Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 934305
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 15, 20262026-05-15T20:58:39+00:00 2026-05-15T20:58:39+00:00

In explanations I’ve read about public key cryptography, it is said that some large

  • 0

In explanations I’ve read about public key cryptography, it is said that some large number is come up with by multiplying together 2 extremely large primes. Since factoring the product of large primes is almost impossibly time-consuming, you have security.

This seems like a problem that could be trivially solved with rainbow tables. If you know the approximate size of primes used and know there are 2 of them, you could quickly construct a rainbow table. It’d be a mighty large table, but it could be done and the task could be parallelized across hardware.

Why are rainbow tables not an effective way to beat public key crypto based on multiplying large primes?

Disclaimer: obviously tens of thousands of crazy-smart security conscious people didn’t just happen to miss for decades what I thought up in an afternoon. I assume I’m misunderstanding this because I was reading simplified layman explanations (eg: if more than 2 numbers are used) but I don’t know enough yet to know where my knowledge gap is.

Edit: I know “rainbow table” relates to using pre-calculated hashes in a lookup table but the above sounds like a rainbow table attack so I’m using the term here.


Edit 2: As noted in the answers, there’s no way to store just all of the primes, much less all of their products.

  • This site says there are about this many 512 bit primes: ((2^511) * 1) / (512 log(2)) = 4.35 × 10151
  • The mass of the sun is 2 × 1030 kg or 2 × 1033 g
  • That’s 2.17 × 10124 primes per gram of the sun.
  • Qty. of 512 bit numbers that can fit in a kilobyte: 1 kb = 1024 bytes = 8192 bits / 512 = 16
  • That can fit in a terabyte: 16*1024*1024*1024 = 1.72 × 1010
  • Petabyte: 16*1024*1024*1024*1024 = 1.72 × 1013
  • Exabyte: 16*1024*1024*1024*1024*1024 = 1.72 × 1016

Even if 1 exabyte weighed 1 gram, we’re nowhere close to reaching the 2.17 × 10124 needed to be able to fit all of these numbers into a hard drive with the mass of the sun

  • 1 1 Answer
  • 3 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-15T20:58:40+00:00Added an answer on May 15, 2026 at 8:58 pm

    From one of my favorite books ever, Applied Cryptography by Bruce Schneier

    “If someone created a database of all primes, won’t he be
    able to use that database to break public-key algorithms?
    Yes, but he can’t do it. If you could store one gigabyte
    of information on a drive weighing one gram, then a list
    of just the 512-bit primes would weigh so much that it
    would exceed the Chandrasekhar limit and collapse into a
    black hole… so you couldn’t retrieve the data anyway”

    In other words, it’s impossible or unfeasible, or both.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Related Questions

No related questions found

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.