(no title)
aykevl | 6 years ago
* Discuss the result with a few cryptographers he trusts, to check whether he didn't make a mistake and to make sure he's not the only one who knows about it.
* Write a paper. Put in all kinds of silly things, because it will get published anyway.
* Publish proof of having found the algorithm, together with a hash of the paper.
* Wait ~3 years until everyone has moved to a better algorithm. The normal responsible disclosure period is 3-6 months but this is so big it has to take a bit longer.
* Publish the paper.
I certainly think this is pretty dangerous. It may in fact be better to do the initial publication anonymously... and make sure you avoid all possible traces (the NSA will do everything in their power to get a hold of you).
OscarCunningham|6 years ago
I think my plan would just be to publish that factorisation anonymously (being super paranoid to avoid being traced) and then wait however long was necessary before publishing the algorithm.
jasonhansel|6 years ago
archgoon|6 years ago
This has little impact on what someone can do with the algorithm, but it sounds like the author is concerned with ensuring that they understand why their new algorithm works. Since they're committed to not discussing their discovery for several years, it seems reasonable to want to make sure they haven't convinced themselves of something that doesn't work the way they think.
RealityVoid|6 years ago
No, I think this is a danger to you as long as you, and only you know about it.
Now, in the case you were to immediately publish this after you find out,same thing, you'd be safe. The fallout would be sub-optimal though, you would gain no immediate cash, but you would gain notoriety (maybe not the best kind) and you would give NSA and other intelligence agencies who presumably collected encrypted data for later deciphering. The internet security would probably be compromised for a couple of months, until new algos would be in place.
I am not a cryptographer and I just have minimal understanding of these things, but I'll take a crack at saying what could be done:
1) Tell no one. POC is sufficient to deomnstrate it working.
Ethical path goto 4
Unethical path:
2) Build a helper program that can easily crack keys on demand
3) Put it out on the darknet that you decrypt stuff for a steep fee. Get rich.
4) Publish the finding, do not provide the algo, focus on maintaining anonymity and having impeccable OPSEC. Provide proof.
This will mean that everybody knows how unsafe their infrastructure is and there will be maximum effort to move everything to something else. But the algo is still contained and people can not yet have the power, _you_ have it. This, of course exposes you to maximal risks but also maximizes your potential financial reward. Maybe someone will soon find a way to crack it too, and then your show is off. Or maybe they will never find it and you remain a mystery, the _one_guy who could brake prime factoring. (unlikely, considering the number of smart people on this earth)
cm2187|6 years ago
cm2187|6 years ago
rocqua|6 years ago
It doesn't break elliptic curve crypto by factoring numbers. Instead, it breaks them by solving the discrete logarithm problem.
seppel|6 years ago
Well, what kinds of mistakes can you make? Either it works or it doesnt. You (and everyone else) can verify that easily.
(It might not work some numbers with special properties or so. But this does not matter if you can already break 99% of RSA keys)
cococonspirator|6 years ago
emilfihlman|6 years ago
No discussion needed. Simply MITM yourself or others in network to find out.