Decoding Secret Credit Card Numbers & Phone Recharge Codes

  • Context: Undergrad 
  • Thread starter Thread starter debayan
  • Start date Start date
  • Tags Tags
    Credit card Numbers
Click For Summary

Discussion Overview

The discussion revolves around the generation and decoding of secret codes used for recharging phone credits and credit card numbers, with a focus on the mathematical principles involved, particularly the role of prime numbers and factorization challenges.

Discussion Character

  • Technical explanation
  • Debate/contested

Main Points Raised

  • One participant inquires about the generation of secret codes, mentioning a possible connection to prime numbers and asking if there is a way to decode them.
  • Another participant explains the concept of "trap door" codes, noting that while encoding is straightforward, decoding requires knowledge of the original factors and significant computational power.
  • A different participant acknowledges that cracking these codes is possible but emphasizes the lack of a smooth method for doing so, referencing a monetary reward for factoring large numbers as an illustration of the difficulty involved.
  • One participant cites a specific example of a successful factorization of a large number (RSA-640), detailing the time and resources required for the effort, which highlights the complexity of the task.

Areas of Agreement / Disagreement

Participants express varying degrees of understanding regarding the feasibility of decoding secret codes, with some acknowledging the difficulty and others providing examples of successful factorization. The discussion does not reach a consensus on the methods or implications of decoding these codes.

Contextual Notes

The discussion touches on the limitations of current computational methods and the specific conditions under which factorization becomes feasible, but these aspects remain unresolved and contingent on various factors.

debayan
Messages
7
Reaction score
0
how are the secret codes for recharging the credit of a phone or the secret credit card numbers gnerated? i hrd something with prime nos. any way to decode them?
 
Mathematics news on Phys.org
I assume you are talking about "trap door" codes- where you can be told how to encode a messsage but that doesn't help you decode it. I don't know all the details but essentially it uses the fact that while it is relatively easy to multiply two large (prime) numbers together, it is almost impossible to factor the product without knowing the two factors to begin with. Yes, it is possible to decode them:
(1) Know the correct factors to begin with
(2) Use very, very powerful computer for a very, very long time.
 
Well, it can be cracked, but there's no smooth way to do it.
If there were, http://www.rsa.com/rsalabs/node.asp?id=2092 wouldn't give out $30,000 to the one who factors a number of "just" 212 decimal digits (and $200,000 for a 600+ digit number) :)
 
Last edited by a moderator:
"RSA-640 is factored!

The factoring research team of F. Bahr, M. Boehm, J. Franke, T. Kleinjung continued its productivity with a successful factorization of the challenge number RSA-640, reported on November 2, 2005. The factors [verified by RSA Laboratories] are:

16347336458092538484431338838650908598417836700330
92312181110852389333100104508151212118167511579

and

1900871281664822113126851573935413975471896789968
515493666638539088027103802104498957191261465571

The effort took approximately 30 2.2GHz-Opteron-CPU years according to the submitters, over five months of calendar time. (This is about half the effort for RSA-200, the 663-bit number that the team factored in 2004.)
Top of Page
"

Remember what HallsofIvy was just saying XD
 

Similar threads

  • · Replies 3 ·
Replies
3
Views
2K
  • · Replies 3 ·
Replies
3
Views
4K
  • · Replies 9 ·
Replies
9
Views
3K
  • · Replies 19 ·
Replies
19
Views
2K
  • · Replies 9 ·
Replies
9
Views
4K
  • · Replies 3 ·
Replies
3
Views
4K
  • · Replies 14 ·
Replies
14
Views
2K
  • · Replies 9 ·
Replies
9
Views
4K
  • · Replies 4 ·
Replies
4
Views
3K
Replies
5
Views
2K