imperial screwcutting on metric lathe

Well, it is a little beyond school text books.

You might try looking at Galois theory (which relates, in brief terms) to the roots of polynomials and their symmetry.

There is also algebraic K theory (a correct use of Big K)

HTH

Reply to
Brian Reay
Loading thread data ...

So, was that reply intended to be helpful and to provide the sought-for explanation, or only intended to make you feel good about yourself?

Reply to
Amateur Machinist

The former, Gareth.

If you've found it helpful then I will also be pleased to have helped you.

Reply to
Brian Reay

It could be both, maybe making people feel good about themselves IS the only practical application :)

Reply to
Cliff Ray

You seem to be confusing me with someone else and are replying with a response that seems to continue to be more of an irrelevant ego trip than to be a helpful response.

Insofar as you do confuse me with someone else, are you the same Brian Reay who lives at Falcon Lodge, Spekes Rd, Hempstead, Gillingham, Kent, ME7 3RT and who has the CB callsign of G8OSN?

Reply to
Amateur Machinist

Well, I've a couple of school maths texts here and the chapters on group theory are the only ones with no seeming practical application.

Reply to
Amateur Machinist

How would you do a calculation with the theory that would give you a useful result in those areas?

(I don't expect a mathematical treatise, just perhaps an example of how it is applied)

Reply to
Amateur Machinist

Or to put it another way, if you were to totally ignore the group theory in those applications, how would you be disadvanteged, if at all?

Reply to
Amateur Machinist

In article , Amateur Machinist writes

Well, it was several decades ago and I found it hard to stay awake (was never my favourite area of chemistry) but as far as I can recall it had to do with the fact that the properties, energy levels, spectroscopic patterns etc. of atoms depended on the symmetry of their molecular environment. Don't ask me how the calculations are done, I did a few at the time but the years have mercifully blanked it out.

David

Reply to
David Littlewood

....sigh...here we go again. When do the schools go back...? If you guys have a peeve..take it to e-mail or the playground please. --

Chris Edwards (in deepest Dorset) "....there *must* be an easier way!"

Reply to
Chris Edwards

Well, Galois theory is useful to understand symmetry of roots to polynomials- the most basic example being that quadratic equations have either one (repeated or double) root, two real roots, or a pair of complex roots. You could survive life without knowing such things but were you, for example, an electronics engineer, such things do tend to be useful.

HTH

Brian

Reply to
Brian Reay

No "peeve" here Chris. The poster asked a question and got an answer.

Regards

Brian

Reply to
Brian Reay

So does Galois go on the tumbler gear or does the polynomial ? And if the polynomial goes on the tumbler gear do you need a root, two real roots, or a pair of complex roots between the Galois ?

If it's the first option where does the kipper fit ?

Confused minds want to know.

Reply to
John S

Is that near the sewage-works?

Reply to
SteveE

Given Derek the night off, Beanie?

Reply to
Frank Turner-Smith G3VKI

I'm a cryptologist, and many ciphers use groups, particularly but not exclusively public key ciphers.

For instance RSA uses the multiplicative group of invertible integers modulo PQ, where P and Q are primes, and Diffie-Hellman key agreement uses the group of integers modulo a prime.

Groups are less common in symmetric ciphers, in fact there are good reasons to ensure they are not groups under composition, but groups are not unknown - eg Pohlig-Hellman is a group, so (in a sense) is the one-time-pad and stream cipher, and there is some effort being made to create a secure cipher which is a group, though not much progress has been made as yet.

A detailed discussion of group theory is out of place here, but - a group is a set of objects, often numbers, combined with an associated binary operation which can be performed on any two members of the set, which also follows four rules:

there is an inverse for every element of the set, there is an identity element, the operation is associative and the group is closed.

In the Diffie-Hellman group for instance, the set is the integers less than a prime, and the binary operation is multiplying two of them together to get a result modulo the prime.

Groups have some interesting properties, which is why we study and use them. They lead on to the study of rings and fields etc, and provide a sideways entrance to the study of arithmetics, more usually approached from the axiomatic perspective.

But that's mostly pure math, rather than more-useable stuff - though it's surprising how often "pure" math turns out to be useful and used.

-- Peter Fairbrother

Reply to
Peter Fairbrother

Oh, and as to me personally using groups and group theory - the method in this 2004 paper is I think is unique in cryptography in using a nested set of four groups, each a proper subgroup of all the higher groups.

formatting link
It's what I do.

-- Peter Fairbrother

Reply to
Peter Fairbrother

An interesting and informative post Peter, which I enjoyed reading. Thank you.

That reminds me of a something I was told re Object Oriented Programming.

Used, if I recall, to establish a secure code between to essential strangers. They pass (in the clear) some basic numbers (inc a Prime) and using index laws and modulo maths can establish a secure code. Not looked at it in some time but I'm pretty sure that is the basics.

Thank you again.

Brian

formatting link

Reply to
Brian Reay

formatting link

But that is a lousy approximation for pi and the end of the link :P

Reply to
Cliff Ray

Yep.

I don't often talk about crypto on non-crypto fora, 'cos I think it's fantastically interesting but most people just go uh?, but - Diffie-Hellman really is astounding. That two people can establish a secret, openly, and an observer can't deduce the secret is just amazing.

Some other amazing things you can do with crypto: You can query a database and get an exact number of bits from the database - but the database operator can't tell which bits of the database you got.

So you can look up something in a database and no-one can tell what you looked up. It's deniable too, delete the numbers behind the query once it's answered, and even you can't tell what it was.

You can also get a database to count the number of times a word or phrase occurs in the database, without the database knowing what the word is!

Digital signatures and certificates you probably know about, but they were only discovered in the 1970's, and they are pretty amazing too.

Then there's steganographic file systems, which hide the number and sizes of the files they may contain, and, relying on distributed trust rather than mathematics, there are mixnets which can defeat traffic analysis, hidden servers (where no-one can tell where the server is, but you can still get a page from it) and .. I'll stop here.

The problem today is that most of the actual implementations are cr*p.

Robert Morris's (ex-NSA, author of the Unix "crypt" library) rule one of cryptanalysis, "First look for plaintext", holds now more than ever - it's usually a lot easier to find plaintext than to break the crypto.

People just don't encrypt for whatever reason, even when they should. Operating systems generate copious temporary copies of many files, which are seldom if ever securely deleted.

Red/black separation (separating encrypted and plaintext signals) is hard, and seldom done correctly - people pWn machines all the time.

Keys are too short and subject to various attacks, including brute force (trying all possible keys), rubber hose ("Give me the key and I'll stop beating you") and the nice truncheon (aka RIPA) ("Give me your keys or I'll send you to jail for x years" - which doesn't need a Warrant or a Court Order, a Policeman issues the demand) attacks.

Some effort is made to prevent man-in-the-middle and other protocol-based attacks, but almost all present systems can be beaten using this type of attack - it's just that people don't bother.

Good modern ciphers are probably unbreakable by man today, and it's not too hard to implement one which will be almost certainly unbreakable ever, except maybe by God, though again few people bother.

And why should they? It's so much easier to get the data by breaking the system than breaking the crypto.

Though we shouldn't forget Robert Morris's other maxim: "Never underestimate the attention, risk, money and time that an opponent will put into reading traffic".

I'll stop here, really this time.

-- Peter Fairbrother

Reply to
Peter Fairbrother

PolyTech Forum website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.