{"id":746,"date":"2009-02-26T10:47:25","date_gmt":"2009-02-26T10:47:25","guid":{"rendered":"http:\/\/scientopia.org\/blogs\/goodmath\/2009\/02\/26\/stepping-up-divison-by-zero-to-perfect-encryption\/"},"modified":"2009-02-26T10:47:25","modified_gmt":"2009-02-26T10:47:25","slug":"stepping-up-divison-by-zero-to-perfect-encryption","status":"publish","type":"post","link":"http:\/\/www.goodmath.org\/blog\/2009\/02\/26\/stepping-up-divison-by-zero-to-perfect-encryption\/","title":{"rendered":"Stepping Up Divison By Zero to Perfect Encryption"},"content":{"rendered":"<p> An alert reader sent me a link to a really dreadful piece of drek. In some ways, it&#8217;s a<br \/>\nrehash of the &#8220;Nullity&#8221; nonsense from a couple of years ago, but with a new spin.<\/p>\n<p>If you don&#8217;t remember <a href=\"http:\/\/scientopia.org\/blogs\/goodmath\/2006\/12\/nullity--the-nonsense-number\">nullity<\/a>, it was the attempt of one idiot to define division by zero.<br \/>\nHe claimed to have &#8220;solved&#8221; the great problem of dividing by zero, and by doing so, to be able<br \/>\nto do all manner of amazing things, such as to build better computers that would be less prone<br \/>\nto bugs.<\/p>\n<p><a href=\"http:\/\/www.singularics.com\/products\/encryption\/\">Today&#8217;s garbage<\/a> is in the<br \/>\nsame vein: another guy, this one named Jeff Cook, who claims to have &#8220;solved&#8221; the problem of<br \/>\ndivision by zero. But this one claims that this gives him a way to prove the Reimann<br \/>\nhypothesis, to rapidly crack RSA public key encryption, and to devise a new &#8220;theoretically<br \/>\nunbreakable&#8221; encryption algorithm.<\/p>\n<p> The grandiosity of this Mr. Cook is astonishing. He&#8217;s started a company (which is looking<br \/>\nfor investors!); here&#8217;s a quote from his company&#8217;s homepage:<\/p>\n<blockquote>\n<p><b>Great scientific discoveries<\/b> mark the milestones of human history.<\/p>\n<p>Such are the accomplishments achieved by the men and women of Singularics. Standing on the<br \/>\nshoulders of giants such as Albert Einstein and Bernhard Riemann, we have reached up through<br \/>\nnature&#8217;s veil and seen what lies hidden there more clearly than anyone else before us. Our<br \/>\ndiscoveries have yielded a new mathematical framework, one that provides a profound<br \/>\nunderstanding of nature&#8217;s basic mechanics. We have discovered <b>The Science of<br \/>\nSingularics\u2122<\/b>, the study of the singularity.<\/p>\n<p>We have already found a variety of important applications of <b>Singularic Technology\u2122<\/b>,<br \/>\nbut perhaps the most immediately useful are <b>Neutronic Encryption\u2122<\/b>, a new theoretically<br \/>\nunbreakable public key encryption algorithm and <b>Singularic Power\u2122<\/b>, a new form of clean<br \/>\npower generation.<\/p>\n<p>Neutronic Encryption, our next generation public key encryption algorithm, will play a<br \/>\nvital role in the digital age by ensuring that the electronic information of governments,<br \/>\nindustry and individuals is kept secure and private in a world where cyber-terrorism is on the<br \/>\nrise.<\/p>\n<p> We have also developed a new primary power generation system capable of delivering<br \/>\nabundant, clean and inexpensive energy that can satisfy power requirements on any scale.<br \/>\nSingularic Power production technology generates zero pollution and can therefore play an<br \/>\ninstrumental role in promoting a harmonious coexistence between human civilization and the<br \/>\nEarth&#8217;s fragile ecosystem.<\/p>\n<p> To date, our analysis of the mathematics and physics at the singularity has lead us to<br \/>\neight important new inventions, most notably in the fields of information security and clean<br \/>\nenergy. All eight inventions (patents pending), have significant and immediate application in<br \/>\nthe global market.<\/p>\n<p> It is our vision to use these advances to bring about great improvements for everyone<br \/>\nthrough new technology, intelligently applied.<\/p>\n<\/blockquote>\n<p> Mr. Cook doesn&#8217;t have too high an opinion of himself, does he?<\/p>\n<p><!--more--><\/p>\n<p> Of course, that&#8217;s really content free hype. He&#8217;s hoping to recruit investors, and so the<br \/>\ngrandiose claims are inevitable: no one invests in a business that says something like &#8220;We&#8217;re<br \/>\nan incremental improvement over our competitors!&#8221; So some amount of hyperbole is acceptable, if annoying.<\/p>\n<p> The real question is, is there anything behind those grandiose claims? Does he really<br \/>\nhave anything but hype? Is there the slightest shred of reality underlying<br \/>\nthat hype?<\/p>\n<p> Alas, no. Moving to his &#8220;cryptography&#8221; page:<\/p>\n<blockquote>\n<p>Singularics has advanced the state of the art in cryptography by developing a<br \/>\nnew theoretically unbreakable public-key algorithm called Neutronic Encryption\u2122.<\/p>\n<p>Our advances in Prime Number Theory have led to a new branch of mathematics called<br \/>\nNeutronics. Neutronic functions make possible for the first time the ability to analyze<br \/>\nregions of mathematics commonly thought to be undefined, such as the point where one is<br \/>\ndivided by zero. In short, we have developed a new way to analyze the undefined point at the<br \/>\nsingularity which appears throughout higher mathematics.<\/p>\n<p>This new analytic technique has given us profound insight into the way that prime numbers<br \/>\nare distributed throughout the integers. According to RSA&#8217;s website, the RSA public key<br \/>\nencryption algorithm has an installed based of nearly one billion. Each of these instances of<br \/>\nthe prime number based RSA algorithm can now be deciphered using Neutronic analysis . Unlike<br \/>\nRSA, Neutronic Encryption is not based on two large prime numbers but rather on the Neutronic<br \/>\nforces that govern the distribution of the primes themselves. The encryption that results from<br \/>\nSingularics&#8217; Neutronic public-key algorithm is theoretically impossible to break.<\/p>\n<\/blockquote>\n<p> There&#8217;s so much wrong with this that it&#8217;s hard to know where to start.<\/p>\n<p> I suppose the best starting point is the most basic one: division by zero isn&#8217;t a problem. It&#8217;s just meaningless. When we say that it&#8217;s undefined, that&#8217;s not because we&#8217;re afraid of dividing by zero. It&#8217;s not because we&#8217;re unsure of what the answer should be. We say that it&#8217;s undefined because, simply, it&#8217;s undefined. It&#8217;s not that we haven&#8217;t given it a definition: &#8220;undefined&#8221; has a specific meaning in math.<\/p>\n<p> In math, we can desribe division as a function with two parameters: D(a,b). Like every function, D has a domain (a set of inputs) and a range (a set of outputs). A function is defined for a value if and only if that value is in the domain of the function. When we say that D is undefined when b=0, what we mean is that for all values of a, (a,0) is not in the domain of D. When we say that division by zero is undefined, what we mean is that no input to division with zero as the second parameter is in the range of the division function. It&#8217;s undefined.<\/p>\n<p> The fact that division by zero is undefined is <em>not<\/em> a matter of accident, or of<br \/>\nignarance. It is not just a trivial little thing. It&#8217;s actually <em>important<\/em>. If<br \/>\ndivision by zero were defined, then a lot of what we consider standard math would completely<br \/>\n<em>stop working<\/em>. The fact that division by zero is undefined is a fundamental part<br \/>\nof the structure of our system of numbers; it&#8217;s one of the basic field axioms that define<br \/>\nthe basis of how we understand the real numbers. Take that axiom away, and suddenly things<br \/>\nstop working. <\/p>\n<p> It&#8217;s not impossible to create a system in which division by zero is defined. But if you do<br \/>\nthat, <em>you&#8217;re starting from scratch<\/em>. Almost every theorem about real numbers relies on<br \/>\nthe field axioms, and will therefore be invalid in your new system. So you&#8217;ll need to<br \/>\nre-derive almost everything. And it&#8217;s not just a matter of finding a different derivation;<br \/>\nmany of the things that we take for granted <em>will not work<\/em> in your new system.<\/p>\n<p> There are serious mathematicians who&#8217;ve played with the idea of defining division by zero.<br \/>\n(For example, someone &#8211; I think Conway himself &#8211; played with the idea of defining division by<br \/>\nzero in a variant form of the surreal numbers.) One good way of recognizing a crank is by<br \/>\nlooking at what they do with their new division-by-zero defining system. A serious mathematician starts working out what affect their definition has on the basic axioms,<br \/>\nand what still works. A crank defines division by zero, and then proceeds to continue working as if they haven&#8217;t broken anything.<\/p>\n<p> Mr. Cook has <a href=\"http:\/\/www.singularics.com\/science\/mathematics\/rh.php\">a paper<\/a> on his page about his wonderful system and how it allows him<br \/>\nto prove the Riemann hypothesis. In the paper, he just blithely proceeds on<br \/>\nas if he hasn&#8217;t broken anything. He doesn&#8217;t show the slightest awareness that he&#8217;s<br \/>\nrelying on axioms that he&#8217;s invalidated.<\/p>\n<p> Moving on, let&#8217;s look at the next silly claim. Not only does this guy claim to have &#8220;solved&#8221; division by zero, but he claims to have developed a &#8220;theoretically unbreakable&#8221; public key encryption system.<\/p>\n<p> Sounds great, doesn&#8217;t it? Using his brilliant division-by-zero techniques,<br \/>\nhe can crack RSA; and he&#8217;s even got a replacement, which is an <em>unbreakable<\/em> public key crypto system.<\/p>\n<p> Except, of course, &#8220;theoretically unbreakable public-key encryption&#8221; is basically a<br \/>\nvery complicated non-sequitur.<\/p>\n<p> It&#8217;s possible to create an unbreakable cryptosystem. In fact, it&#8217;s <em>easy<\/em> to<br \/>\ncreate an unbreakable cryptosystem. One of the easiest crytographic<br \/>\nsystems is based on something called a <em>one time pad<\/em>. In a one-time pad, the<br \/>\ntwo parties to the communication share a very long secret &#8211; typically a book of<br \/>\nrandom numbers. To encrypt a message, you convert each character in the message<br \/>\nto a number, and add it to the number from the pad. To decrypt, you just subtract. Each<br \/>\nnumber in the pad is used exactly once, and there&#8217;s absolutely no pattern to the numbers. Once<br \/>\na page from the pad has been used to encrypt or decrypt a message, it&#8217;s torn out and destroyed. If you don&#8217;t have a copy of the pad, you can&#8217;t decrypt the message. It doesn&#8217;t matter how much computer power you have available; it doesn&#8217;t matter how clever you are; it doesn&#8217;t matter what brilliant algorithms you can think up. Without the numbers on the pad, there is absolutely <em>no way<\/em> to decrypt the message.<\/p>\n<p> Public key &#8211; aka asymmetric encryption &#8211; is an entirely different story. There<br \/>\nis <em>no way<\/em> to build an unbreakable public key system. You can make a system in<br \/>\nwhich it&#8217;s incredibly difficult to crack it &#8211; which is exactly the RSA model. But <em>any<\/em> public key system can be cracked by a brute force attack. It&#8217;s the nature of the system: you can&#8217;t possibly avoid that. For <em>any<\/em> possible public key cryptosystem, there&#8217;s<br \/>\na straightforward brute-force attack:<\/p>\n<pre>\nct = Encrypt(pt, public_key)\nfor i in PossibleKeys do\nattempt = Decrypt(ct, i)\nif attempt = pt then\nprint \"Private key = \" + i\n<\/pre>\n<p> If you&#8217;ve got a public key cryptosystem, that attack <em>will<\/em> work. Period. There&#8217;s<br \/>\nno way around it. It might take a <em>very<\/em> long time. But it <em>will<\/em> work<br \/>\neventually. Further, every public key cryptosystem is based on some fundamental<br \/>\nrelationship between the public and private keys. A cryptanalyst can study that<br \/>\nrelationship, and use it to refine the attack above. There is simply no such thing<br \/>\nas an unbreakable public key cryptosystem.<\/p>\n<p> So without even knowing anything about how his &#8220;Neutronic&#8221; encryption purportedly<br \/>\nworks, I can say that his claim is absolutely nonsense &#8211; worse than nonsense, it&#8217;s<br \/>\nan idiotic claim that demonstrates that Mr. Cook really doesn&#8217;t understand how<br \/>\npublic key encryption works.<\/p>\n<p> Further &#8211; he claims that he&#8217;s developed a way of cracking RSA. But nowhere on the site<br \/>\ndoes he do anything to support that claim. Mr. Cook and his fledgling company haven&#8217;t<br \/>\ndemonstrated that. They&#8217;ve got no explanation of <em>how<\/em> their alleged break of<br \/>\nRSA works, beyond the division by zero rubbish &#8211; and that&#8217;s all built up on<br \/>\nincredibly, stupidly bad math.<\/p>\n<p> Mr. Cook and his coworkers is a con-artist, trying to convince people to give him<br \/>\ntheir money. His claims range from unsupportable rubbish to nonsensical word salad.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An alert reader sent me a link to a really dreadful piece of drek. In some ways, it&#8217;s a rehash of the &#8220;Nullity&#8221; nonsense from a couple of years ago, but with a new spin. If you don&#8217;t remember nullity, it was the attempt of one idiot to define division by zero. He claimed to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-746","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p4lzZS-c2","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"http:\/\/www.goodmath.org\/blog\/wp-json\/wp\/v2\/posts\/746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.goodmath.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.goodmath.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.goodmath.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.goodmath.org\/blog\/wp-json\/wp\/v2\/comments?post=746"}],"version-history":[{"count":0,"href":"http:\/\/www.goodmath.org\/blog\/wp-json\/wp\/v2\/posts\/746\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.goodmath.org\/blog\/wp-json\/wp\/v2\/media?parent=746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.goodmath.org\/blog\/wp-json\/wp\/v2\/categories?post=746"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.goodmath.org\/blog\/wp-json\/wp\/v2\/tags?post=746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}