Problems & Puzzles: Problems

Problem 34. Proving & hiding

Eric Brier sent (28/8/2000) the following problem:

"How can prove that I factored N without giving any factor of N. The most difficult numbers to factor are N=p.q with p and q primes. Let's assume N is of that type..."

Can you send your argument?

______________________
Note added the 30/9/2000
: Some people have been asking for a precision of the statement of the problem. Here it goes:

Sam and Joe know one and the same composite number N. Both know that N has two primes factors, p & q. Only Sam knows p & q. How can Sam prove to Joe that he (Sam) knows p & q without ever revealing p & q?


Solution

Jud McCranie wrote (8/9/2000):

"Just a couple of thoughts on problem 34. I see at least two interpretations of the question. One is that you want to release some information that shows that you factored N=p.q, but don't reveal the factors until sometime later. The other interpretation is that you want to prove that you factored it, but never reveal the factors. In the first case, you could compute some large number [let's say z]  mod p and mod q, release that information [let's say a & b but not z,  where a=z mod p and b=z mod q] . Then when you are ready to reveal p and q, you can show the calculation, proving that you knew p and q at the earlier date.

For the second interpretation, you might be able to do something with RSA public-key cryptosystem. In that, breaking a code is equivalent to factoring N. I don't know the details well enough to be specific, though."

***

One day after (9/9/2000) Chris Nash sent 'the details' prefigured by Jud:

"Here is the solution to problem 34, using the idea proposed by Jud McCranie, using a cryptosystem like RSA.

First here is how it works. Usually you choose two large primes p and q, with product N. Choose a random number r, less than (p-1)(q-1), and with no common factor with (p-1)(q-1). Finally find the solution s to rs=1 mod (p-1)(q-1).

The keys you publish are N and r. The secret key is s. It can be easily shown that for any number M, M^(rs)=M mod N. To send a message, it is encoded as a series of numbers M, each less than N. The sender calculates X=M^r mod N, and sends the value X. The recipient then uses his secret kay s and calculates X^s mod N. But this is M^rs mod N, and thus retrieves the original message.

Now to use this to transmit the information "I have successfully factored N into two primes p and q". The discoverer creates a random number r and a secret number s as above. He then takes an easy-to-read message such as "Congratulations!" as M. He publishes the values of N and r. Then he sends the message X=M^s, using the secret key s.

Anyone receiving the message knows N and r, so they can decode the message (by calculating X^r=M^rs=M). They can conclude from this information that the sender knows the secret value s (otherwise they could not have encoded the message). But it is very difficult to guess the number s without knowing the factors. Readers may conclude that the sender knows the secret number s.

At some later time, the sender may be asked to prove he knows what the factors are. To do this, he publishes his value of s. and with a little algebra they can retrieve the factors p and q. (When choosing the values r and s, the discoverer may wish to make (rs-1)/((p-1)(q-1)) quite small, but make sure s is not small enough to guess).

Note the method is quite secure - it is believed to be difficult to decode without knowing the factors. The code is only weak if the number is easy to factor in the first place. Also note that when the user publishes the encrypted message, the encrypted message length is about the same size as the number N."

***

Well, no doubt that the key of the Nash's detailed argument is the Jud's sentence "breaking a code is equivalent to factoring N". 

But... Is this an answer to the Brier's question? or, better, is this the only answer?

I wonder if breaking a code proofs that someone has factored a composite N or simply makes that believing highly probable; and now I wonder if Brier wants (and has an argument on the behalf of) an absolute proof of the factorization of N (without giving the factors, of course)

"Breaking a code is equivalent to factoring N"?... Do all code-hackers factor composite numbers?

Sorry if I'm totally out of the sink...

I will wait one or two days before publishing the Brier's argument (and in the mean wile I would like that Brier sends a comment about the published answers...)

***

This Monday (11/9/2000) morning I received the Eric's comments:

"I read the answers given. They are mostly based on the fact that breaking RSA takes the same effort than factoring N. I do believe that this has not be proven yet and further more is maybe wrong. I heard of people able to break RSA without knowing the factors with some very special method.

The solution I suggested has the advantage to be fully proven and simpler than RSA mechanisms. Furthermore, you never need to publish the prime factors. You have a direct (though probabilistic) proof of your factorization.

Concerning the meaning of the problem, the exact question I asked was to never give the factors.

The idea with the moduli is wrong because...if you do not publish z, you prove nothing because for any values of a & b, there is a solution of the system of equations z=a mod p & z=b mod q [using the RCT]. That means you can publish any [arbitrary] a and b [without knowing the factorization of n=p.q]. Later you get the factorization and are able to build z by solving the above system. With this method you can not prove you knew the factors at the first step. Anyway, the real interest of the problem is to probe you factored without giving the factors at the end"

So, I would say that the discussion is just starting...

***

This is the Eric's solution sent the 28/08/2000 but published this 13/9/2000:

"...The most difficult numbers to factor are N=p.q with p and q primes. Let's assume N is of that type. Basic facts about square roots modulo N:

If you have factored N, you can compute square roots modulo N by computing them mod p and mod q and use Chinese theorem. If you can compute square roots modulo N : take a random number x and compute a=x² mod N and then compute a square root of a modulo N. There are four of them, of course x and -x but also y and -y. If you get y, them gcd(x+y,N) and gcd(x-y,N) give you non-trivial factors of N. This proves that if you can compute square roots modulo N, you can factor it and vice-versa. Then to prove you factored N, it suffice to prove you can compute square roots.

But if you say : give me a number a and I compute x. Your partner can make a=x² and hope that you will give y and not x and then get the factors. The idea is then to give a number b. To prove you have the square root of a, it suffice to have the square root of b and a square root of b/a mod N. Don't give both. Your partner ask for one among them. If you try to cheat, you have only probability of 1/2 to fool your partner. I you do the process m times, you have a probability of 1/2^m to fool the partner. So after, say 20 trials, you prove you factored N."

Comments are welcomed...

***

Here is the first comment to the Eric's argument, posted by Chris Nash the same day 13/09/2000:

"Perhaps I am missing something very simple in Eric's solution, but Eric begins with:

'...If you have factored N, you can compute square roots modulo N by computing them mod p and mod q and use Chinese theorem....(Eric)'

But Eric does not explain how to calculate these two square roots. I do not think that is an easy calculation - I think that is just as hard as factoring."

***
 The 21/9/2000 Eric commented:

"...it is very easy to compute square roots modulo a prime number. Easy is to be understood that it does take a time polynomial in the log of the numbers involved (which is not the case for factorization, of course). The details of algorithms could be a little tedious. I'll try to send you more details next week...."

Four days later he added:

"Let's assume:

* p is prime and (a/p)=1
* p-1=2^v*n,  n = odd
* g is an element of order 2^u mod p (see below to know how to get it)

Let's put x(v-1)=a^((n+1)/2) and compute x(u) for decreasing u :

* if x(u)^(2^u)=+a^(2^(u-1)) let x(u-1)=x(u)
* if x(u)^(2^u)=-a^(2^(u-1)) let x(u-1)=x(u)*g^(2^(v-u-1))
* {else p is not prime or (a/p)=-1}

you have x(0)^2=a

Proof: you always have x(u)^(2^(u+1))=a^(2^u) (quite easy to prove by decreasing induction if you remember that g^(2^(v-1))=-1

How to get g : take a random h and compute g=h^n. With probability 1/2, you have order(g)=2^u You can check that all needed operations are logarithmic in time (use the good algorithm for exponentiation mod p) and you need O(v) such operations. It is easy to see that v=O(log p).

I hope it is clear enough. Simpler methods exist for p=3[4], p=5[8] but they are derived from the above algorithm."

***

Readers interested in judge the relative merits of the solutions sent by Chris Nash or Eric Brier can explore the following numerical examples: a) CN example  b) EB example

***

I have received a solution from Frank P. Smith (19/9/2000) that tackles the Brier's problem from a very distinct angle. At the very beginning I discarded it because... forget it!... at the end I felt some shame by letting only for my knowledge this fresh approach. So, I decided to share it with the readers of these pages and know your own opinion...

Please see first the second statement of the original problem at the top of this page in order to know who in the life is Sam & who is Joe...

The Frank's idea goes as follows:

I.- Sam & Joe construct together a reliable code for both of them that makes the following simple tasks:

1) Accepts an integer number N
2) Accepts one by one it's integer factors f calculating the reminder of N as N\f when and only when f divides N
3) Ending for one of the following reasons:

a) or f<=1, or f=>N, or f does not divide N, printing "You don't know the factors of N".
b) N=1, printing "You know the factors of N" & N.

4) Just before ending, the code clear all the values of the variables used.

II.- Joe input the number N

III.- Sam input the factors asking to Joe to turn around.

IV.- When the code finish his work Sam shows the printing in the screen to Joe.

That's all!...

What do you think about the Frank's solution?

***

The Frank's code in Ubasic could be something like this one:

10 input "The number N=";N:NN=N:K=1
20 input "One factor of N";F
30 if or{F<=1,F>=NN,N@F<>0} then print "You don't know the factors of ";NN:goto 60
40 N=N\F:if N>1 then K=K+1:goto 20
50 print "Congratulations! You knew the";K;" factors of ";NN
60 clr N,NN,F:end

*** 

Here are the first comments about the Frank's  solution:

"I think Frank's solution may well be the best - because it requires little knowledge on either side (all they need to know is what a "factor" actually is, and what the little program does, it only prints the message if the factors are known). That is much less than needing to know how RSA works, or that square roots modulo composites are "hard" problems. There is also much less doubt, perhaps RSA or square roots could be easily broken some day, but Frank's program will still work... perhaps now this [problem] is less mathematics but more a question of philosophy!" (Chris Nash, 2/10/2000)

***

"- This solution is useful only if the actors can sit in front of the same computer. What about people who met on Internet ?

- This solution is not secure at all since the second guy has to turn and not look at the screen for a while. During this time it is possible for the first guy to launch another  program that just write 'Congratulations!'" (Eric Brier, 5/10/2000)

***

My (C.R.) personal opinion is that the very concept under discussion behind the distinct solutions is the concept of "mathematical proof", hardly carried to its limits by the peculiar nature of the interesting Brier's problem. But let's hear to the readers...

***

 

 

 


Records   |  Conjectures  |  Problems  |  Puzzles