Re: Breaking RSA: Totient indirect factorization

看板Bugtraq作者時間18年前 (2007/11/17 03:56), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串5/6 (看更多)
Gandlf, I'm working on a bizarrely similar project (you don't happen to hail from New York, do you?) and have found that using the totient function, you'd need an absurdly large number of CPU cycles to factor RSA properly, slightly less than brute force... like, 2^5 cycles less. The algorithm has such an absurdly high order of complexity that you'd be wasting your time. You'd sooner solve the Riemann Hypothesis. I have books of data on what is seemingly an identical algorithm; please e-mail me directly if you're interested in doing this type of research ~Erick
文章代碼(AID): #17FVO100 (Bugtraq)
討論串 (同標題文章)
文章代碼(AID): #17FVO100 (Bugtraq)