Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - jnesselr

Pages: 1 ... 155 156 [157] 158 159 ... 165
2341
Math and Science / Re: New RSA Algorithm discussion
« on: July 21, 2010, 12:14:48 pm »
I believe it is when it is installed. And no "let's modify the OS" comments, please, btw.  I think Ndless should do fine for that, while this thread is for RSA. Just a precaution. :D

Oh, and I didn't realize it before, but I definitely got Ninja'd on my last post.

the reason we need to factor n into p*q is so that we can calculate phi(n)=(p-1)*(q-1), right? well, what if, instead of trying to find a better factoring algorithm, we try to find a fast way to compute the totient without knowing the factors.....
We could.  The difference between n and t is (P+Q-1), though.

2342
Axe / Re: String Manipulation
« on: July 21, 2010, 12:07:30 pm »
Okay, I see it.  I see how it works.  Wow, that is really amazing.  Wow, my bad.

2343
Axe / Re: String Manipulation
« on: July 21, 2010, 12:02:01 pm »
That code will not work, calcdude.  The first routine will return a random number 0-9, the second, 0-8, the third ,0-7.  In other words, they could still all end up being 7 or something.

[EDIT] Ignore this post.

2344
Math and Science / Re: New RSA Algorithm discussion
« on: July 21, 2010, 11:56:44 am »
I hope we can find another way.  I don't fully understand the Nspire, so this is my way of contributing.  Also, I have one concern. If they can prevent another OS, like below a certain version, then there must be a way to prevent other non-ti os as well.  Basically, if we factor the boot2 key, we shouldn't have any problem at all.

Although, they would not have to do a whole new line, necessarily.  They would just need to change the keys on all new versions.  Also, if the system supported it, technically, the os could have many signatures, all signed with different keys, and if the any/all of the keys matched, it was accepted.  I don't know how effective that would be, though, as you are signing the same hash with different keys.

2345
Math and Science / New RSA Algorithm discussion
« on: July 21, 2010, 11:41:58 am »
Okay, so many people want to break RSA security because of the Nspire.  Well, it's not at all easy, and the current algorithms won't even work well on a 1024 bit number.  So I was thinking, that if an entire calculator community put their heads together, then we might actually think of a workable algorithm.  Now then, first I will explain RSA.

RSA is a public/private key cryptography system.  You have a public key (n,e) and a private key (n,d).  When you "break" RSA, it means that you found the private key using the public key.  Now then, I will show you how you get n, d, and e, and why it is so difficult to break as n grows larger.

The basis of the algorithm is simple.  You find two prime numbers, p and q, that are somewhat close together (about the same bit-length).  You set n=pq.  Now, n is a semi-prime, which means it is a multiple of two primes.  You then choose an e (most common one is 65537 or 2^16+1).  You find the totient function (which in the case of primes is p-1), so you set t=(p-1)(q-1).  Now you use an algorithm (Extended Euclidean) to find d such that de-1 is divisible by t.

With the Nspire keys, we have the public key: n and the exponent (most likely 65537, but that doesn't really matter), and we need to find the private key: n and d.

Finding d using e and the totient is easy.  The question is how to find the totient from n.  Well, the most obvious method would be to factor the number n, and use the factors, p and q, to find the toitent function (p-1)(q-1).  Now then, I believe an example is in order.  (Note: The number used here is not even close to the size of the actual numbers used.)

This is done as if we were TI, making the keys for the initial use.
Say we choose two prime numbers. p=13 and q=17.  We can easily see that (13-1)(17-1)=(12)(16)=192=t.  Now, using the Extended Euclidean algorithm, we use e=65537 and t to find d.  This makes d=65.  In case you don't want to read the Extended Euclidean algorithm (Specifically modular multiplicative inverse), let me explain how it works.  de-1=(65)(65537)-1=4259905-1=4259904.  4259904/192=22187, with the remainder being 0.  This is the d for the private key.  We are done finding the keys to use.

TI can either encrypt or sign their OS.  What signing means, is that a checksum of the data of the OS is taken, and encrypted using the private key.  (That is done one the computer)  The calc then does a checksum of the os, and uses it's public key to decrypt the checksum of the OS.  If the two checksums are equal, it is a valid os sent by TI.

Now then, this is our part:
The easiest way to send an OS or open the calc completely would be to, using the public key (which we already have) factor the number n.  Using the factors, we can easily find the private key.  The number 221 that I used earlier is only a byte.  That is 8 bits.  The number we are trying to factor for the Nspire is 1024 bits.  That is a lot bigger, so there are a few things that won't work:

  • Naive algorithms like trial division. (Seriously, please don't suggest it)
  • Any current algorithm.  Yep, no current algorithm is good enough to factor the key.  The current record is 768 bits, made by the top researchers with algorithms we don't even have access to.
Have I made it seem like all hope is lost?  Good! Now then, the reason I am creating this thread is not to discourage, but encourage.  I believe that if we all work on an algorithm together, that it is possible to actually factor the numbers.

(I just realized that I use the phrase "now then," a lot when trying to explain something.)

Any questions  (Wow, that was a long post with a lot of parenthesis.)

2346
Other Calculators / Re: Let's hack Nspire OS 2.1!
« on: July 21, 2010, 10:50:42 am »
@graphmastur: The only way around it is releasing a new line of calculators. You can't just change the keys overnight and expect them to work on all the Nspire calcs.

I'm just suggesting ideas. I'm not the person who does this kind of stuff. I've started some preliminary prime number analysis, but otherwise, nothing much at all. Monsieur Debroux might be able to do it, but he, like you, is unwilling to. Just another random idea: rent Amazon/Sun Microsystems servers, and use that. :) (Of course, it has to be donation funded. Sun Microsystems does give free usage for some projects, but I doubt cracking RSA keys is one of them...)

(Sigh....)
It's actually quite interesting really. RSA cracking is basically finding 2 prime numbers that multiply each other to get a final number (which I think is the public key).

It's basically finding 2 numbers that multiply each other to give the final key.
It's kinda sad really that mathematics is the thing that's preventing all of this... :(
I still think TI can find a way around it.  After all, TI would not be happy with the keys being cracked.
It's not that we are unwilling to.  We would all like nothing more than having full access to the Nspire.  But unfortunately, it is highly unlikely.

Your best bet is a project called boinc.  There is only one algorithm that is actually pretty successful right now at factoring numbers.  Unless someone comes up with a better algorithm, which by all means please try, it isn't going to happen.  We are unwilling, because right now, it would be a complete waste of time.  So then, better algorithm... (new thread)

2347
Other Calculators / Re: Let's hack Nspire OS 2.1!
« on: July 20, 2010, 10:59:16 pm »
@graphmastur: OK, I see. So much for hope.... I still think we should at least TRY to factor the keys. After we're done, we're free forever! :)
well, we're not quite free.  TI will find some way around it.  Okay, so if you really want to try, you are most likely going to want to use the boinc project.  There would have to be a custom server, because NFS won't do it.  The current record is 768-bits made by the top experts in the field.  This is 1024 bits.  This would take absolutely forever.  It's just not possible, without a better algorithm.  So unless you find a better algorithm, then it is not going to work.

Oh well.

2348
Other Calculators / Re: TI'S Response to our outrage
« on: July 20, 2010, 06:29:17 pm »
Well of course, TI is not going to say "yeah, we took the ability off, because we didn't want you running unsigned code, so please don't. :)"

I mean, why would they?

2349
Axe / Re: Randon Integers
« on: July 20, 2010, 04:43:28 pm »
Edit: 555th post! I'm 5/6 of the way to being evil :P
Congrats!

Mhmm I see, thanks graph
No problem.

2350
Axe / Re: Randon Integers
« on: July 20, 2010, 02:55:34 pm »
Btw, when using modulus, if for example you use ^3, won't you have like 1 chance out of 65535 to get 0 as result? I checked with this: http://calculator.sdsu.edu/calculator.php (I didn't felt like writing an axe program just for that right now)
No.  Any multiple of 3 will return 0 if done mod 3.  The basic idea is n=qd+r, where q is the quotient, r is the remainder, and d is the divisor.  If r=0, then that means n=qd, so d has to be a factor of n.  The same thing with n mod d.  If d is a factor of n, it will return 0.

Also, know something that might get confusing.  For any random number (produced by axe) n, n mod d produces numbers in the range of 0 to d-1.

[EDIT] Also, a random digit between m and n, where m>n, is (rand^(m-n+1)+n).  Note: The outer parenthesis are not necessary, and this is not tested, but should work.

2351
Axe / Re: Tilemap Editor
« on: July 20, 2010, 12:54:57 am »
What about grayscale support?

2352
News / Re: Nspire 2.1 out, don't install it!
« on: July 20, 2010, 12:48:46 am »
Considering that there entire sales platform is the nspire, then it would be problematic if the cas software were to be available to non-cas users.

2353
Other Calculators / Re: TI'S Response to our outrage
« on: July 19, 2010, 03:59:06 pm »
*gasp*  a troll!  ban him from the kingdom!!!

oh, and...
1st! (Sorry, couldn't resist)

2354
Other Calculators / Re: TI'S Response to our outrage
« on: July 19, 2010, 03:45:11 pm »
It is.  I asked about the usb packet information once, and they said that it is Proprietary, and therefore cannot tell me.

2355
Other Calculators / Re: TI'S Response to our outrage
« on: July 19, 2010, 03:23:28 pm »
so they don't say why?  wow.  Can you respond and ask them why?

Pages: 1 ... 155 156 [157] 158 159 ... 165