0 Members and 2 Guests are viewing this topic.
@bwang: Ndless2 sounds dismal... so I thought that I should try to crack it and develop an exploit.A little bit of general discoveries for now though.
@graphmastur: OK, I see. So much for hope.... I still think we should at least TRY to factor the keys. After we're done, we're free forever!
@graphmastur: The only way around it is releasing a new line of calculators. You can't just change the keys overnight and expect them to work on all the Nspire calcs.I'm just suggesting ideas. I'm not the person who does this kind of stuff. I've started some preliminary prime number analysis, but otherwise, nothing much at all. Monsieur Debroux might be able to do it, but he, like you, is unwilling to. Just another random idea: rent Amazon/Sun Microsystems servers, and use that. (Of course, it has to be donation funded. Sun Microsystems does give free usage for some projects, but I doubt cracking RSA keys is one of them...)(Sigh....)It's actually quite interesting really. RSA cracking is basically finding 2 prime numbers that multiply each other to get a final number (which I think is the public key).It's basically finding 2 numbers that multiply each other to give the final key.It's kinda sad really that mathematics is the thing that's preventing all of this...
But then again... wouldn't the likeliness that we would have to hit all the combinations be low?
Could you possibly code it so that if I hit CTRL-C (or hit a key to quit the program), it saves the key?
I think critor was the guy I was thinking about that is a math professor...?