SFGOON wrote:Let's make that a bit more fair. Encryption is based off of a number that is a prime times a prime. It makes a unique number that is very hard to break down or "factor out." i.e. 21 = 7 x 3 and nothing else in the universe can create the number 21.
Generally true... if applied to the current practices in asymetrical encryption (ignoring elliptical curves for the moment). The field of encryption also includes various symetrical algorithms that are not based upon primes at all.
SFGOON wrote: If you had an eight digit prime times a fifteen digit prime, factoring it out would be extremely difficult, but once that has been achieved, the entire code is ruined.
Actually, this example is quite easy to factor as all the primes are known in this range. Since roughly one third of the numbers of a given range are primes... this space (1 to 15 digit numbers) can be exhaustively searched in a few minutes.
SFGOON wrote:NSA scientists are currently applying 11-dimensional "Membrane or M-theory" mathmatics (google it!) to break down these numbers using imaginary primes. (An "I" or Imaginary number has been used in math for many years, such as the square root of -2, which can't exist, yet has many applications in electrical engineering.) Using the algorythms extracted form the 11 dimensional universe (as opposed to 3D,) makes computing even the most enormous primes a trivial matter.
Perhaps... but it has not been demonstrated to resolve a real number prime.
SFGOON wrote: Compare it to picking a normal lock to one that's cut away - encryption is nothing more than "security through obscurity" using prime numbers - and it won't last...
I respectfully disagree... Obscure, Yes! But not in the sense that this phrase is used. Most that use the term "security through obscurity" mean to imply a trivial secret. (ie: renaming password.xls to amort.xls to hide it openly).
It's my position that there are two methods of brute force attack. Exhaustive search and reduction.
Exhaustively: As long as the keyspace grows significantly larger than the capabilities of a distributed network of systems attempting to search it, there are no known exhaustive methods to 'guarantee' a reversal.
Reduction: No theory of reducing the prime space into simpler terms has been found and dimensional theories complicate (read as bigger computers) and not simplify the notations. (faster solution)
So... how is it broken today??? The known attacks against asymetrical encryption has absolutely nothing to do with the primes it is built upon. But more so with the methods of comprimising them. Google for: FBI Magic Lantern Keylogger
That's how the big boys do it. They cheat!