06.01.2015 Views

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

Cryptology - Unofficial St. Mary's College of California Web Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

12.10. HOW TO BREAK RSA 247<br />

had to find it. This task is almost infinitely easier than the factoring N using a<br />

brute force factoring method!<br />

OK, perhaps you say that we know that none <strong>of</strong> the small prime numbers<br />

divide N, so let’s not waste our time with those. In fact, let’s only check the<br />

primes that have between 299 and 301 digits. This can’t be so many, right<br />

Well, the Prime Number Theorem, again, tells us there are<br />

10 301 / ln(10 301 ) − 10 299 / ln(10 299 ) > 10 298<br />

primes in this region. We haven’t eliminated too many! 16<br />

OK, perhaps you will argue that somebody will someday figure out how to<br />

factor such big numbers. Really, it is a very simple idea: just factor the darned<br />

thing. There are indeed many many people working on exactly this question,<br />

developing fancy methods with exotic names like “Pollard’s ρ-method” and the<br />

“Number Field Sieve”, and these method have been shown to have the ability<br />

to factor numbers <strong>of</strong> up to 155 digits. 17 So it is possible that in the future 18<br />

people will be able to quickly factor 600 digit numbers. I guess our hope is that<br />

by then whatever messages we send today will be so outdated that no one will<br />

care to go back and break them. And by then we will have switched so that P<br />

and Q are about 300 digits each.<br />

The final “OK”. OK, perhaps you will say but isn’t there this thing called<br />

the “National Security Agency” and isn’t the US government spending billions<br />

<strong>of</strong> dollars to fund them every year to do cryptographic work for the FBI and<br />

CIA and weren’t they smart enough to break the Russians one-time pads when<br />

the Russians didn’t use them properly and don’t they hire many many really<br />

smart mathematicians that they swear to secrecy Might not they have figured<br />

out a way to break RSA ciphers and not be telling us Huh Hey smart guy,<br />

what’s your answer to this And I’d have to answer, “dunno”. Maybe they<br />

have. No one seems to have any real evidence that they did, but we just don’t<br />

know since they aren’t telling.<br />

The upshot is that, outside <strong>of</strong> possibly the NSA (or its equivalents in other<br />

countries), as far as I know no one is currently able to break a carefully constructed<br />

and properly used RSA cipher in any reasonable amount <strong>of</strong> time. This<br />

is an area <strong>of</strong> much research in mathematics, so I’m making no promises about<br />

the future. But for the time being a well-constructed RSA system appears to<br />

be quite secure.<br />

16 In fact, intuitively this makes sense. $10, 000 is a lot <strong>of</strong> money, but removing that much<br />

from $1, 000, 000 still leaves a whole lot left over. Those two extra 0’s are a big deal!<br />

17 See the rsasecurity.com homepage.<br />

18 Two big shots in the field, Arjen Lenstra and Eric Verheul, have guessed that in another<br />

5 or so years (2009) it will be possible to build a computer that can break a 1024-bit RSA<br />

key in about a day for $250 million. The National Institute <strong>of</strong> <strong>St</strong>andards and Technology<br />

recommends that to protect information until 2015 one should use primes <strong>of</strong> roughly 300<br />

digits.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!