Problem solve Get help with specific problems with your technologies, process and projects.

# Math phobia

## Reports of breakthroughs that may endanger encryption security are widespread, but how practical are these mathematical solutions?

Recent stories in the press about potential mathematics breakthroughs are frightening computer security officers....

The gist of these stories is that "imminent" advances in mathematics would allegedly make it possible to crack encryption schemes based on the difficulty of factoring humongous numbers -- like RSA. This would destroy the primary methods of protecting passwords, virtual private networks and Internet-based secure transactions. It's the end of the world as we know it. Again.

However, there are good reasons for taking these stories with a grain of salt, due to the nature of mathematical research, the time involved and the difference between pure and applied mathematics.

P vs. NP and the Riemann zeta function problem are the two areas of mathematics mentioned most often in this regard. Real mathematicians will froth at the mouth as I describe these problems, because my descriptions lack mathematical rigor. So, real mathematicians, just do some deep breathing exercises for a moment.

The P versus NP problem involves the inherent difficulty of certain mathematical questions -- often those that have to do with optimization, such as the most efficient route for a delivery truck. No algorithm can solve such questions -- brute force guessing may eventually reveal a solution. Discovering the prime factors of huge numbers -- the basis of encryption schemes like RSA -- is a NP question. The news: NP problems really aren't as hard as we thought.

The Riemann zeta function is intimately related to the distribution of prime numbers, which are notorious for being whimsically distributed. Since the Riemann zeta function is related to the distribution of prime numbers, it can help narrow down the search for prime numbers, and thus speed up the search.

Still, keep in mind that mathematicians can consider a solution to be merely that an answer to a given question exists -- not what that answer might be or how to find it. A purely mathematical solution to these problems may be far from useful.

Also, consider that some of these problems have been known for centuries and, while progress has been made, they still haven't been solved. So, when mathematicians talk about a breakthrough, it does not mean a solution is looming. The solution might be found tomorrow -- or a century from now -- or never. There's no way to tell, so why worry about something that may be decades away?

Finally, the gulf between pure and applied mathematics is vast. Even if some genius announced tomorrow that an algorithm for finding factors of humongous numbers was possible, that wouldn't advance the search for that algorithm one nanometer. It's like an engineer announcing that it's possible to bridge a certain river: you wouldn't want to immediately drive up to the bank of the river and wait. Building that bridge will take time.

The bottom line is simple. Don't let announcements about possible mathematical breakthroughs throw you. They might take years to crack, their application to reality is iffy and any uses will take years to develop. Remember: Math is our friend.

Edmund X. DeJesus has degrees in mathematics and theoretical physics. He has worked on cryptographic solutions for Baltimore Technologies and has written extensively on encryption, mathematics and other technical topics.

Have an opinion on this article? E-mail your letters to Shawna McAlearney and include your name, title and organization. Letters may be edited for space and clarity.

This was last published in September 2004

## Content

Find more PRO+ content and other member only offers, here.

#### Start the conversation

Send me notifications when other members comment.

## SearchCloudSecurity

• ### Cloudflare Access takes on VPNs with reverse proxy approach

Cloudflare takes inspiration from Google's BeyondCorp with a new service called Cloudflare Access, which aims to replace ...

• ### TLS 1.3: What it means for enterprise cloud use

The latest draft version of TLS 1.3 is out, and it will likely affect enterprises that use cloud services. Expert Ed Moyle ...

• ### The biggest cloud security threats, according to the CSA

The Cloud Security Alliance reported what it found to be the biggest cloud security threats. Expert Rob Shapland looks at how ...

## SearchNetworking

• ### ThousandEyes-Juniper pact focuses on hybrid WANs

ThousandEyes and Juniper boost visibility for hybrid WANs; IDC records sharp rise in cloud spending; and a vendor group issues ...

• ### ExtremeLocation latest addition to Extreme wireless portfolio

Extreme Networks is targeting retailers with a new set of services, called ExtremeLocation. The latest technology adds ...

• ### Take network configuration management tools to the next level

Script management systems and intent-based networking are driving the future of network configuration management tools, shifting ...

## SearchCIO

• ### Wayfair's chief architect talks AI-driven innovation, impactful IT

Wayfair sells home furnishings, but under the covers, it's a tech juggernaut. Chief Architect Ben Clark explains how AI-driven ...

• ### Synthetic data could ease the burden of training data for AI models

Sometimes it's better to manufacture training data for machine learning models than it is to collect it.

• ### CES 2018 for CIOs: Rise of the AI voice assistant class

What happens in Vegas doesn't stay there -- not at CES 2018, where AI voice assistants and sentient objects were ubiquitous and ...

## SearchEnterpriseDesktop

• ### Ten Windows 10 Fall Creators Update features to know

Microsoft introduced some significant changes to Windows 10 in the Fall Creators Update. The My People app, for example, lets ...

• ### Guard the line with Windows Defender features

The Windows 10 Fall Creators Update took Windows 10 security up a notch by adding advanced features to Windows Defender, ...

• ### Ready to master virtualization-based security in Windows 10?

Put your knowledge of virtualization-based security in Windows 10 on the line with this quiz covering the ins and outs of ...

## SearchCloudComputing

• ### Google Cloud Dedicated Interconnect offers VPN alternative

Google's Dedicated Interconnect enables an enterprise to privately connect its data center to the public cloud. Here's a ...

• ### Chip bugs hit cloud computing usage less than first feared

IT shops expected their cloud usage to flag due to recent chip bugs, but most environments survived the patches unscathed.

• ### Providers continue to push hybrid cloud technologies in 2018

The hybrid cloud market changes rapidly, as major cloud providers release new services to bridge private and public platforms, ...

## ComputerWeekly.com

• ### UK and France to collaborate on digital tech

The UK and French governments have joined forces to increase technology and innovation cooperation between the two nations

• ### Create security culture to boost cyber defences, says Troy Hunt

Security suffers when there is tension between software developers and security professionals, but it is common in many ...

• ### Nordic IT executive interview: Daniel Kjellén, CEO, Tink

Sweden could have a head start in the race to open up banking through the European Union’s PSD2 regulation

Close