Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <87wmox5x1y.fsf@fatphil.org>
Deutsch   English   Français   Italiano  
<87wmox5x1y.fsf@fatphil.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Phil Carmody <pc+usenet@asdf.org>
Newsgroups: sci.crypt
Subject: Re: Exploration of Diffie-Hellman Multiplication versus Exponentiation
Date: Tue, 16 Apr 2024 15:09:13 +0300
Organization: A noiseless patient Spider
Lines: 38
Message-ID: <87wmox5x1y.fsf@fatphil.org>
References: <2d79d2a2ad4bb66ed7e75c60f482a03d$1@sybershock.com>
MIME-Version: 1.0
Content-Type: text/plain
Injection-Date: Tue, 16 Apr 2024 14:09:14 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="f15427b9add8b35cb29e5b964a2d25b1";
	logging-data="994885"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18zmpORhmGj1sWf9B4yUnuI"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux)
Cancel-Lock: sha1:AlJqozzi9mI7puZVaPsbSRZgZPw=
	sha1:erk7y7kSO55QyU7o2/jgLOcYeCs=
Bytes: 2215

SugarBug <3883@sugar.bug> writes:
> Question 1
> ----------
>
> How difficult is it to find the two hidden prime factors, as opposed
> to finding the secret exponent of a known factor as in the first
> example?
>
> Question 2
> ----------
>
> What modern methods of attack are used to discover the hidden factors
> of example 3 and where can I read about them with examples?
>
> Question 3
> ----------
>
> Do any cryptosystems actually use any variation of example 3 with
> multiplication rather than exponentiation, and if so, which?
>
> Question 4
> ----------
>
> Per examples 1 through 3, if x, y are GREATER than modulus M, what are
> the implications for security or attack domain parameters and how? Or
> in other words, why are x and y usually chosen to be less than M, from
> a security perspective?


Just post your tutor's email address, and we can send the answers
directly to him, that'll save you all effort.

Phil
-- 
We are no longer hunters and nomads. No longer awed and frightened, as we have
gained some understanding of the world in which we live. As such, we can cast
aside childish remnants from the dawn of our civilization.
-- NotSanguine on SoylentNews, after Eugen Weber in /The Western Tradition/