Problem solve Get help with specific problems with your technologies, process and projects.

# Math phobia

## Reports of breakthroughs that may endanger encryption security are widespread, but how practical are these mathematical solutions?

Recent stories in the press about potential mathematics breakthroughs are frightening computer security officers. The gist of these stories is that "imminent" advances in mathematics would allegedly make it possible to crack encryption schemes based on the difficulty of factoring humongous numbers -- like RSA. This would destroy the primary methods of protecting passwords, virtual private networks and Internet-based secure transactions. It's the end of the world as we know it. Again.

However, there are good reasons for taking these stories with a grain of salt, due to the nature of mathematical research, the time involved and the difference between pure and applied mathematics.

P vs. NP and the Riemann zeta function problem are the two areas of mathematics mentioned most often in this regard. Real mathematicians will froth at the mouth as I describe these problems, because my descriptions lack mathematical rigor. So, real mathematicians, just do some deep breathing exercises for a moment.

The P versus NP problem involves the inherent difficulty of certain mathematical questions -- often those that have to do with optimization, such as the most efficient route for a delivery truck. No algorithm can solve such questions -- brute force guessing may eventually reveal a solution. Discovering the prime factors of huge numbers -- the basis of encryption schemes like RSA -- is a NP question. The news: NP problems really aren't as hard as we thought.

The Riemann zeta function is intimately related to the distribution of prime numbers, which are notorious for being whimsically distributed. Since the Riemann zeta function is related to the distribution of prime numbers, it can help narrow down the search for prime numbers, and thus speed up the search.

Still, keep in mind that mathematicians can consider a solution to be merely that an answer to a given question exists -- not what that answer might be or how to find it. A purely mathematical solution to these problems may be far from useful.

Also, consider that some of these problems have been known for centuries and, while progress has been made, they still haven't been solved. So, when mathematicians talk about a breakthrough, it does not mean a solution is looming. The solution might be found tomorrow -- or a century from now -- or never. There's no way to tell, so why worry about something that may be decades away?

Finally, the gulf between pure and applied mathematics is vast. Even if some genius announced tomorrow that an algorithm for finding factors of humongous numbers was possible, that wouldn't advance the search for that algorithm one nanometer. It's like an engineer announcing that it's possible to bridge a certain river: you wouldn't want to immediately drive up to the bank of the river and wait. Building that bridge will take time.

The bottom line is simple. Don't let announcements about possible mathematical breakthroughs throw you. They might take years to crack, their application to reality is iffy and any uses will take years to develop. Remember: Math is our friend.

Edmund X. DeJesus has degrees in mathematics and theoretical physics. He has worked on cryptographic solutions for Baltimore Technologies and has written extensively on encryption, mathematics and other technical topics.

Have an opinion on this article? E-mail your letters to Shawna McAlearney and include your name, title and organization. Letters may be edited for space and clarity.

This was last published in September 2004

## SearchCloudSecurity

• ### Unify on-premises and cloud access control with SDP

One security framework available to organizations struggling with on-premises and cloud access control issues is a ...

• ### 6 AIOps security use cases to safeguard the cloud

Explore six AIOps security use cases in cloud environments, such as threat intelligence analysis and malware detection, as well ...

## SearchNetworking

• ### Aruba product integrations advance its SASE strategy

Aruba's latest SASE-related integrations involve the Silver Peak-based SD-WAN, Threat Defense and the ClearPass Policy Manager. ...

• ### Wi-Fi 6 rollout requires careful review of network devices

Wi-Fi 6 is just one part of the overall enterprise network. Organizations need to evaluate several network components to ensure a...

## SearchCIO

• ### Replacing vs. maintaining legacy systems

As CIOs embrace more digital technologies, it's important that they determine the current status of their legacy systems and ...

• ### Managing cybersecurity during the pandemic and in the new digital age

Roota Almeida, CISO at Delta Dental of New Jersey and Delta Dental of Connecticut, talks about the cybersecurity threats she's ...

• ### Enterprise architecture has business's ear at Scottish Water

Scottish Water's enterprise architecture team leader discusses how engaging with business leaders and software tools can help ...

## SearchEnterpriseDesktop

• ### Incorporating zero trust into endpoint security

Zero trust is a complex term, but organizations that take security seriously must know what it is and how it can support existing...

• ### Keeping tabs on employees in the hybrid workplace

Companies want better ways to determine if their employees are mentally healthy or are at risk of a breakdown in the hybrid ...

• ### Top 6 endpoint security software options in 2021

The market for endpoint security software can be confusing to navigate for decision-makers, but this market roundup should help ...

## SearchCloudComputing

• ### Ready to be a GCP architect? Try this quiz and see

This 10-question quiz, drawn from a new GCP certified professional cloud architect prep guide, helps identify your strengths and ...

• ### Choose the right serverless container service

Many IT pros consider serverless containers to be largely hype, while others say it offers real advances in serverless computing....

• ### IBM boosts vertical cloud push with financial services cloud

IBM doubles down on its investment in vertical markets, rolling out a financial services cloud that shares workloads with clouds ...

## ComputerWeekly.com

• ### SAP users identify data skills shortage as importance of analytics spikes

Research from the SAP UK & Ireland User Group has demonstrated a data skills dearth among users and a delay in using the SAP Hana...

• ### The Secret IR Insider’s Diary – from Sunburst to DarkSide

From dealing with SolarWinds fallout to ransomware attacks, it’s been a busy few weeks for the Secret IR Insider, but they've ...

• ### London tech manifesto calls on next mayor to support tech industry

The London tech manifesto, put together by several tech organisations, calls on the city’s next mayor to support tech companies, ...

Close