Jump to content

Trurl

Senior Members
  • Posts

    418
  • Joined

  • Last visited

  • Days Won

    1

Status Replies posted by Trurl

  1. I think the problem with finding a pattern of Primes is that we are looking for the pattern the way we count. It isn’t enough to identify a number Prime. Finding the next in line is still recursive.

    If anyone is interested I’ll post more on this topic. Or if you encountered similar roadblocks please share.

    1. Trurl

      Trurl

      Well in my post “Simple Yet Interesting” if the Pappy Craylar conjecture is true and we can factor SemiPrimes, then we can take a known Prime say 3 and test or graph from zero to infinity and we’re the value approaches zero the number is Prime.

      It can be confirmed by testing other Prime numbers.

      This is why I posted the chart of number in the SYI thread. There is a pattern. You can find all Prime numbers.

      But what is not yet found is a pattern that will explain the difference in subtraction of Prime numbers. That is the recursion I was referring to.

  2. Once I was enrolled in a master’s class in Adult Education. However one professor failed my curriculum outline. I retook the class and got a B. However, it became too expensive.

    So I took my curriculum and taught it here on SFN. I thought, “if I could inspire adults to factor SemiPrimes I would create the ultimate cryptographers.”

    So with over 11,000 views, what did you think of the class?

    1. Trurl

      Trurl

      Darn it. I thought it went viral. Darn the twitter bots.

    2. (See 3 other replies to this status update)

  3. tar

    tar    Trurl

    Trurl,

    I like your electric fields idea regarding the applications of the twelve sections of the sphere but since I last posted on that thread I have run into a major roadblock to all the applications I was considering.  The subdivisions do NOT appear to be of equal area as I had figured earlier in the thread, using a spherical calculator.  I made some incorrect assumptions about angles and unfortunately it appears the subdivisions near the center of each diamond are  of greater area then nearer the corners.    So most applications are thwarted until I come up with a way to have each designated subsection span an equal area.

    There are still some applications that will work if exactness is not required.  If you quarter a section each of the quarters is of equal area, so if you want to divide the sphere into 48 equal sections for your application the scheme is still good.

    One such idea is to for instance mount 48 cameras on a tower or aircraft each pointing in the direction of the center of a quartered section of each diamond.  Then the output of the cameras could be sent in  a one to one way to 48 screens positioned in the same pattern around a viewer.  Thus placing the viewer at the top of the tower or in the craft.

    1. Trurl

      Trurl

      So the 48 cameras are some sort of virtual reality?

      Application: What if you divide the Earth into sections to map satellites?

      What about navigation, especially in Space?

      What about video game 3D world positioning?

      The changing shape and propagation of the radio wave?

      When you draw you start with geometry primitives. Why not create a CAD script?

      It is hard for me to think of something mathematical that doesn’t have an application no matter how small.

      I know my application suggestions are not descriptive and it would take much work to complete them, but I envision a 3D model manipulated by change, shape, and division of spheres. Instead of editing polygons you’d edit spheres. If you tried 3D printing you know the inside of the model is structured like a bridge trusses. Those supports could be your spheres divisions.

    2. (See 3 other replies to this status update)

  4. Can anyone identify if these factors are close?

    i realize that the numbers are huge. I am facing the same problems as you trying to see if this works.

    The goal is not to destroy RSA and those ciphers that rely on factoring. That would cripple SSL certificates. We probably don’t have any encryption the NSA can’t break.

    Instead finding patterns in factorization finds new patterns and series.

    I would like to find patterns in biological organisms, but I no little of genetics or cell biology.

    There are mathematicians and physicists looking for patterns in diseases. I am neither of theses, but finding pattern is the most basic math. If if you don’t understand the theories or notation you can still visualize the series. I am not saying it is easy to add to the field, put anyone can understand patterns.

    That is how I feel. Let’s find patterns in factoring.

    1. Trurl

      Trurl

      What if authentication through SSL, Sites could not prove they’re who they say.

      This post reminds me how much more in crypto I have to learn. But what if the NSA doesn’t have to brute force. Every cipher has public algorithms. What if we thought something was solid and it is just a facade that the math behind it is solid? Seems unlikely; but possible. The British claim to created RSA 7 years earlier. I have read open source ciphers make stronger schemes, but with factoring it may not have a definite pattern, but it doesn’t mean educated guesses can’t defeat it. Brute force may be impossible, but patterns exist in everything. I just think with the knowledge available to the NSA their researchers are ahead of civilian researchers. (Not that I have any knowledge of crypto research.)

      I admit I still need to learn about block chains and hashes. With RSA, p and q are in the enciphering and deciphering key. I am taking a given N and factoring it. But as you explained I need to find N from the enciphering and then break the message—where brute force is needed. But the only reason N is available is because it is the public key.

      The next step for me is to try and decipher messages with public keys and test to see if it is the true N.

      I have some names of ciphers that factoring can’t break. I am not familiar with them. You are right about brute force being useless. But one way functions are hard to make. As long as there is a public key brute force may not be needed.

    2. (See 3 other replies to this status update)

  5. Can anyone identify if these factors are close?

    i realize that the numbers are huge. I am facing the same problems as you trying to see if this works.

    The goal is not to destroy RSA and those ciphers that rely on factoring. That would cripple SSL certificates. We probably don’t have any encryption the NSA can’t break.

    Instead finding patterns in factorization finds new patterns and series.

    I would like to find patterns in biological organisms, but I no little of genetics or cell biology.

    There are mathematicians and physicists looking for patterns in diseases. I am neither of theses, but finding pattern is the most basic math. If if you don’t understand the theories or notation you can still visualize the series. I am not saying it is easy to add to the field, put anyone can understand patterns.

    That is how I feel. Let’s find patterns in factoring.

    1. Trurl

      Trurl

      While it is only my speculation of the NSA. But I always picture them being very powerful. I never read all that stuff Snowden released. I listened to some os his book and he says stuff like the NSA nows you personality and how you think just on Internet habits. Most crypto algorithms are open source. I see intelligence agencies having the best of both worlds: if someone invents something they get it and if they invent something we don’t even know it exists.

    2. (See 3 other replies to this status update)

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.