๐Ÿ”ฌ

Cryptography

1
Open Unknowns
5
Cross-Domain Bridges
8
Active Hypotheses

Cross-Domain Bridges

Bridge The number field sieve (NFS) algorithm achieves sub-exponential complexity L_n[1/3, c] = exp((c+o(1)) * (ln n)^{1/3} * (ln ln n)^{2/3}) for integer factorization, establishing the precise complexity-theoretic boundary on RSA and discrete logarithm hardness that makes modern public-key cryptography quantifiably secure against classical computation while simultaneously defining the cryptanalytic target for quantum speedup

Fields: Mathematics, Computer Science, Cryptography

The NFS algorithm for factoring n applies algebraic number theory (number fields with rings of integers, ideal factorization in class groups) to the combinatorial sieve: it finds pairs (a,b) such that...

Bridge Game theory x Cryptography - Nash equilibrium as protocol security

Fields: Economics, Computer_Science, Mathematics, Cryptography

Cryptographic protocol security (no computationally bounded adversary can profitably deviate) is a Nash equilibrium condition in a game where parties are rational agents maximizing expected utility; r...

Bridge Modern cryptography is applied number theory: RSA security rests on the hardness of integer factorization, elliptic curve cryptography on the discrete logarithm problem over finite fields, and post-quantum cryptography on the shortest vector problem in integer lattices โ€” each translating a mathematical hardness assumption into a practical security guarantee.

Fields: Mathematics, Number Theory, Computer Science, Cryptography, Algebra, Complexity Theory

RSA (Rivest, Shamir, Adleman 1978): public key e, private key d, modulus n = pq (product of two large primes). Key relationship: ed โ‰ก 1 (mod ฯ†(n)) where ฯ†(n) = (p-1)(q-1) is Euler's totient function. ...

Bridge Elliptic curves over โ„‚ form complex tori (compact genus-one Riemann surfaces) where the group law comes from analytic geometry โ€” modern ECC uses curves over finite fields where points form finite Abelian groups with no literal torus topology; pedagogy often introduces the complex picture first for intuition, then warns that cryptographic security lives in discrete logarithms on ๐”ฝ_q-rational points.

Fields: Mathematics, Computer Science, Cryptography

The chord-and-tangent group law is uniform across fields โ€” explaining why textbooks illustrate โ„‚/ฮ› pictorially โ€” but security proofs and side-channel engineering operate on Galois cohomology, embeddin...

Bridge Quantum key distribution achieves information-theoretic security (unconditional security independent of adversary computing power) by exploiting quantum measurement disturbance, bridging quantum computing and cryptography through the quantum no-cloning theorem and Shannon's one-time pad.

Fields: Quantum Computing, Cryptography, Information Theory

BB84 quantum key distribution achieves information-theoretic security (proven secure against computationally unbounded adversaries) because any eavesdropping measurement on quantum states introduces d...

Open Unknowns (1)

Unknown Can quantum key distribution systems achieve information-theoretic security in practice when realistic detector and source imperfections create side-channel vulnerabilities not covered by idealized security proofs? u-qkd-practical-implementation-side-channels

Active Hypotheses

Hypothesis Device-independent randomness expansion (DIRE) protocols based on loophole-free Bell inequality violations can certifiably generate unbounded true randomness from a short random seed, with the security guarantee holding against quantum adversaries โ€” making quantum random number generation information-theoretically certifiable in principle, though current implementations are limited to kilobits per second by detection efficiency. high
Hypothesis CRYSTALS-Kyber's current parameter sets (Kyber-512, Kyber-768, Kyber-1024) provide quantum security margins of approximately 108, 178, and 240 bits respectively against the best known quantum lattice sieving algorithms โ€” sufficient for the 128/192/256-bit classical security targets โ€” but these estimates may decrease by 10-30 bits as quantum algorithms mature in the next decade. high
Hypothesis NIST-standardized lattice-based post-quantum cryptographic algorithms (CRYSTALS-Kyber, CRYSTALS-Dilithium) will be deployed in > 50% of new TLS connections by 2028 and provide adequate security against harvest-now- decrypt-later attacks if migration begins by 2025, but systems with > 10-year confidentiality requirements are already at significant risk from data harvested before migration. critical
Hypothesis The number field sieve factorization record will reach RSA-2048 (2048-bit modulus) within 15 years using classical computing, requiring approximately 10^18 core-hours based on extrapolation of the L_n[1/3, 1.923] NFS complexity formula to current hardware trends, and this estimate will be confirmed to within a factor of 3 by the next three record factorizations of 1000โ€“1800 bit numbers high
Hypothesis Device-independent QKD (DI-QKD) provides information-theoretically secure key distribution even against adversarial device manufacturers, but current implementations require loophole-free Bell inequality violation at key generation rates compatible with practical communication โ€” achievable with photon collection efficiency > 85% in entanglement sources, a threshold currently within reach of trapped-ion and neutral-atom platforms but not yet of fiber photonic implementations. high
Hypothesis Low-Earth-orbit satellite QKD (as demonstrated by Micius) can achieve key rates sufficient for a global quantum-secured network when combined with quantum memory nodes, predicting that a constellation of 50-100 LEO satellites with 30-second overpass windows achieves 1 Mbit/day secure key between any two ground stations separated by up to 10,000 km. high
Hypothesis Bitcoin mining with selfish mining strategy is a Nash equilibrium for all pool sizes above 25% hashrate, and the game-theoretic security threshold is lower than the computational security threshold of 51% medium
Hypothesis Students exposed first to the complex torus group law, then immediately tested on ๐”ฝ_p addition tables and subgroup orders, will outperform cohorts taught finite-field formulas alone on conceptual questions about why discrete logarithms matter โ€” without elevating false beliefs that periodicity in โ„‚ implies protocol breaks โ€” falsified if misconception inventory scores worsen relative to control after torus-first sequencing. low

Know something about Cryptography? Contribute an unknown or hypothesis โ†’

Generated 2026-05-10 ยท USDR Dashboard