From: James W Sager Iii Newsgroups: comp.os.msdos.djgpp Subject: Re: Anti hacker game theory. Date: Sat, 2 Sep 2000 23:30:18 -0400 Organization: Fifth yr. senior, MCS Undeclared, Carnegie Mellon, Pittsburgh, PA Lines: 18 Distribution: world Message-ID: <4tgQL_u00UwFB7cYMp@andrew.cmu.edu> References: <0tgIN=200UwE0O9VhY AT andrew DOT cmu DOT edu> NNTP-Posting-Host: po7.andrew.cmu.edu X-Trace: bb3.andrew.cmu.edu 967952143 14164 128.2.10.107 (3 Sep 2000 03:35:43 GMT) X-Complaints-To: advisor AT andrew DOT cmu DOT edu NNTP-Posting-Date: 3 Sep 2000 03:35:43 GMT X-Added: With Flames (outnews v2.6) Path: news.mv.net!newspeer.phoen-x.net!news-spur1.maxwell.syr.edu!news.maxwell.syr.edu!news.cis.ohio-state.edu!xxxx1.sei.cmu.edu!bb3.andrew.cmu.edu!andrew.cmu.edu!sager+ Xref: news.mv.net comp.os.msdos.djgpp:103117 Excerpts from netnews.comp.os.msdos.djgpp: 2-Sep-100 Re: Anti hacker game theory. by Damian Yerrick AT hotmail DOT c > NSA encoding? I don't think the United States National Security > Agency is opening up its tippy-top-secret encryption algorithms. > > Oh, you meant RSA Public Key. I can't comment on RSA for another few > weeks, except that right now it's as looked down upon as GIF is. Yes I mean NSA's security of 15 digit primes. The held contests to break this simplistic code, and it took one company 2 years and ungodly amount of computer power to break the code. Since the NSA bases ALOT of security on this multiplication of two large primes, if you can find a way to factor hideously large numbers that doesn't take a hideous amount of time, you'll be either employed at the NSA, or be known as a national threat :)