home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!cis.ohio-state.edu!magnus.acs.ohio-state.edu!usenet.ins.cwru.edu!agate!linus!linus.mitre.org!gauss!bs
- From: bs@gauss.mitre.org (Robert D. Silverman)
- Subject: Re: Where is the FAQ - new reader
- Message-ID: <1992Nov20.133611.12951@linus.mitre.org>
- Keywords: FAQ RSA PRIMES
- Sender: news@linus.mitre.org (News Service)
- Nntp-Posting-Host: gauss.mitre.org
- Organization: Research Computer Facility, MITRE Corporation, Bedford, MA
- References: <1992Nov18.183729.16527@mlb.semi.harris.com>
- Date: Fri, 20 Nov 1992 13:36:11 GMT
- Lines: 28
-
- In article <1992Nov18.183729.16527@mlb.semi.harris.com> dbrillha@dave.mis.semi.harris.com writes:
- :Two quick questions from a new reader (and new to encryption) ...
- :
- :1.) Were can I get the most recent FAQ?
-
- Dunno.
-
- :
- :2.) I am playing around with understanding RSA. Pretty simple.
- : (IMHO someone, someday, will find a fast way to factor huge primes)
-
- I doubt it. A fast algorithm for factoring primes would be pretty useless.
- (over Z that is).
-
- What do you base your opinion on?
-
-
- : Anyway, the unencrypt step requires huge (x^y mod z) calculations.
- : Testing using 2-digit prime numbers still leads to computations such
- : as 1014^613 mod 1147 = 385. Can you point me to a fast numerical
- : algorithm for performing this type of computartion.
-
- As always, see Knuth, Vol. 2. He has an entire section devoted to this.
- --
- Bob Silverman
- These are my opinions and not MITRE's.
- Mitre Corporation, Bedford, MA 01730
- "You can lead a horse's ass to knowledge, but you can't make him think"
-