[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: IMG_2932.jpg (2.55 MB, 2816x4096)
2.55 MB
2.55 MB JPG
How do I decrypt an encrypted message by using 2 prime numbers? Chinese remainder theorem? Fermat-Euler theorem? Extended Euclidean algorithm? Sieve of Eratosthenes?
>>
>>107553680
if the message was sent by a brown/asian woman and you are white you already have a master key
>>
B4BWC
>>
>>107553680
I've blasted quite a few loads to this choco slut
>>
>>107555501
Who is she?
>>
>>107556282
Ariel Demure
>>
>>107553680
Stop making ne feel bad about my gf with these gigantic anime boobthreads
>>
>>107555392
Mutt's law
>>
>>107556483
>Build for big white cock
You mean Yuropoor's law
>>
>>107556483
>>107556525
Even though I'm europoorean.
>>
>>107556704
Mutt's law is about BBC not BWC.
>>
>OP listing random theorems like they’re ingredients

If you already have p and q, you’re done. Decrypt is just:

n = p*q
phi = (p-1)*(q-1) (or lcm(p-1, q-1) if you’re being fancy)
d = inverse of e mod phi (this is what extended Euclid is for)
m = c^d mod n

CRT = same m, faster (work mod p and mod q then recombine).
Sieve = for finding primes, irrelevant.
You probably still need to pad though
>>
>>107556733
Unpad sorry
>>
>>107556718
Mutt's law is about interracial sex, you dumbass.
>>
>>107556300
Thank you anon
>>
>>107553748
>gooks aren't brown

kill yourself long ling
>>
>>107557901
majority has light skin
>>
>>107556733
what's stopping people from bruteforcing it?
>>
>>107557990
gooks are yellow not brown
dumb white, I mean jew (same race anyway)
>>
>>107557917
The lifetime of the average human. For long enough p and q, the brute force time is in the millions of years. That's counting using a massive data centre 24/7 the whole time.
>>
>>107558082
>For long enough p and q
I wonder for how long this will be true. IIRC 2000 bit are considered not safe, because quantum computers are pretty good at factoring prime numbers.
>inb4 quantum computers are a meme
they may be, but the day someone builds one (with enough qbits) all your encryption is instantly broken if you only rely on RSA, as the algorithms exist already.
>>
>>107553680
Why do you want to encrypt something? Are you a pedo?
>>
>>107558117
If you want to factor in quantum computing, then don't use RSA at all. No bit value is quantum safe. Our best quantum computers at present can factor... 20 bit numbers. Practical quantum computers are a very long way away.
>>
>>107556718
but I want her bleached with a bunch of BWCs.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.