Is Public-Key Crypto a lie?

It simply doesn't make any logical sense.

Also something is very suspicious about the three creators of the most widely used public-key cryptosystem; RSA:

R = Rivest is a Jew.

S = Shamir is an Israeli Jew.

A = Adleman is a Jew.

Knowing this, can we really trust RSA?

Attached: 525px-Public_key_encryption.svg.png (525x513, 25K)

Other urls found in this thread:

youtube.com/watch?v=3QnD2c4Xovk
en.wikipedia.org/wiki/Alice_and_Bob
twitter.com/SFWRedditGifs

>t. brainlet
let me guess, you hate math and love Jow Forums. go back and stay in your containment board.

kys

The math really is not complicated user, come on.

>It simply doesn't make any logical sense.
You mean you don't understand it.

oh look, another polkiddie thread

Wow another pol thread great job op

The jews like no other like to protect their shekels, so encryption is one thing they do very well, to serve their greedy needs.

kys and l2math

I dont like kikes either but RSA is mathematically provable mate, google it

just use elliptic curve crypto

actually it is, given how many caveats RSA has and what kind of mental gymnastics you have to do to use it correctly

no it's not, it works based on **assumption** that some operation is hard. there are new and new more and more effective factoring attacks every year

fpbp

>ecc
Can you glow any brighter?

There's no such thing as "monolithic jewish super conspiracy".
They're just got a quite high social IQ score, and this leads some of em to individually try the power grab, and they end up fighting each other.
Those three for example probably did it to fuck with other jews that were betting on easy to grab data.

Nah he’s here to make Jow Forums look bad, clearly a ledditor.

just don't be idiot and don't use the NIST curves
djb gave us safe blazing treasure

>send empty box with open lock to Bob
>Bob puts data in box and locks it with your lock
>sends box back to Alice
>Alice opens the box with her private key
Not that hard user, apply yourself
Also >>>>>>

>**assumption** that some operation is hard
your parent must be proud of your mental capacity

>mental gymnastics
just because you dont understand and hate trivial math, doesnt mean something is wrong. it just means you are too much of a brainlet to understand it

>Alice puts message into the box
>Alice locks the box with her key
>Alice sends the box to Bob, locked with Alice's lock
>Bob locks the box with his key
>Bob sends the box to back Alice, locked with Alice's and Bob's locks
>Alice unlocks her lock
>Alice sends the box to Bob, locked with Bob's lock
>Bob unlocks the box, it's now completely unlocked
>Bob gets the message

Can you prove otherwise?

I'm talking about real world RSA implementations, not your school project joke

>real world RSA implementations
you should abstain from talking about things you know nothing about and thus stop embarrassing yourself

where are the nigger mods to delete such Jow Forums-tier threads?

are we now okay with this jewish conspiracy bullshit here in Jow Forums?

>muh Jow Forums

Attached: autistic-screeching.png (500x678, 42K)

woah shit you're right, you just ruined public key encryption for everyone!

>It simply doesn't make any logical sense.
what about it "doesn't make any logical sense"?
Go on. I'm curious.

the actual implementation for RSA (after finding the primes) is like 20 lines of code.

>this is the first even tangentially Jow Forums related thread on Jow Forums in 4 months
literally what

here is a signature validation implementation for DSA i wrote years ago, it's joke math.
-- validate a signature
Validate = function(key,sig,msg)
local q,p,g,y = key.q, key.p, key.g, key.y;
local r,s = sig.r, sig.s;
if not ( q and p and g and y and r and s and type(msg) == "string" ) then
return false,"Invalid Input.";
elseif not Sha256 then
return false,"Hash function unavailable 'Sha256'.";
end

-- 0 < r < q, 0 < s < q
local temp = BN.new("0");
if BN.eqAbs(r,temp) ~= 1 or BN.eq(r,q) ~= -1
or BN.eqAbs(s,temp) ~= 1 or BN.eq(s,q) ~= -1 then
return false,"Signature out of range.";
end

-- w = s^-1 % q
local w = BN.modInverse(s,q);

-- u1 = H(m)*w % q
local m = BN.fromHex( Sha256(msg):sub(0,40) ); -- H(m)
local u1 = BN.new("0");
BN.mul( m, w, temp )
BN.div( temp, q, nil, u1 );

-- u2 = r*w % q
local u2 = BN.new("0");
BN.mul( r, w, temp );
BN.div( temp, q, nil, u2 );

-- ((g^u1*g^u2)%p)%q == (((g^u1%q)*(y^u2%q))%p)%q
-- these two operations are about 80% of the work
local gu1 = BN.mpow(g,u1,p); -- (g^u1%q)
local yu2 = BN.mpow(y,u2,p); -- (y^u2%q)

local v = BN.new("0");
BN.mul( gu1, yu2, v ); -- gu1*yu2
BN.div( v, p, nil, temp ); -- %p
BN.div( temp, q, nil, v ); -- %q

return BN.eq(v,r) == 0;
end,

What is a discrete logarithmic function?
Now end your pathetic life.

Just because you're too stupid to understand something doesn't mean it makes no sense.

none of those "new and new" and "more and more" effective factoring attacks have proven the assumption wrong, so I do not really understand the point you are trying to make.

But let me tell you, aside from heuristics and special instances attacks, do not expect anything even remotely groundbreaking in the field of integer factorization until quantum computers come along.

>what about it "doesn't make any logical sense"?
All OP is saying is that he doesn't understand it.

So he's actively telling us he's a brainlet?

Stay out of STEM for the good of society
Literally no difference between the two at this point

Also, the reason there are so many Jews in infosec is because a lot of Jews just happen to be really smart. A lot of monumental scientific discoveries were made by Jews as well.

You probably should start moving away from RSA as it is currently used... but not because of the Jews... because of quantum computing.

Who the fuck are Bob and Alice and why are they in every fucking PGP/GPG/any other encryption example?

Why don't websites use public / private keys but still plain old passwords?

at some point the info gets decrypted so if your on the FBI or some other agency's watch list they still can see your online stuff and suddenly using vpn, encryption, etc will make you more suspicious and chris hansen may show up to your door with a chair

Attached: dzk3ngtj85ts1jwwfmd3.jpg (680x440, 10K)

ye, and the password you send travels in plaintext

user convenience, and the keys exist to protect against brute force, which isn't realistic on remote systems anyway.
only if you're not using tsl

Use )))elliptic curves(((

>google image of Bob
>first result is a black male
>google image of Alice
>first result is a white prepubescent female

Actually the first result of Bob is Bob the builder

Here. Watch this preschool video. If you still can't understand it, then you're a confirmed brainlet.

youtube.com/watch?v=3QnD2c4Xovk

Attached: encryption.jpg (700x931, 70K)

Perfect. XD

en.wikipedia.org/wiki/Alice_and_Bob

Alice and Bob are used in place of "A" and "B". It's believed that people follow discussion better if you use a name. These names were chosen way back and they just kinda stuck.

This fucking thread.

How to spot a brainlet with no CS education

>the reason there are so many Jews in infosec
Is because they are good at Kabalah and that is exactly what crypto is about
>monumental scientific discoveries
They were told by the ayys they worship, there is no merit in that.