quantum computers.
  126.  
  127. The first breaks RSA encryption.
  128.  
  129. This is called The End.
  130.  
  131. The second unlocks the encryption for BitCoin.
  132.  
  133. The third allows playback in time for video or spatial reorientation and is called The Eye.
  134.  
  135. TheEnd001.PNG
  136.  
  137. This a higher of view of what we're working towards.
  138.  
  139. ab = c
  140.  
  141. dd+e = c
  142.  
  143. (d+n)(d+n)-(x+n)(x+n)
  144.  
  145. The difference of two squares.
  146.  
  147. a+x = d
  148.  
  149. xx+e = 2na
  150.  
  151. a+2x+2n=b
  152.  
  153. The grid coordinates are (e,n).
  154.  
  155. Any integer, c which is the difference of two squares…
  156.  
  157. e = the remainder after substracting the largest square (dd)
  158.  
  159. and
  160.  
  161. n = the difference between the square root d and the larger of the two squares (difference of two squares)
  162.  
  163. n also equals the number you would add to the square root to create a number exactly halfway between a and b
  164.  
  165. In each cell of the grid ten entries shown for that cell.
  166.  
  167. The horizontal (column) coord comes first, which is e
  168.  
  169. The vertical (row) coord comes second, which is n
  170.  
  171. Each element in a cell is:
  172.  
  173. {e:n:d:x:a:b}
  174.  
  175. Where
  176.  
  177. (d+n)(d+n)-(x+n)(x+n) = c
  178.  
  179. ab = c
  180.  
  181. a+x = d
  182.  
  183. c# source code to follow to create the structure that will hold this grid.
  184.  
  185. Then an explanation of some of the features of the grid.
  186.  
  187. This will explain how infinite yet constructable sets that follow a known pattern, can be used as a means for use as a virtual quantum computer.
  188.  
  189. The grid is the superposition.
  190.  
  191. The collapse of that superposition will be two input parameters, d and e which can be calculated easily for all integers, c, where c is the difference of two squares.
  192.  
  193. All products of odd numbers and all products of pairs of even numbers are the difference of two squares.
  194.  
  195. We will be focusing on the first row where n=1
  196.  
  197. Each cell at n=1 contains the roots of products in a column.
  198.  
  199. Columns contain all products that have the same remainder e.
  200.  
  201. If c is a prime number, it will appear in one column exactly once.
  202.  
  203. If c is the product of two prime numbers that do not equal each other, c will appear in two cells of one column.
  204.  
  205.  
  206. o create the grid, attached is a c# file.
  207.  
  208. There is a method that constructs the grid.
  209.  
  210. There is an output method.
  211.  
  212. Please specify a path to save output to.
  213.  
  214. Next, we will look at some properties of the grid and also examine the all important first row.
  215.  
  216. The code is below. Cut and pasted.
  217.  
  218. //
  219.  
  220. using System;
  221.  
  222. using System.Collections.Generic;
  223.  
  224. using System.IO;
  225.  
  226. namespace IntegerFactorisation
  227.  
  228. {
  229.  
  230. public class TheEnd
  231.  
  232. {
  233.  
  234. public static string path = "";//PUT YOUR FILE PATH HERE
  235.  
  236. public static Dictionary<int, Dictionary<int, List<string>>> theend = new Dictionary<int, Dictionary<int, List<string>>>();
  237.  
  238.  
  239.  
  240. public static void CreateTheEnd(int i_max = 512, int x_min = 0, int y_min = 0, int x_max = 64, int y_max = 64)
  241.  
  242. {
  243.  
  244. for (int i = 0; i < i_max; i++)
  245.  
  246. {
  247.  
  248. for (int j = 0; j < i; j++)
  249.  
  250. {
  251.  
  252. int a = i - j;
  253.  
  254. int b = i + j;
  255.  
  256. int c = a * b;
  257.  
  258. bool odd = c % 2 == 1;
  259.  
  260. int d = (int)Math.Sqrt(c);
  261.  
  262. int e = c - (d * d);
  263.  
  264. int f = e - ((2 * d) + 1);
  265.  
  266. int n = i - d;
  267.  
  268. int x = d - a;
  269.  
  270. if (!theend.ContainsKey(e)) theend[e] = new Dictionary<int, List<string>>();
  271.  
  272. if (!theend[e].ContainsKey(n))
  273.  
  274. {
  275.  
  276. theend[e][n] = new List<string>();
  277.  
  278.  
  279.  
  280. }
  281.  
  282. if (!theend.ContainsKey(f)) theend[f] = new Dictionary<int, List<string>>();
  283.  
  284. if (!theend[f].ContainsKey(n - 1)) theend[f][n - 1] = new List<string>();
  285.  
  286. string text = "{" + string.Format("{0}:{1}:{2}:{3}:{4}:{5}", e, n, d, x, a, b) + "}";
  287.  
  288. theend[e][n].Add(text);
  289.  
  290. text = "{" + string.Format("{0}:{1}:{2}:{3}:{4}:{5}", f, n - 1, d + 1, x + 1, a, b) + "}";
  291.  
  292. theend[f][n - 1].Add(text);
  293.  
  294. }
  295.  
  296. }
  297.  
  298. }
  299.  
  300. public static void Output(int i_max = 256, int x_min = -64, int y_min = 0, int x_max = 64, int y_max = 64, int set_size = 12)
  301.  
  302. {
  303.  
  304. TextWriter tw = File.CreateText(path + "output.csv");
  305.  
  306. for (int y = 0; y < y_max; y++)
  307.  
  308. {
  309.  
  310. for (int z = 0; z < set_size; z++)
  311.  
  312. {
  313.  
  314. for (int x = x_min; x < x_max; x++)
  315.  
  316. {
  317.  
  318. if (theend.ContainsKey(x) && theend[x].ContainsKey(y) && theend[x][y].Count > z)
  319.  
  320. {
  321.  
  322. tw.Write(theend[x][y][z] + ",");
  323.  
  324. }
  325.  
  326. else
  327.  
  328. {
  329.  
  330. tw.Write(",");
  331.  
  332. }
  333.  
  334. }
  335.  
  336. tw.WriteLine("");
  337.  
  338. }
  339.  
  340. }
  341.  
  342. tw.Close();
  343.  
  344. }
  345.  
  346. }
  347.  
  348. }
  349.  
  350. Below is some code that will be useful later.
  351.  
  352. It is a BigInteger square root method and some strings related to and including RSA Challenge number 100. It is the smallest RSA number, so it is good for examples.
  353.  
  354. using System.Numerics;
  355.  
  356. namespace IntegerFactorisation
  357.  
  358. {
  359.  
  360. public static class Lib
  361.  
  362. {
  363.  
  364. public static string Rsa100c =
  365.  
  366. "1522605027922533360535618378132637429718068114961380688657908494580122963258952897654000350692006139";
  367.  
  368.  
  369.  
  370. public static string Rsa100a = "37975227936943673922808872755445627854565536638199";
  371.  
  372. public static string Rsa100b = "40094690950920881030683735292761468389214899724061";
  373.  
  374. public static string Rsa100d = "39020571855401265512289573339484371018905006900194";
  375.  
  376. public static string Rsa100e = "61218444075812733697456051513875809617598014768503";
  377.  
  378. public static string Rsa100f = "16822699634989797327123095165092932420211999031886";//2d+1-e
  379.  
  380. public static string Rsa100n = "14387588531011964456730684619177102985211280936";
  381.  
  382. public static string Rsa100x = "1045343918457591589480700584038743164339470261995";
  383.  
  384. public static string Rsa100x_plus_n = "1059731506988603553937431268657920267324681542931";
  385.  
  386.  
  387.  
  388. public static BigInteger Sqrt(this BigInteger n)
  389.  
  390. {
  391.  
  392. if (n == 0) return 0;
  393.  
  394. if (n > 0)
  395.  
  396. {
  397.  
  398. int bitLength = Convert.ToInt32(Math.Ceiling(BigInteger.Log(n, 2)));
  399.  
  400. BigInteger root = BigInteger.One << (bitLength / 2);
  401.  
  402. while (!isSqrt(n, root))
  403.  
  404. {
  405.  
  406. root += n / root;
  407.  
  408. root /= 2;
  409.  
  410. }
  411.  
  412. return root;
  413.  
  414. }
  415.  
  416. throw new ArithmeticException("NaN");
  417.  
  418. }
  419.  
  420. private static Boolean isSqrt(BigInteger n, BigInteger root)
  421.  
  422. {
  423.  
  424. BigInteger lowerBound = root * root;
  425.  
  426. BigInteger upperBound = (root + 1) * (root + 1);
  427.  
  428. return (n >= lowerBound && n < upperBound);
  429.  
  430. }
  431.  
  432. }
  433.  
  434. }
  435.  
  436. Each grid cell can be referenced by coordinates (e,n) e across and n down.
  437.  
  438. Since each grid cell that contains any elements will contain infinite elements, we can add a third variable t which indexes the elements.
  439.  
  440. E.g for the first column (containing all products c with a remainder 1 after subtracting the largest square) the first cell is at (1,1) where e=1 and n=1, the first three values of a are 1,5,13
  441.  
  442. At those cells b = 5,13,25 respectively
  443.  
  444. 1x5=5
  445.  
  446. 5x13=65
  447.  
  448. 13x25=325
  449.  
  450. At (1,1) for elements t=1,2,3 then for a we can write
  451.  
  452. (1,1,1)=1
  453.  
  454. (1,1,2)=5
  455.  
  456. (1,1,3)=13
  457.  
  458. Another example:
  459.  
  460. At (4,1) for the second, third and fourth elements, the values of a are
  461.  
  462. (4,1,2)=4
  463.  
  464. (4,1,3)=10
  465.  
  466. (4,1,4)=20
  467.  
  468. You may recognise those numbers.
  469.  
  470. So, t is a index number that allows us to specify an element in a grid location.
  471.  
  472. Note:
  473.  
  474. All products (integers) c that are the sum of two squares appear (only) in columns where e=0,1,4,9,16,25,..
  475.  
  476. This demonstrates that the sum of two squares are closed under multiplication.
  477.  
  478. All Fermat primes (except 3) would appear in column one. We will discover something new about the conjecture that there are only five Fermat primes.
  479.  
  480. You may also note that the values of a and b at (1,1) are the related to the length of the longest side in right angled triangles.
  481.  
  482. Eight years ago, I uploaded a video to youtube when I was in New Zealand in anticipation of now.
  483.  
  484. The video is part one of what I am going to show you here.
  485.  
  486. That video is simply a look at Fermat factorisation to familiarize yourself with the concept, the letters used here and then to extend to the virtual quantum computer described here.
  487.  
  488. Eight years ago, I uploaded a video to youtube when I was in New Zealand in anticipation of now.
  489.  
  490. The video is part one of what I am going to show you here.
  491.  
  492. That video is simply a look at Fermat factorisation to familiarize yourself with the concept, the letters used here and then to extend to the virtual quantum computer described here.
  493.  
  494. https://www.youtube.com/watch?v=9FeROMe0KBU
  495.  
  496. There are two loops in the program.
  497.  
  498. An inner loop and an outer loop.
  499.  
  500. All these loops do is create a series of integers which are the difference of two squares.
  501.  
  502. It is that simple.
  503.  
  504. 1,3,4,5,7,8,9,11,12,13,15,..
  505.  
  506. All these numbers are the difference of two squares.
  507.  
  508. For the ones that are not the difference of two squares (these are odd when divided by two) you can divide by two to create the difference of two squares.
  509.  
  510. Therefore, the difference of two squares covers any integer you wish to factorise.
  511.  
  512. The private key in RSA is based on knowing the two factors of similar length that make up the product used to decrypt anything encrypted with the corresponding public key.
  513.  
  514. This virtual quantum computer will show you how to calculate the factors of a product of two primes.
  515.  
  516. The current fastest method is the general number fields sieve that searches for factors.
  517.  
  518. The virtual quantum computer calculates.
  519.  
  520. Whereas the general number field sieve is sub-exponential in the time taken to search, the virtual quantum computer is less than the natural logarithm in time to calculate.
  521.  
  522. A 4096bit RSA private key can be calculated in less than a second from the public key.
  523.  
  524. When the integers that are the difference of two squares are arranged into the grid and their corresponding properties shown (you can view this as being able to see several dimensions at once), a pattern emerges that once again shows calculations instead of searching are possible.
  525.  
  526. This is not finished yet.
  527.  
  528. RSA100 is just for use as an example.
  529.  
  530. I'll give you an example:
  531.  
  532. 5x29=145
  533.  
  534. a=5
  535.  
  536. b=29
  537.  
  538. c=145
  539.  
  540. d=12
  541.  
  542. e=1
  543.  
  544. 145 is the product of two primes.
  545.  
  546. Therefore it has two representations.
  547.  
  548. 5x29
  549.  
  550. 1x145
  551.  
  552. In the grid, it will appear at cells:
  553.  
  554. (1,5)
  555.  
  556. (1,61)
  557.  
  558. for 5x29, n=5 and n=61
  559.  
  560. Bitmap with black pixel at (0,0) all white for rest of row.
  561.  
  562. All black first row.
  563.  
  564. Whenever a cell has any elements, it is black.
  565.  
  566. Whenever a cell has zero elements, it is white.
  567.  
  568. if (!theend.ContainsKey(e)) theend[e] = new Dictionary<int, List<string>>();
  569.  
  570. if (!theend[e].ContainsKey(n))
  571.  
  572. {
  573.  
  574. theend[e][n] = new List<string>();
  575.  
  576. if (use_bmp && odd)
  577.  
  578. {
  579.  
  580. bmp.SetPixel(e, n, Color.White);
  581.  
  582. }
  583.  
  584. }
  585.  
  586. The end result is that you learn how to design virtual quantum computers so the limits of what you can achieve recede.
  587.  
  588. This grid is one example.
  589.  
  590. The Mandelbrot Set version is multi-purpose.
  591.  
  592. When used in 3D printing, it can be used for a perfect mini chamber to create desktop multi bubble sonoluminescence with input sound and it's shape containing a self sustaining cold fusion reactor. It is safe because should it overheat, the bubbles stop collapsing.
  593.  
  594. We're heading toward safe desktop fusion devices.
  595.  
  596. Then we will use the next design to bypass the fusion and generate electricity from a design improvement using material science in the 3D printing.
  597.  
  598. Science made fun again.
  599.  
  600. It starts with understanding why this first one is a virtual quantum computer. Removing RSA and elliptic curve encryption from the occasion.
  601.  
  602. That will stop people laundering money in cryptocurrency.
  603.  
  604. Return to GOLD standard.
  605.  
  606. What are they missing in EFE (Einstein's Field Equations), why does MOND appear to work outside the Solar System?
  607.  
  608. What is a solution to EFE no one has done the math on because no one takes it seriously?
  609.  
  610. What is a song by Soundgarden?
  611.  
  612. What is the solution to the temperature of the Sun's corona anomaly problem?
  613.  
  614. All related.
  615.  
  616. All obvious with 40,000ft view.
  617.  
  618. Some things are only obvious when you are ALLOWED to ask questions.
  619.  
  620. Once you find the patterns in the grid, it can be scaled up.
  621.  
  622. Then it can be rearranged to solve the problem behind elliptic curve encryption.
  623.  
  624. The key is five dimensions (plus).
  625.  
  626. Our salvation is defined by our emergency procedure.
  627.  
  628. We put the most vulnerable in the lifeboats first.
  629.  
  630. If there are too few lifeboats, we who remain must die with dignity to protect those most precious.
  631.  
  632. This is our humanity.
  633.  
  634. This is who we really are.
  635.  
  636. We are One.
  637.  
  638. Once the last bad actors are taken out the game, the House of Cards falls.
  639.  
  640. BitCoin is a desperate measure to hide money.
  641.  
  642. BitCoin is a honeypot.
  643.  
  644. P=NP
  645.  
  646. That is going to change.
  647.  
  648. Define position.
  649.  
  650. Define key.
  651.  
  652. it
  653.  
  654. >Position
  655.  
  656. A relationship to a point
  657.  
  658. >Key
  659.  
  660. 1000 grams
  661.  
  662. > it
  663.  
  664. Simon didn't say.
  665.  
  666. The grid does all the work for you.
  667.  
  668. >>1958
  669.  
  670. The grid does all the work for you.
  671.  
  672. BigInteger sqrt_f = Lib.Sqrt(Lib.Abs(minus_f));
  673.  
  674. BigInteger sqrt_e = Lib.Sqrt(e);
  675.  
  676. //Section: determine rows (-f,n-1) and (e,n)
  677.  
  678. >>1967
  679.  
  680. For a c at (e,n), there exists (-f, n-1)
  681.  
  682. The difference between e and -f is 2d+1, making columns e and -f unique as a pair to c.
  683.  
  684. The position of column 0 acts as a key with these two unique columns to fufill an equivalent role of the quantum Fourier transform in Shors algorithm.
  685.  
  686. In essence, the grid acts a lookup for integer factorisation and turns the sub exponential big oh search into a log t calculation where t is the length of c in bits.
  687.  
  688. >>1962
  689.  
  690. It will be a pleasure to make history with you.
  691.  
  692. In 2008 I had a brief email exchange with Prof Motti Milgrom to describe key hole events that would give a test for MOND within the Solar System.
  693.  
  694. This would, if performed reveal more about the nature of the Sun and explain the connection between mass discrepancies and point to the choices to make for a solution to the EFE (Einstein Field Equations).
  695.  
  696. Good luck tonight.
  697.  
  698. >>1979
  699.  
  700. I'm not sure if you understand…
  701. >>1988
  702.  
  703. It is not about me.
  704.  
  705. The student becomes the teacher.
  706.  
  707. Pwds:
  708.  
  709. matariki
  710.  
  711. ja5p3rm00
  712.  
  713. th33nd
  714.  
  715. Integers are not a line continuum.
  716.  
  717. There are families based on geometry.
  718.  
  719. Shape.
  720.  
  721. Symmetry.
  722.  
  723. Triangles.
  724.  
  725. >>1998
  726.  
  727. >>1999
  728.  
  729. >>2000
  730.  
  731. Good stuff.
  732.  
  733. Excellent.
  734.  
  735. Hint for the non-trivial Lookup.
  736.  
  737. In the d[t] at -f,1 there are two values where d from c is between.
  738.  
  739. In the d[t] at e,1 there are two values where d from c is between.
  740.  
  741. How would help us find n?
  742.  
  743. Biggest hint since the start.
  744.  
  745. >>2003
  746.  
  747. HINT: x(d) = (sqrt((d+n)^2 - (d^2 + e))) - n
  748.  
  749. where d is d from c and n is one.
  750.  
  751. Anons.
  752.  
  753. In 2010 I saw descriptions of the relationships between grid variables in the ending chapters of Revelation.
  754.  
  755. God wins.
  756.  
  757. The answer or solution to the lookup is in this thread.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement