Search This Blog

Populære indlæg

Thursday, May 28, 2015

Using math to defeat computing power and breaking of encryption

What if instead of a password we use a formula. If we take a fractal formula there are so many deviations that the number alone is staggering. Add a set of coordinates and it should be quite effecient.

This makes it possible for two layers of security. One where you can share a picture holding the public key and a private containing formula and coordinates using to create that image. You can search for a long time for something that can generate the exact same. you will get a lot of false possitives - something that looks exactly but no cigar.