apparently my git wasn't working right on my tablet. probably something to do with adding you guys as contributors, for some reason. idk, fixed now.
i've made a few folders, check them out.
the res(ources) folder contains a pdf from the NIST (national institute of science and technology??) with a bunch of numbers (i think this is described in the pdf) called the "Domain Parameters" of a elliptic curve
To use ECC all parties must agree on all the elements defining the elliptic curve, that is, the domain parameters of the scheme.
this is basically the same thing as the domain you learned about when you learned about rational equations - all the values of x that make a function return real output
these things need to be agreed upon between parties utilizing the cryptosystem, and are all public, safe information (like p in the diffie hellman exchange)
i suggest we try implementing the 192 bit ones first, checking if they work, then the 384 bit ones, just to
A: make sure it actually works
B: the time is not unreasonable, as we are predicting.
once those matters are handled for 192 bits, we'll bump it up to 384, check if B is still true (A shouldn't change) and we will have victory
then we can do a dance or something because we will have done the "impossible"
edit: just tested the exp function from python, in python,
>>> exp(51356727897,1959990087654330009997655553**14, 164)
57L
it took it all of about... jesus, i don't know, a hundredth of a second? on my stuffty hardware.
what with all these mathematical shortcuts, i wouldn't be extremely surprised to find RSA possible. not even kidding. like, in raw torquescript with no bignum. it
might be possible. and fast, too. well, fast as can be.