# Math phobia

## Reports of breakthroughs that may endanger encryption security are widespread, but how practical are these mathematical solutions?

Recent stories in the press about potential mathematics breakthroughs are frightening computer security officers....

The gist of these stories is that "imminent" advances in mathematics would allegedly make it possible to crack encryption schemes based on the difficulty of factoring humongous numbers -- like RSA. This would destroy the primary methods of protecting passwords, virtual private networks and Internet-based secure transactions. It's the end of the world as we know it. Again.

However, there are good reasons for taking these stories with a grain of salt, due to the nature of mathematical research, the time involved and the difference between pure and applied mathematics.

P vs. NP and the Riemann zeta function problem are the two areas of mathematics mentioned most often in this regard. Real mathematicians will froth at the mouth as I describe these problems, because my descriptions lack mathematical rigor. So, real mathematicians, just do some deep breathing exercises for a moment.

The P versus NP problem involves the inherent difficulty of certain mathematical questions -- often those that have to do with optimization, such as the most efficient route for a delivery truck. No algorithm can solve such questions -- brute force guessing may eventually reveal a solution. Discovering the prime factors of huge numbers -- the basis of encryption schemes like RSA -- is a NP question. The news: NP problems really aren't as hard as we thought.

The Riemann zeta function is intimately related to the distribution of prime numbers, which are notorious for being whimsically distributed. Since the Riemann zeta function is related to the distribution of prime numbers, it can help narrow down the search for prime numbers, and thus speed up the search.

Still, keep in mind that mathematicians can consider a solution to be merely that an answer to a given question exists -- not what that answer might be or how to find it. A purely mathematical solution to these problems may be far from useful.

Also, consider that some of these problems have been known for centuries and, while progress has been made, they still haven't been solved. So, when mathematicians talk about a breakthrough, it does not mean a solution is looming. The solution might be found tomorrow -- or a century from now -- or never. There's no way to tell, so why worry about something that may be decades away?

Finally, the gulf between pure and applied mathematics is vast. Even if some genius announced tomorrow that an algorithm for finding factors of humongous numbers was possible, that wouldn't advance the search for that algorithm one nanometer. It's like an engineer announcing that it's possible to bridge a certain river: you wouldn't want to immediately drive up to the bank of the river and wait. Building that bridge will take time.

The bottom line is simple. Don't let announcements about possible mathematical breakthroughs throw you. They might take years to crack, their application to reality is iffy and any uses will take years to develop. Remember: Math is our friend.

Edmund X. DeJesus has degrees in mathematics and theoretical physics. He has worked on cryptographic solutions for Baltimore Technologies and has written extensively on encryption, mathematics and other technical topics.

Have an opinion on this article? E-mail your letters to Shawna McAlearney and include your name, title and organization. Letters may be edited for space and clarity.

This was last published in September 2004

## Content

Find more PRO+ content and other member only offers, here.

#### Start the conversation

Send me notifications when other members comment.

## SearchCloudSecurity

• ### Ownership of cloud risks gets lost in many cloud computing scenarios

CISOs ensure that cloud services comply with IT security and risk management policies. But who has executive oversight of ...

• ### Cloud incident response: What enterprises need to include in a plan

A cloud incident response plan can be difficult to assemble. Expert Rob Shapland discusses the basics of what to include in a ...

## SearchNetworking

• ### From Sonnet 18 to SD-WAN technology: An unlikely networking career

From teaching Shakespeare's Sonnet 18 to taking on a major SD-WAN technology deployment: Senior engineer Phil Gervasi shares the ...

• ### Integrate UC platform with business-critical SaaS for competitive edge

By one current estimate, the average business operates across six different clouds. With many software-as-a-service platforms ...

• ### Advanced machine learning lends a helping hand to network security

Advanced machine learning can help distinguish between false alarms and real network threats, creating valuable time for IT ...

## SearchCIO

• ### Record-busting online holiday sales and the rise of the omnishopper

Record online holiday sales foretell the arrival of conversational commerce, digital humanism and the omnishopper. Also: AWS all ...

• ### Will AR and VR tech revolutionize digital business management?

In this issue of CIO Decisions, we explore how virtual reality and augmented reality technologies could quickly become integral ...

• ### AR, VR tech poised to revolutionize digital business management

We've all seen footage of astronauts being trained for space travel in virtual environments, and many of us were sucked into the ...

## SearchConsumerization

• ### Android, Windows tablets from HP take aim at business users

HP released a new line of tablets targeting business users. The HP Pro Slate 8 and Pro Slate 12 run Android and cost \$449 and ...

• ### Microsoft to lay off 18,000, Nokia X moves to Windows Phone

Microsoft will lay off 18,000 people over the next year while the Nokia X line of Android smartphones, which was unveiled earlier...

• ### Microsoft Surface Pro 3 vs. Microsoft Surface Pro 2

Surface Pro 2 and Surface Pro 3 are different enough that Microsoft is keeping both on the market as competing products. Which ...

## SearchEnterpriseDesktop

If admins notice any issues with tasks running on Windows, they can turn to NirSoft's TaskSchedulerView to pinpoint the culprit ...

• ### Four ways to squeeze more juice into the Windows 7 lifecycle

Windows 7 is not dead. There are many reasons IT keeps it around. To make the OS perform well, admins must modernize it and make ...

• ### Close Windows security gaps with third-party software patching

Hackers target third-party software on Windows workstations because they know the patches are often out of date. Admins can ...

## SearchCloudComputing

• ### Multicloud computing bliss not yet a reality for all IT shops

Experts predict that multicloud computing will be a top enterprise trend in 2017, but some cloud users question whether the ...

• ### Perform a PaaS pricing comparison for public cloud

When choosing a platform, enterprises need to focus on features and prices for Azure, Google and AWS. Take a look under the hood ...

• ### Cloud orchestration tools become a must-have for hybrid IT

Some IT shops try to force-fit legacy orchestration tools to cloud -- but that can backfire. Instead, evaluate new orchestration ...

## ComputerWeekly

• ### Security Think Tank: Cyber security must be recognised as a fundamental component of business

How can information security professionals help organisations to understand the cyber risks across increasingly digital ...

• ### The myth of email as proof of communication

Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other ...

• ### Security veteran urges firms to prioritise spear phishing defence

UK firms should prioritise defence against spear phishing as a key component of cyber attacks, according to security veteran ...

Close