Bugtraq mailing list archives
Re: Breaking RSA: Totient indirect factorization
From: "Erick Galinkin" <erick.galinkin () gmail com>
Date: Thu, 15 Nov 2007 22:33:16 -0500
Gandlf, I'm working on a bizarrely similar project (you don't happen to hail from New York, do you?) and have found that using the totient function, you'd need an absurdly large number of CPU cycles to factor RSA properly, slightly less than brute force... like, 2^5 cycles less. The algorithm has such an absurdly high order of complexity that you'd be wasting your time. You'd sooner solve the Riemann Hypothesis. I have books of data on what is seemingly an identical algorithm; please e-mail me directly if you're interested in doing this type of research ~Erick
Current thread:
- Breaking RSA: Totient indirect factorization gandlf (Nov 14)
- Re: Breaking RSA: Totient indirect factorization Alexander Klimov (Nov 15)
- Re: Breaking RSA: Totient indirect factorization Clifton Royston (Nov 15)
- Re: Breaking RSA: Totient indirect factorization gandlf (Nov 15)
- Re: Breaking RSA: Totient indirect factorization Erick Galinkin (Nov 16)
- Re: Breaking RSA: Totient indirect factorization gandlf (Nov 15)
- Re: Breaking RSA: Totient indirect factorization Watson Ladd (Nov 16)