August 17th, 2009, 05:23 AM
Did you know there is a remote possibility that all codes are weaker than your expect and there is nothing you can do about it? Believe it or not, there is an unsolved math problem that says this is...
January 29th, 2008, 11:25 PM
The Riemann Hypothesis is false and P=NP. I never publish this due to the fact I am a creationist and consider the “separation of church and state” meaning my research is irrelevant. I am...
January 29th, 2008, 10:26 PM
There are rumors that the Traveling Salesman problem has been reduced to P. How would you react if P=NP? How will you respond to this cryptology threat? Does anyone know what would happen if the...
January 31st, 2006, 07:13 PM
I erred in one of my assumptions and I apologize for that. Take 2 integers (need Not be primes) such that both are congruent to 5 mod 12 and the mod equals 12 . c=x^3 mod 12 and x=c^(((number 1 or...
January 25th, 2006, 08:13 PM
Whenever you see the term mod it means the remainder you were taught in school. For example, 6 divided by 7 equals 0 remainder 6. SO let us choose primes 137 and 89. Both have remainder 5 when...
January 16th, 2006, 09:21 PM
This algorithm is known as the Son of the Tsars Algorithm and is donated into the public domain.
Chose any 2 primes such that a=b=5 mod 12. Let n= a mod b and x=plaintext and c=cyphertext. ...
January 16th, 2006, 09:21 PM
This algorithm is known as the Son of the Tsars Algorithm and is donated into the public domain.
Chose any 2 primes such that a=b=5 mod 12. Let n= a mod b and x=plaintext and c=cyphertext. ...
November 19th, 2005, 08:46 PM
The Numbers is about 646 digits long and I can't go any farther, so it is a blow out number. It is to big to obtain accurate calculations. So please tell me how I can program around this.
November 19th, 2005, 03:45 AM
How can you program a rsa decoding 128 bit number? When I try and do it, my numbers just blow up. Can I ask for help.
November 18th, 2005, 04:33 AM
Most defenitely worthy of a bookmark.
November 7th, 2005, 05:07 AM
I have found a way for a spammer to confirm an email address is valid without the user even responding to it. Here is how it is done. An email with an html form with hidden values is sent to the...
October 15th, 2005, 01:32 AM
Is the Riemann Hypothesis a threat to the encryption community? If so, how?
September 7th, 2005, 10:59 PM
I am going to write an article for my website about the threat of Microsoft's email products to national security. In it, Microsoft releases the source code and hackers, spammers and anyone else...
September 5th, 2005, 06:53 PM
Whar is your best firewall you use?
September 5th, 2005, 06:50 PM
I have invented a new form of encryption called the JABEF function. The algorithm splits the encryption algorithms into seperate parts allowing for an exponentially increase in the cipher texts'...
September 2nd, 2005, 11:55 PM
What do you not want to do when programming in Perl CGI from a security view?
September 2nd, 2005, 09:04 PM
I am investigating a possible problem involved in certain modulus based encryption algorithms such as RSA and other encryption algorithms that are modulus based. I was wondering if your could...