Академический Документы
Профессиональный Документы
Культура Документы
This has been in the back of my mind for a long time now. What if the most advanced encryption
protocol for communication is actualy unsafe? What if we got everything wrong? Maybe we need
new math for the NEW CENTURY.
Here´s in theory what should be verified but nobody has proved yet: unreversible functions (trap
functions or one-way functions, http://mathworld.wolfram.com/One-WayFunction.html) do exist
(we only want to believe it exists),
But what if n = p x q, p and q primes, is reversible in a strange but possible and valid in a way?
First we will treat a dependent variable as if it is an independent variable!, that’s right you read it
right, this step is required to find a continuous value in a discontinuous curve (you read right),
N=pxq
q(p) = n/p
which is a ligature. The relation, R, between p and q its non-linear. As p linearly approaches √n, q
non-linearly approaches √n
As we only need one of its prime composites to be less than √n, its respective function or graph is
the following,
From here on its just a matter of optimization, if we work out a smart search of values over the
curve, that is, a logarithmic search,
we can find an answer for
N=pxq
in at least logarithmic time complexity O(log(n)), smartly trying each multiplication p x q and
observing the fractional part, that is k/y, in p = x + (k/y).
We can see an answer can be approximated using a quadrature, actually it would be easier to start
from there and search upwards to higher or lower values depending on the correct direction.
The “magic” happens when the residues or fractional part of the primes becomes the objective
“function” for the optimization of our “y(x) = c/x” type of curve. We can observe how the
fractional part of our objective function (factor) is always increasing or decreasing UNTIL it crosses
A precise boundary, a boundary necessary for RSA to work properly, the equilibrium point!
As a final step we use the answer value to reverse engineer the correct answer to decrypt RSA,
that’s the extended euclidean algorithm,
Pseudo-pseudocode:
And that´s it, with all the above it´s only a matter of derivation of the respective algorithm, to
unlock RSA.