BlackHat Presenter’s Overblown Crypto Claims Destroyed by Real Mathematics and Cryptographers

Note from Winn: The following is important work from Mark Carney, the math guy behind my latest book, Analogue Network Security.

Grant et al. at BlackHat 2019 will present weak, and potentially fallacious claims about prime numbers in his talk at 1:20pm on Thursday, August 8th. Their methods in the paper [1] speculatively improve the speed of checking whether numbers are prime or not, with a view to a knock-on effect of speeding up the cracking of cryptographic key material.

The problem with the paper, and indeed the whole outset, is that it is beset by mathematical errors and inaccuracies, as well as a fundamental misunderstanding of the existing results concerning the distribution and occurrence of prime numbers. We present these ideas in the draft [2]. Notably, we give a lower bound function for the general (and non-unique, contrary to Grant’s claims) class of ‘prime checkers/generators’, showing that the best cases are bounded below by an unbounded function.

[1] https://arxiv.org/pdf/1903.08570.pdf
[2] https://unprovable.github.io/drafts/Prime_Generation_For_Breaking_Crypto-5e.pdf

https://twitter.com/veorq/status/1157478054173691904
https://twitter.com/veorq/status/1157482102109032448

K. Melton

Growing up in Appalachia into intergenerational poverty and genetic afflictions, I faced a world of extremes from the start. Through a relentless pursuit to better myself and overcome adversity, I carved a path to success.

Now, as a cybersecurity awareness expert and DEI advocate, I leverage my experiences to help others unlock their potential and similarly thrive in inclusively inspiring environments.

Over a decade’s experience herding high-performance creative tigers, fostering innovation, extensive change management, DEI & accessibility advocacy, and enhancing digital literacy for any demographic.

https://k-melt.com
Previous
Previous

Analogue Network Security Voted Best Cybersecurity Book of All Time!