147600+ entries in 0.713s

mircea_popescu: but
this is nothing i can prove in any degree of particuliar.
mircea_popescu: asciilifeform no, i know. from
the pov of rsa-being-attacked, it's probably better
to have non-standard exponent
than "everyone uses 65537"
mircea_popescu: (kinda why historically
these were "secrets", from eleusis
to scientology.
the less material,
the easier
the complexity load)
mircea_popescu: the advantage of small batshit cults is
that
there's not enough of
them
to discover where
they self-contradict.
mircea_popescu: asciilifeform i have not yet managed
to find
the 1
ton of earthworms required
to put
through
the blenders so as
to extract
the definition of any of
these nuts'
terms.
mircea_popescu: the rationale is
that
there ~might~ be some approaches based on pre-established exponents.
this is vague, but still, why magic number.
a111: Logged on 2017-11-01 18:18 asciilifeform:
they are imho an intrinsically usgistic item -- costly, fragile, vulnerable, conspicuous.
apeloyee: decryption is forced
to do full-size exponentiation
mircea_popescu: !!rate apeloyee 2 might be
the smartest guy here, actually.
apeloyee: it's _encryption_
that's unreasonably fast, due
to using 65537 as exponent
apeloyee: asciilifeform: don't be silly,
the discrepancy is due
to using low public exponent
diana_coman: but in a few hours I'll have more uninterrupted
time on my hands and I'll be able
to go a bit deeper into it
diana_coman: mircea_popescu, so far
the ~only part iffy is perhaps choice of
timer basically
mircea_popescu: did you
two run into a fucking portability issue of all
things ?
BingoBoingo: danielpbarron:
ty I'll get
to your message when physical plant allows
diana_coman: so, changed
those 2 lines
to pkey.n = mpi_copy(skey->n) and pkey.e = mpi_copy(skey->e) ; correct?
mircea_popescu: don't worry about it,
trial and error, i'll ask questions until i'm out.
diana_coman: asciilifeform, possibly I managed
to screw it up in an even more basic way; here's
the
test function itself (this one gets called repeatedly for each key and each message)
jhvh1: danielpbarron:
The operation succeeded.
diana_coman: asciilifeform,
they are not; moreover
the log shows clearly
that encrypted stuff is different basically
diana_coman: mod6, I couldn't find some
that are directly comparable aka only
the rsa ops as such
mod6: could
then compare your results
to
that and see.
diana_coman: hm, I'd be surprised if it gets wildly different results but
that would be in itself something...interesting I guess
diana_coman: from
the post: Durations are given as CPU
time in seconds, as reported by
the clock() function (time.h) and calculated as ( (double) (end – start) ) / CLOCKS_PER_SEC where end is
the value returned by clock() right before starting
the RSA operation and end() is
the value returned by clock() right after returning from
the RSA operation
diana_coman: lemme just cut
the fluff and
then will post
diana_coman: the private
thing basically holds anything anyway
diana_coman: ah, yes,
that's just because
the public key is a local var filled with
the stuff from private
mircea_popescu: now on
the other hand, BABY crocodiles are universally fodder, birds eat
them, fish eat
them. huge infant mortality among crocs.
diana_coman: honestly, it's prolly faster
to go
through it again and
then post it all and
then
take it from
there
diana_coman: I even have
those in a file
too (i.e. each run, data, encrypted, decrypted
diana_coman: mircea_popescu,I know it
to be uber-fast in water; dunno on land; either way, never saw one in its habitat
mircea_popescu: whereas
the only sort of snake
that'd bother it even conceivably is constrictor ; definitionally slow.
diana_coman: BingoBoingo, interesting; do alligators survive
that
though?
mircea_popescu: i know it doesn't look it, but, crocodile is one of
the fastest predators ; apex predator everywhere it exists.
mircea_popescu: we're ~the first group with something
to actually say.
a111: Logged on 2017-06-20 16:30 phf: scussions, but also any kind of attempt at crypto communication.
there was nothing
to say all along.
a111: Logged on 2017-11-01 16:21 asciilifeform: asciilifeform finds it more
than a little puzzling how little of past 30y of cheap cpu, has been put
to use in advancing illicit radio -- where is
the dc-to-daylight cryptospreadspectrum pirate ? why idjits still on fixed frequencies, like it were 1930s
today ?
mircea_popescu: where was
that part about "frozen diff bits of original lang"
diana_coman: well yes, basically at rsa stage all I had
to change was at generating keys aka source of random bits;
the rest was just identifying
the relevant parts and nothing more
mircea_popescu: it was a whole subculture, you'd
try and
talk
to people
then send postcards as a sort of early deedbotting
a111: Logged on 2017-11-01 16:07
trinque had a ham radio license once upon a
time
BingoBoingo: asciilifeform: Have you
tried
talking
to a few meters of audio
track?
diana_coman: hm, public rsa uses mpi_powm; secret rsa uses crc; still
though 100 fold
diana_coman: asciilifeform, yes, it does; hence my going "I have
to comb
this all way
through again"
BingoBoingo: Using
the
time waiting for people
to people
to clean up and condense physical plant here for greater portability
a111: Logged on 2017-11-02 15:20 asciilifeform: also 1.1s seems like a pretty long
time for a 4096b modexp on
traditional mpi.