[ / / / / / / / / / / / / ] [ dir / asmr / firechan / fur / htg / imouto / madchan / polmeta / sl ]

/test/ - ⛺ Test Board

Test anything and everything!
Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Flag
Embed
(replaces files and can be used instead)
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options
dicesidesmodifier
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, swf, pdf
Max filesize is 12 MB.
Max image dimensions are 10000 x 10000.
You may upload 5 per post.


Some recommended boards to test! /ani/ - Animation ~ /art/ - Art & Creative ~ /drc/ - Drawfag, Request, Circlejerk ~ /loomis/ - Art Gains ~ /secretrule/ - Certified Autism!
Use >>>/testing/ to test Captcha, User IDs, optional Country Flags and other settings!

File: eb39e3dcb9d683f⋯.png (227.4 KB, 500x380, 25:19, 1462357132966.png)

 No.53431

Okay, let me get this straight:

1: Asymetrical encryption relies on the fact that we currently have no clear algorithm for calculating a numbers nth root, yes?

2: When you press the square root key on a calculator it is not using an algorithm but rather making a series of guesses and checking them, yes?

3: If the encryption process is the data to a power of some fuckhueg number, how does the computer not freeze every time a file is encrypted, the internet jam when it is sent and the server crash when it powers it to the private key? Any number above 1 multiplied to the power of some 50 decimal digit number is going to be pretty big.

 No.53432

I think it uses rounding


 No.53433

Calculating a nth root is easy. It's about multiplying large prime numbers.

Each number has only one prime factorization. 23 * 7 = 161, and there is no other pair of integers (besides 1 and 161) you can multiply to get 161.

If you use two really huge prime numbers you get a really huge result. There are long lists of really huge prime numbers for this purpose, and multiplication is cheap.

But if you have the result of the multiplication, there's no easy way to find the original pair.

In RSA, the public key is that result, and the private key is the original pair. If you use the result to encrypt a message it can only be decrypted with the original pair, and you can safely give people that result.


 No.53434


 No.53438

test

TEST

test

""test""


 No.53439

Okay?




[Return][Go to top][Catalog][Nerve Center][Post a Reply]
Delete Post [ ]
[]
[ / / / / / / / / / / / / ] [ dir / asmr / firechan / fur / htg / imouto / madchan / polmeta / sl ]