Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: Overlord_77520; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    3
    Views
    3,105

    What happens if P=NP?

    Did you know there is a remote possibility that all codes are weaker than your expect and there is nothing you can do about it? Believe it or not, there is an unsolved math problem that says this is...
  2. Thread: P=NP?

    by Overlord_77520
    Replies
    6
    Views
    1,453

    The Truth

    The Riemann Hypothesis is false and P=NP. I never publish this due to the fact I am a creationist and consider the “separation of church and state” meaning my research is irrelevant. I am willing...
  3. Thread: P=NP?

    by Overlord_77520
    Replies
    6
    Views
    1,453

    P=NP?

    There are rumors that the Traveling Salesman problem has been reduced to P. How would you react if P=NP? How will you respond to this cryptology threat? Does anyone know what would happen if the...
  4. Replies
    18
    Views
    4,047

    Faulty Algorithm

    I erred in one of my assumptions and I apologize for that. Take 2 integers (need Not be primes) such that both are congruent to 5 mod 12 and the mod equals 12 . c=x^3 mod 12 and x=c^(((number 1 or...
  5. Replies
    18
    Views
    4,047

    How this works.

    Whenever you see the term mod it means the remainder you were taught in school. For example, 6 divided by 7 equals 0 remainder 6. SO let us choose primes 137 and 89. Both have remainder 5 when...
  6. Replies
    18
    Views
    4,047

    Free NEW Encryption Algorithm

    This algorithm is known as the Son of the Tsars Algorithm and is donated into the public domain.
    Chose any 2 primes such that a=b=5 mod 12. Let n= a mod b and x=plaintext and c=cyphertext. ...
  7. Replies
    18
    Views
    4,047

    Free NEW Encryption Algorithm

    This algorithm is known as the Son of the Tsars Algorithm and is donated into the public domain.
    Chose any 2 primes such that a=b=5 mod 12. Let n= a mod b and x=plaintext and c=cyphertext. ...
  8. The Numbers is about 646 digits long and I can't...

    The Numbers is about 646 digits long and I can't go any farther, so it is a blow out number. It is to big to obtain accurate calculations. So please tell me how I can program around this.
  9. How do they prevent a blowup number?

    How can you program a rsa decoding 128 bit number? When I try and do it, my numbers just blow up. Can I ask for help.
  10. Replies
    4
    Views
    1,653

    Passes my Test

    Most defenitely worthy of a bookmark.
  11. Poll: How spammers can confirm your email address without you even responding.

    I have found a way for a spammer to confirm an email address is valid without the user even responding to it. Here is how it is done. An email with an html form with hidden values is sent to the...
  12. Replies
    7
    Views
    1,376

    Is the Riemann Hypothesis a threat?

    Is the Riemann Hypothesis a threat to the encryption community? If so, how?
  13. I want your opinion how Microsoft could destroy the Internet

    I am going to write an article for my website about the threat of Microsoft's email products to national security. In it, Microsoft releases the source code and hackers, spammers and anyone else...
  14. Replies
    21
    Views
    5,067

    What firewall would you recommend?

    Whar is your best firewall you use?
  15. What is the NSA's opinion on new encryption ideas.

    I have invented a new form of encryption called the JABEF function. The algorithm splits the encryption algorithms into seperate parts allowing for an exponentially increase in the cipher texts'...
  16. What do you not want to do in programming Perl CGI scripts form a security point.

    What do you not want to do when programming in Perl CGI from a security view?
  17. Poll: Possible flaw in RSA and other modulus based encryption algorithms.

    I am investigating a possible problem involved in certain modulus based encryption algorithms such as RSA and other encryption algorithms that are modulus based. I was wondering if your could...
Results 1 to 17 of 17

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides