Bill Allombert on Sat, 30 Jan 2021 00:21:33 +0100 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: Linear factors of very large polynomials |
On Fri, Jan 29, 2021 at 12:20:44AM +0000, Neill Clift wrote: > Hi, > This is more of a question about the limits of computations pari/gp could do. This is not very important but it might be of interest to some people. > So a few decades ago I realized eventually the password hashing algorithm in the OpenVMS operating system would be invertible. It was just a matter of machines getting enough memory and being able to do some large GCD's. > In 2017 I asked a few questions here and got pari to actual find the linear factors of a large polynomial mod 2^64-59. The polynomial looked like this: > > f(x) = x^16777213 - 24 * x^16777153 - 120 * x^3 - 198 * x^2 - 264 * x + 17748126081817865973 > > The constant term is different for each password that is to be found. I used FpX_roots(f,2^64-59) to find the factors. I think it took about 12 hours to do. > Now OpenVMS isn't a seriously used operating system anymore (I don't doubt some people are still using it somewhere). It's developed still by some enthusiasts. > They haven't fixed this problem. Clearly a modern hash should be put in it's place but they have a field size limitation of 64 bits. It can be changed but it's more work. > I was thinking we could just increase the degree of the polynomial and > maybe add more terms. We want the hashing to be slower and of course > sieving out the linear terms to be impossible with some reasonable > h/w. I do not think this is a reasonnable cryptographic approach, 64bit is way too small, it can be brute-forced with rainbow table, even with the best hash. Cheers, Bill.