RSA-129 - Numberphile

Поділитися
Вставка
  • Опубліковано 21 жов 2024
  • The large number "RSA-129" posed a challenge experts said would take 40 quadrillion years to solve - but took 17.
    Featuring Ron Rivest, co-inventor of RSA... More links below...
    Our original RSA video (how it all works): • Encryption and HUGE nu...
    More from Ron from this interview (quantum computing): • Quantum Computing and ...
    More Ron Rivest on Numberphile: bit.ly/RonRivest
    Ron Rivest's own website: people.csail.m...
    Public Key Cryptography on our sister channel, Computerphile: • Public Key Cryptograph...
    RSA-129: 114381625757888867669235779976146612010218296721242362562561842935706935245733897830597123563958705058989075147599290026879543541
    Numberphile is supported by the Mathematical Sciences Research Institute (MSRI): bit.ly/MSRINumb...
    We are also supported by Science Sandbox, a Simons Foundation initiative dedicated to engaging everyone with the process of science.
    NUMBERPHILE
    Website: www.numberphile...
    Numberphile on Facebook: / numberphile
    Numberphile tweets: / numberphile
    Subscribe: bit.ly/Numberph...
    Videos by Brady Haran
    Patreon: / numberphile
    Brady's videos subreddit: / bradyharan
    Brady's latest videos across all channels: www.bradyharanb...
    Sign up for (occasional) emails: eepurl.com/YdjL9

КОМЕНТАРІ • 568

  • @AntoshaPushkin
    @AntoshaPushkin 7 років тому +1087

    This man is "R" in "RSA"? Wow, thank you, numberphile!

    • @ChrisKnowles1170
      @ChrisKnowles1170 7 років тому +70

      Антоша Пушкин Finally! No one in the contents seems to be appreciating what an honor this is!

    • @bottersnike
      @bottersnike 7 років тому +66

      When they said who he was I was like "holy sh*t!"

    • @Shadowmere29
      @Shadowmere29 7 років тому +1

      same

    • @sevrjukov
      @sevrjukov 7 років тому +4

      +Chris Knowles I totally do, this is amazing. I work with RSA daily.

    • @dmitrygezha7849
      @dmitrygezha7849 7 років тому +4

      Привет соотечественникам, если ты из России, конечно)

  • @wolswinkel
    @wolswinkel 7 років тому +186

    $100 for 40 quadrillion years' work. Flipping heck, that's nowhere near a living wage.

    • @MrSonny6155
      @MrSonny6155 5 років тому +11

      I like how the final payment didn't account for inflation. Let alone did the reward have enough years for inflation to have had a significant effect anyways.

    • @japhethkallombo3820
      @japhethkallombo3820 7 місяців тому

      🤣

  • @davtor33
    @davtor33 7 років тому +49

    It's worth mentioning that the RSA algorithm (under a different name) was known to the US/UK governments close to 10 years before RSA discovered it. Cliff Cocks was technically the "first" person to discover public key using prime numbers (though RSA discovered it independently as well).

    • @jaimeduncan6167
      @jaimeduncan6167 2 роки тому +1

      Super. Do you have a link or the name of the algorithm to read about it ?

  • @Minkehr
    @Minkehr 7 років тому +25

    oh my goodness this is the first time I've seen a live video from "the R" from "RSA"... every student or former student of computer science has run into RSA sooner or later. This is just great. Thank you!

  • @hangugeohaksaeng
    @hangugeohaksaeng 7 років тому +8

    Thanks Brady for once again getting a great interview with yet another legend!

  • @friede6356
    @friede6356 2 роки тому +3

    Back in the day in university learning about cryptography I would never have dreamed about one day seeing the 'R' in RSA talking in a youtube video about how they came up with those famous numbers.
    It feels like witnessing an important part of computing history.
    I'm so excited about this, thank you very much for doing this, I love your video 💙😭

  • @potentiallyRealWarrenGraham
    @potentiallyRealWarrenGraham 7 років тому +175

    When you learn about these guys in books and powerpoints in uni, which you pay a shitload for, and then get a lecture by the guy himself for free on the Internet.
    Praise kek

  • @MrRoyalChicken
    @MrRoyalChicken 7 років тому +377

    Who else imediately spotted the P = NP on the blackboard at 1:20?

    • @numberphile
      @numberphile  7 років тому +27

      Be sure to check out the extra footage at Numberphile2
      ua-cam.com/video/tX7e7CgWrvM/v-deo.html

    • @liveleaky7571
      @liveleaky7571 7 років тому +15

      Numberphile notice me senpai

    • @lawrencecalablaster568
      @lawrencecalablaster568 7 років тому

      Numberphile Good video :)

    • @parabellum4622
      @parabellum4622 7 років тому +1

      P vs NP I declare genocide

    • @harryandruschak2843
      @harryandruschak2843 7 років тому +4

      It's P=NP, and this is one of the major unsolved problems in mathematics. Wikipedia has a short introduction to this concept.

  • @JackMott
    @JackMott 7 років тому +4

    I grew up playing with this guy's RC4 algorithm. Neat to see him interviewed. Thank you Numberphile!

  • @philkeyouz2157
    @philkeyouz2157 7 років тому

    There also a sum who caracterise this number, rsa-129= a+2sqrt(ab+1)+b with ab+1 is a perfect square and 0

  • @WillToWinvlog
    @WillToWinvlog 7 років тому +1

    Thanks for returning to Numberphile Ron! Please come back! We want to know more about the other mathematics you do!

  • @UnionPlank
    @UnionPlank 7 років тому +125

    Typo at 5:24 - unless ScienTITific American is a real journal?

    • @numberphile
      @numberphile  7 років тому +111

      oops, can get a 129-digit number right, but not the word Scientific...

    • @U014B
      @U014B 7 років тому +61

      Alex Evans That was just their Swimsuit Edition.

    • @lawrencecalablaster568
      @lawrencecalablaster568 7 років тому +4

      Numberphile You just have to release a risqué reproductive biology edition…

    • @lawrencecalablaster568
      @lawrencecalablaster568 7 років тому +1

      Numberphile Welcome to the Nerd Internet.

    • @MaxJNorman
      @MaxJNorman 7 років тому +6

      The official misspelling of the Numberphile UA-cam channel

  • @TheChondriac
    @TheChondriac 7 років тому +16

    "$100 for that much computer time was really quite a coup" That gave me a good laugh haha

  • @JasperkentTheNovelist
    @JasperkentTheNovelist 4 роки тому +3

    Some years ago I wrote a novel based on the idea that in the 13th Century, Roger Bacon devised a method for quick factorization, and when this method was rediscovered in the present day, it threatened to break RSA. Couldn't sell it to a publisher though. Too much maths :(

  • @flymypg
    @flymypg 7 років тому +14

    Brady: How much prep do you do before interviewing people like Professor Ron Rivest?
    I enjoy how you ask "simple" questions to get things rolling, then dive in a bit deeper on the follow-up. Well done!

  • @gatoradeee
    @gatoradeee 7 років тому +43

    1:19 The famous RSA trio had already proven P = NP on a classroom chalkboard decades before it became a millennium prize problem.

  • @Carpythesharky
    @Carpythesharky 7 років тому

    I have seen this man in previous Numberphile videos but had no idea he was Ron Rivest from RSA! Amazing!

  • @davidm.johnston8994
    @davidm.johnston8994 7 років тому +18

    I believe there's already a number called "one twenty nine"! I can't remember which one though...

  • @khadijahflowers5566
    @khadijahflowers5566 6 років тому

    Watching this exactly a year after it was posted! Clicked on it out of pure interest!

  • @orfeasliossatos
    @orfeasliossatos 3 роки тому

    Arjen Lenstra was my professor at EPFL, it was such an honour to attend his lectures!

  • @PlayTheMind
    @PlayTheMind 7 років тому +3

    11438(etc) : Number of tweets using the word "tremendous".

  • @nerdbot4446
    @nerdbot4446 7 років тому +360

    114381625757888867669235779976146612010218296721242362562561842935706935245733897830597123563958705058989075147599290026879543541st

    • @TheBodyOnPC
      @TheBodyOnPC 7 років тому +22

      something is wrong with youtube. How can you be 114381625757888867669235779976146612010218296721242362562561842935706935245733897830597123563958705058989075147599290026879543541st when the video only has 3.325 views

    • @zacchon
      @zacchon 7 років тому +3

      Wow! The video has apparently gotten 5148.675 more views in 3 minutes

    • @nielz6782
      @nielz6782 7 років тому

      Well copied! thanks
      I totally didn't post that earlier or so

    • @inkyscrolls5193
      @inkyscrolls5193 7 років тому +2

      +TheBodyOnPC How can it have 3·325 views? Surely a video has either been watched, or has not been watched... so where does the 0·325 of a view come from?

    • @theshadowscreen8028
      @theshadowscreen8028 7 років тому +1

      +Inky Scrolls Are you actually serious?

  • @highagainrock
    @highagainrock 3 роки тому +2

    Hi Numberphile, french fan here! I wondered if you guys would be interested in having someone to translate some of your subtitles in french (particularely this one, but others too). You have a lot of interesting videos I'd love to share with my high school students, unfortunately their english level isn't always enough to understand everything (or anything for some ^^). Thanks for reading me, I hope to hear from you soon. Bye!

  • @6infinity8
    @6infinity8 7 років тому +18

    A. Lenstra is actually one of my professor

    • @andeslam7370
      @andeslam7370 4 роки тому +2

      what's the feeling of attending his lecture?

    • @6infinity8
      @6infinity8 4 роки тому +3

      @@andeslam7370 He's a brilliant person, and an excellent teacher; I only had one class with him but his lectures were really a lot of fun to attend.

  • @tittletotute6444
    @tittletotute6444 7 років тому +86

    Just read the description... You reckon it took 17 quadrillion years to solve?
    doubt it, Earth is only 6000 years old.

    • @stokesy887
      @stokesy887 7 років тому +4

      Nik Conlon a joke?

    • @StratosTitan
      @StratosTitan 7 років тому +15

      Harry Ward facts, read your bible dude

    • @imveryangryitsnotbutter
      @imveryangryitsnotbutter 7 років тому +11

      That joke went over about as well as a brick of lead.

    • @stokesy887
      @stokesy887 7 років тому

      Phoe Nix I know in the bible it says that the earth is 6000 years old but I wasn't sure if it was a sarcastic comment on that, or if it's about the fact that the description makes it seem as though it was 17 quadrillion years as opposed to the 17 that it's implied to be.

    • @kantoros
      @kantoros 7 років тому

      Phoe Nix I don't have one

  • @THEROTATINGFOOT
    @THEROTATINGFOOT 7 років тому

    one of the better numberphile videos in recent history

  • @dhanamkoilraj9608
    @dhanamkoilraj9608 7 років тому

    This guy is Ron Rivest. The R in RSA. Wow. This is such an honor.

  • @aashleshpai7232
    @aashleshpai7232 7 років тому

    what a warm and smiley cryptographer

  • @tarekwisdom664
    @tarekwisdom664 7 років тому

    Oh one of the RSA here !! Mr. Rivest ! :)
    I always was fascinated by his team's work !
    very interesting topic ... then would such algorithm in the few coming years be substituted ?!
    technology actually advances in a way totally unexpected and unpredictable @_@

  • @andrewxc1335
    @andrewxc1335 7 років тому

    Second question: Can we use Dr. Tokieda's ruler-method to generate factor pairs?
    Find the square root of your large product of primes. Find the primes to either side, multiply. If too big, move the smaller one down the list of primes. If too small, move the larger up the list of primes...

  • @josephf151
    @josephf151 7 років тому +1

    Wow, this is one of the people who I can thank for RSA keys for my frequent SSH work! I knew the very basics of the RSA keys, but this is a great background. Thank you for this video.
    How long would it take to factor RSA129 with a modern top of the line single system? would AVX 2.0 make this far easier?

  • @sugarfrosted2005
    @sugarfrosted2005 7 років тому +4

    You independently reinvented the algorithm. It was developed at GCHQ by Clifford Cocks. Deleting if mentioned later.

  • @yinge101
    @yinge101 7 років тому

    Oh my goodness, an inventor of RSA, RC*, MD* and randomised partial checking? This man is a god!

  • @masterunit89
    @masterunit89 7 років тому

    I'm studying at infosec faculty and I'm pretty sure we actually were told about this number and people and story behind it.
    Awesome.

  • @TheLolle97
    @TheLolle97 7 років тому +2

    what a great insight into the early development of a method almost everybody uses when connecting to the internet today! Do more on cryptography :)

  • @RaymondJerome
    @RaymondJerome 7 років тому

    i remember the part of the challenge that had integer partition generated numbers, hundreds of them i believe from 100 digits to 1000 digits. I was someone that even got published for factoring one of those, a really small number times a really large one.

  • @AkashSingh-pu4dc
    @AkashSingh-pu4dc 7 років тому +3

    This Channel is gold for CS and Math Students. Lots of love from India

  • @jorgelbarral
    @jorgelbarral 6 років тому +2

    What a humble genius!

  • @thelastofthemartians
    @thelastofthemartians 7 років тому +2

    I remember stumbling on an article by Helleman in the August 1979 issue of Scientific American called "The Mathematics of Public-Key Cryptography" as a young trainee programmer in the early 1980's. I used that article to implement a (fairly amateurish) public key encryption system in IBM Basic Assembler Language that ran (really slowly!) on an IBM 3031 mainframe. I still have the source code, but unfortunately it is on 9-track 6250 bpi round magnetic tape - and I have no way to read it to find out just how amateurish my effort was! Of course, at the time I had no idea how important public key cryptography would become, and so it is kind of annoying to not have proof that I once dabbled in leading edge technology

  • @Boyarsskiy
    @Boyarsskiy 2 роки тому

    Excellent video from the creator!

  • @R0XYF0X
    @R0XYF0X 7 років тому +8

    I'm happy because for once I realized that I already knew something.

  • @Gloryisfood
    @Gloryisfood 3 роки тому

    The legends! Learnt these guys from my cryptography course!

  • @qwertyuiop1077
    @qwertyuiop1077 5 років тому

    Intriguing way of attracting people's minds towards maths reality

  • @sonikempire
    @sonikempire 7 років тому +1

    Please more videos on cryptography! !!!!!! encryption, etc! Thanks. He puts the R in RSA.

  • @MrCyanGaming
    @MrCyanGaming 7 років тому +21

    If you're reading this, have a Great day! 😄😄😄

    • @gabor6259
      @gabor6259 7 років тому +1

      Thanks, have a great life!

    • @barettagraal9113
      @barettagraal9113 7 років тому +1

      CyanGaming | ᴹᶦᶰᵉᶜʳᵃᶠᵗ ⁻ ᴳᵃᵐᵉᴾᶫᵃʸ you forgot "- from small youtuber"

    • @jackchrismon637
      @jackchrismon637 7 років тому

      OML the cancer has spread from Mumbo Jumbo

  • @topilinkala1594
    @topilinkala1594 3 роки тому

    It has been said that HP-50g is a computer as it can handle as large number as the memory can hold. But on the other hand it is a calculator as it is allowed to be used in school tests.

  • @graysonjones5425
    @graysonjones5425 7 років тому +9

    I'm watching this with spare time in my math class haha

  • @dordfnord6055
    @dordfnord6055 7 років тому +12

    I wonder how many viewers have never actually heard hardware making the modem sound that starts around 4:20 into the video.
    Ahh, the joys of dial-up connections. Those were the good-old days ... NOT!

    • @nathansmith3608
      @nathansmith3608 5 років тому

      in 100 years viewers will assume it was an Enigma cipher machine warming up 🤣

    • @trankertrank4751
      @trankertrank4751 2 роки тому +1

      Nice

  • @BlackXxScopez
    @BlackXxScopez 7 років тому +4

    for all primes numbers p above 1 and below RSA-129(r), if r/p is in primes: return (r,p)

    • @BlackXxScopez
      @BlackXxScopez 7 років тому

      it should take around number of primes*n time to work, which is very fast.

    • @AnvitGarg25
      @AnvitGarg25 7 років тому

      AP gonna try that.. don't think it's gonna be that fast.. plus you only need to check till sqrt(RSA129)

    • @compiling
      @compiling 7 років тому

      AP But now you need to find all the 64 digit prime numbers, which is even more difficult.

    • @MultiKounter
      @MultiKounter 7 років тому +5

      RSA-129 = 3490529510847650949147849619903898133417764638493387843990820577
      × 32769132993266709549961988190834461413177642967992942539798288533
      It was factored in 1994 using ~1600 computers

    • @BlackXxScopez
      @BlackXxScopez 7 років тому

      but easier than random chance by far :)

  • @poserp
    @poserp 5 років тому

    Fermat's method of factorization generalizes to all figurate numbers.

  • @clayz1
    @clayz1 7 років тому

    I wrote a little prime factoring program back in the 90’s. You put in the number of your choice and it spits out a list of the prime factors. So in essence that is what is needed to find the factors of your number. The program couldn't digest that many digits though.
    Fun! I'm nowhere to being in your league though. Of course.

  • @wktodd
    @wktodd 7 років тому

    Brady, you really need a mic on you, if you are to be heard when asking questions from behind the camera.
    Apart from that, another really interesting video.

  • @thepatcat
    @thepatcat 7 років тому +2

    In case anyone's curious, here's the message that RSA-129 encrypted: "The magic words are squeamish ossifrage."
    Also, Brady et al. -- have you ever touched on the seeming paradox of one to the power of infinity being undefined? Logically it should be 1, but...

    • @xamnition
      @xamnition 7 років тому

      But what?

    • @thepatcat
      @thepatcat 7 років тому

      But 1^infinity is undefined, much as 1/infinity is.

    • @jimdecamp7204
      @jimdecamp7204 6 років тому +1

      Infinity is not a number, so no numerical operation on infinity is defined. Infinity implies the absence of a limit to a process. Saying that "the sum of (1/2)^n for n from 1 to infinity = 1" simply says that as n increases without limit the sum becomes arbitrarily close to 1.

    • @shadowatom
      @shadowatom 6 років тому

      The indeterminate form 1^infinity is actually to represent functions such as (1+1/t)^t as lim t -> infinity. Technically speaking in that function, where the limit approaches depends on if 1+1/t gets to 1 faster than it being multiplied by itself infinitely many times.

  • @devils1
    @devils1 7 років тому

    Without seeing the answer Id solve by using a computer to iteratively converge down to the solution, i.e. multiply large primes if the product is too small try larger ones, if the product is too large then try smaller, basically it would require some computer programming skills to write the correct program

  • @bariswheel
    @bariswheel 6 років тому

    Fantastic content thanks for sharing . What does he mean by 'rolling the dice' ? Obviously it's a metaphor but I'd like to understand what they did exactly .

  • @Justifer14
    @Justifer14 7 років тому +5

    I don't know what to think about the P = NP in the background at 1:18

  • @ThatPsdude
    @ThatPsdude 7 років тому +2

    I love how happy he is talking about this =P

  • @Nalianna
    @Nalianna 7 років тому

    Was the cheque ever cashed? or kept for sentimental reasons?

  • @Supriyobiswas649
    @Supriyobiswas649 2 роки тому

    f(x)=(x^2) +-2x +-[3-cos(x.pi)]/2
    Any value for x (except 0 which gives 1)atleast 1of the 4 equation will generate a prime.
    Why this happens?

  • @jarahfluxman20
    @jarahfluxman20 7 років тому

    What if you multiplied 100 prime numbers together. Then you randomly picked 2 factors of that number. The cracking of the code would become harder because not only would you have to factorise the number into it's primes, you'd also have to find the unique combination of the 100 primes. There are approximately 2^99 ways to split the number into two factors.

    • @matteo-ciaramitaro
      @matteo-ciaramitaro 7 років тому

      Jarah Fluxman the point of encyption is usually to be able to decrypt it yourself? if youre just choosing 2 primes from a set of 100 large primes thats less secure than choosing two from the set of natural numbers

  • @jbramson1
    @jbramson1 7 років тому

    Why is it easy to determine that p and q are prime but difficult to find the factors of pq? Seems like you would need to find the factors of p and q individually to know whether they are prime... Is it just that pq is much bigger?

  •  3 роки тому

    great lecture!

  • @worf7271
    @worf7271 7 років тому +14

    Why did they offer a $100 prize for the factorization? Seems kind of pointless.

    • @OriginalPiMan
      @OriginalPiMan 7 років тому +7

      Khan Singh
      An incentive that wouldn't break the bank.

    • @numberphile
      @numberphile  7 років тому +65

      +Khan Singh $100 prizes for math problems is kind of a tradition and nod to Erdös

    • @sysop073
      @sysop073 7 років тому +3

      Well, for a cashier's check the money is still gone, it's withdrawn when the check is issued

    • @douggwyn9656
      @douggwyn9656 7 років тому +9

      Yeah, the real value is in being awarded the prize (which may enhance one's professional reputation). Donald Knuth has been giving out checks for finding errors in his "Art of Computer Programming" books, starting at something like $1 for the first error reported, $2 for the second, etc. I may be the only Knuth-error-award recipient who went ahead and deposited my check.

    • @cbernier3
      @cbernier3 7 років тому

      So what? You can cash it and keep it too.

  • @gajiodea
    @gajiodea 7 років тому +2

    this guy is a legend

  • @eduardogomes4865
    @eduardogomes4865 7 років тому

    I KNOW I KNEW THAT PHOTO WITH 3 GUYS AND "P = NP"! IT IS RSA!! How could I not have noticed? An absurdly large integer as the product of two huge primes together with a smaller number...

  • @lucifchristo
    @lucifchristo 7 років тому

    u should touch on digital rooting and the vedic square. 9!!

  • @Zer0Mem0ry
    @Zer0Mem0ry 7 років тому

    Ron Rivest is a genius.

  • @user-kc4oj5vs4v
    @user-kc4oj5vs4v 7 років тому

    Who else thinks Numberphile should make a video showing how they make their videos and how you can do the same and submit them to a specific website in which they can of videos on? Or at least to have a channel of your own like this one?

  • @rubenscabral2657
    @rubenscabral2657 3 роки тому

    I am Brazil, factoring the prime number is taking the number multiplied by all the odds before it, from top to bottom, there will only be 1 that is prime and another is the rest that is a prime number.

  • @2Cerealbox
    @2Cerealbox 7 років тому +8

    Numberphile is poaching from computerphile now.

    • @randommemer1080
      @randommemer1080 5 років тому

      both are directed by the same guy, so yeah

  • @douro20
    @douro20 6 років тому

    Are Shamir or Adleman still working in the industry?

  • @ra0869
    @ra0869 7 років тому

    So the RSA is basically famous because it is a large number and it is a product of two large prime number which makes it very useful in encryption. So, I mean its not really difficult to come up with a number like that; you just take two randomly chosen large numbers and multiply them to get a large number.

  • @jamalawad1463
    @jamalawad1463 7 років тому

    What does BSA 1 mean? It's the letters in the background of the caption ?!

  • @tallevi2000
    @tallevi2000 7 років тому

    so what does that mean????
    if the product can be factorized doesn't it mean the RSA mechanism is broken?
    i know we use much bigger number today but still... the entire RSA mechanism is based on a sole assumption the factorizing huge number to their primes is an extremely difficult task. but what if we can make it a less difficult task (by improving the algorithms and increasing compute power)??

    • @jimdecamp7204
      @jimdecamp7204 6 років тому

      Every single cipher is breakable in principle whenever the message length is longer than the key. (Think of the German Enigma which did not employ this technique.) The RSA-129 challenge put an upper bound on the level of effort required. Experience tells us that data breaches come from disloyalty and carelessness, not from cryptological attacks.
      One time pads actually offer an encryption method that is unbreakable in principle, but they are expensive to implement. One famous case where "one time pads" (a better term would be "some time pads") were broken was the infamous Venona decrypts. Remember that carelessness thingy? The Soviets re-used pages in their one-time pad books. Since they always send messages using a new first page and the messages all contained stereotyped preambles, it was not hard for American cryptographers to spot messages sent with the same one time pad and hence to reconstruct the pad. (The length of the two messages was twice the length of the pad, which was the encryption key.)

  • @DarthGiraffe
    @DarthGiraffe 7 років тому +1

    Nice Mighty Black Stump cameo

  • @artemirrlazaris7406
    @artemirrlazaris7406 7 років тому

    the question is there more then one answer. Well, if you look at the number and product. Solution should of been more apparent. 129 digit answer. 66 digit * 64 digit prime if I counted it right then its aprox. Take into account the rule of zero's a given answer, you can rule out swaths of numbers. Also useless combinations, relating to "end" and "start" product of the number. Such as How many numbers multiplied give 1. 1*1, 1*7, 3*7 9*9... etc of course all even combinaions are thrown out because its not a prime. that along eliminates the req considerable. working backwards one can narrow how 541 is created from a small number set simply be seeing the reverse operation. If product end is 541. Say if 9*9 was used, 81 1 is the result carry the eight want result is 4. We find that even less numbers exist to create it, and possibly a non combination later. So in doing chunks of the product backwards, with remainder carries, one could find the digits that comprise the p and q. Although one might not know the p and q. doing this method would eliminate many possibilities. What you have.. after sometime is end up with a few variants.. but like password it eliminates itself, because of its product and those multiplied are its prime. So 533 and 577. would appear as one of those variants of course one can verify and eliminate primes that are not part of the variants which intern isolate the and q further. Not sure a computer was needed for the solution... Since a list of primes exist. the law of zeros is that and since its primes multiplied. Its not 1 digit *129 digits, or 11 digits * 119 digits. the result was 66 digits*64 digits to give us the 129 digits needed. IN this case digits are added, but written out they would be multiples of 10's. 66+64 =130 digits.. now did I add wrong.. Who knows... anyways cool problems thats my thoughts.

  • @yordanagerdzhikova4222
    @yordanagerdzhikova4222 7 років тому

    read the girl with the dragon tattoo!! They're 4 awesome books involving this

  • @mathuniverse786
    @mathuniverse786 7 років тому

    nice video

  • @andrewxc1335
    @andrewxc1335 7 років тому

    Can we create a candidate list of all likely primes (with a certain number of digits), and then just multiply the last few (3-ish) digits until a combination works to find the last few digits of the target number?
    Then once the candidate list is complete, double the number of digits that we care about, and rinse & repeat until there is only one possible combination? It seems like this would be much faster than trying to multiply out the whole prime values...

    • @esquilax5563
      @esquilax5563 Рік тому

      That list would be larger than the observable universe

  • @DustinRodriguez1_0
    @DustinRodriguez1_0 7 років тому

    Since the primes become significantly less densely represented the larger integers get, doesn't that directly act to reduce the difficulty of finding p and q as the final number gets larger and larger? Are p and q supposed to be very close to each other in length? If so, doesn't that make it much easier to find them as you can just start with the square root and test around there? If they can differ substantially in length, are there advised minimums for each?

    • @esquilax5563
      @esquilax5563 Рік тому

      I'm 6 years late, but you shouldn't start at the square root at search close to there. See Computerphile's more recent "breaking RSA" video for the explanation - basically that an attacker could do the same thing

  • @wieter4094
    @wieter4094 7 років тому

    I like how numberphile can make an interesting video out of algebraic math.

    • @valeriobertoncello1809
      @valeriobertoncello1809 7 років тому +1

      king joe It's really the only big channel about maths... in contrast to channels dedicated to phisics, biology and science in general, which are a lot more.

    • @wieter4094
      @wieter4094 7 років тому

      The Commentator Yes I know, but the thing is that this topic has a very advanced background, methods that couldn't be found until a few decades ago.

  • @juniormatsuda5116
    @juniormatsuda5116 7 років тому +116

    Hey random people reading comments, have a great day!

    • @recklessroges
      @recklessroges 7 років тому +11

      I'm not random, I'm specific and I specifically hope your day is at least satisfactory.

    • @Zeftow
      @Zeftow 7 років тому +2

      Junior Matsuda thanks, you too!

    • @lawrencecalablaster568
      @lawrencecalablaster568 7 років тому +2

      Junior Matsuda You too!

    •  7 років тому

      You too!

    • @zacchon
      @zacchon 7 років тому

      Happy birthday, Tim!

  • @ryanjeffk
    @ryanjeffk 7 років тому

    I tried writing a python script for this, but it only works for smaller primes. I can't get it to work with large primes. Any thoughts?
    def prime_finder(num):
    x=2
    while x

  • @hyperbolicparaboloid2818
    @hyperbolicparaboloid2818 7 років тому +1

    Wonder why they chose their initials to be in that specific order, instead of alphabetical order...

  • @ferretyluv
    @ferretyluv 7 років тому

    But isn't the symbol for a random prime number capital pi?

  • @dm_nimbus
    @dm_nimbus 7 років тому

    I have one of this guy's textbooks on my desk right now :)

  • @Robertlavigne1
    @Robertlavigne1 7 років тому

    Awesome Video!!

  • @ammobake
    @ammobake 7 років тому

    When quantum computing becomes more prevalent, this kind of encryption would become obsolete right? Because it would become more likely for a computer to decode this kind of encryption, mathematically, unless you have billions of circuits all with their own RSA style encryption because at some point even if a computer can decode the math, at some point the time limitation makes it impossible. But the way to decode this would be to first determine all possible factors of RSA129 and then have the quantum computer test all possible combinations for each new factor it discovers. Eventually it will find the correct answer.

  • @xistic1
    @xistic1 7 років тому

    Shouldn't you blur out the routing numbers on the check?

    • @ragnkja
      @ragnkja 7 років тому

      xistic1 I somehow doubt the cheque is still claimable after more than twenty years, especially if it's already been cashed in by the team it was sent to.

  • @Derbauer
    @Derbauer 3 роки тому

    Wait, so i can just create a 300 digit P and Q number by adding 1 or other tests to find the closest prime number and then multiply the 2 and get a massive number that not even supercomputers can figure out the original numbers that generated that number?

  • @R00KIEo87
    @R00KIEo87 7 років тому

    see you created a critical table also known as the payment table where you restrict a one Pacific or large number then you'll end up going down the actual chart which indicates a permit wants it spread out these particular numbers in this chart
    have you tried a reverse technique of this chart by turning the chart upside down and working from a small number tours a big number multiplying or dividing or taking away

  • @nicktheoregonian
    @nicktheoregonian 7 років тому

    Is there a reason why you couldn't use three primes to increase security?

    • @jimdecamp7204
      @jimdecamp7204 6 років тому +3

      For a given key size (in this case 129 decimal digits) two primes are always optimal. The more factors, the easier they are to find. If I attack a key of length 129, I know that at least one of the factors will be less than the square root of the key. The number of primes less than the square root of RSA-129 is 7.3040e+061. If you use three primes, one must be less than the cube root, so the number of such primes is about 4.9900e+040. This problem is 21 orders of magnitude easier. Once I have that factor, I will have reduced the remaining complexity by whatever the size of the quotient is. It is *much* easier to solve two problems of order 1e40 than one problem of order 1e61, more than a thousand billion billion times easier.
      For any key length, always select two primes.

  • @StezeeRider
    @StezeeRider 7 років тому

    Is RSA-129 a method/postulation, by which 128BIT OS's can be used as a 'Virtual-129Bit-OS' on naturally-limited occasions, by creating '1-Virtual-Bite' from all other 128Bits, on uncompressing the data? To throw off all 128Bit-And-Less-Malware and All-128Bit-And-Less-Hacks?

  • @john_tann
    @john_tann 7 років тому

    Think I'm missing something - looks like the encoded message would be solvable by frequency analysis.

    • @jimdecamp7204
      @jimdecamp7204 6 років тому

      Only if the message length was significantly longer than 10^64 characters.

    • @john_tann
      @john_tann 6 років тому

      Definitely missed something then!

  • @rodrigoappendino
    @rodrigoappendino 3 роки тому

    Ok, but R is from his first or his last name?

  • @keithwilson6060
    @keithwilson6060 Рік тому

    When he said “decimal digits,” I thought he meant decimal in the common meaning of the word for most people. I had to replay it twice to understand what he was saying.

  • @aetheriox463
    @aetheriox463 7 років тому

    i tried to google 114381625757888867669235779976146612010218296721242362562561842935706935245733897830597123563958705058989075147599290026879543541 and this came up
    "114381625757888867669235779976146612010218296721242362562561842935706935245733897830597123563958705058989075147599290026879543541"... is too long a word. Try using a shorter word.

  • @AxeManAnthony
    @AxeManAnthony 7 років тому

    "...the cheapest purchase of lots and lots of computer time." Well played.

  • @maxwell6667
    @maxwell6667 7 років тому

    could you please make a video on why
    e^(i*2*PI*x) = (e^(i*2*PI) )^x = 1^x = 1
    is a false statement? why does a^(bc) = (a^b)^c seem to not apply here?
    thanks in advance :)

    • @EmilienGosselin
      @EmilienGosselin 7 років тому

      Max Well e^(2iπx) actually equals 1

    • @maxwell6667
      @maxwell6667 7 років тому

      only if you assume that x is an integer
      for example if x = 1/2, then you get:
      e^(2iπx) = e^(iπ) = -1
      which contradicts the statement that i made earlier how e^(2iπx) should always be 1 if regular laws of powers apply
      which tells me that a^(bc) = (a^b)^c is not true for e^(2iπx) to begin with

    • @OrangeShellGaming
      @OrangeShellGaming 7 років тому +1

      a^(bc) = (a^b)^c works for real numbers, but not for complex numbers.

  • @ShasTheGOAT
    @ShasTheGOAT 7 років тому +1

    could you do a video about infinity factorial?

    • @valeriobertoncello1809
      @valeriobertoncello1809 7 років тому +5

      Shas, Infiniy is really not a number to which you can apply a function such factorial(x)... it's more of a concept.

    • @xamnition
      @xamnition 7 років тому

      There is an infinite amount of ways of arranging infinite objects