The above video goes away if you are a member and logged in, so log in now!
we do have all the public keys but we just now gained access to the curve parameters, just having the public key still leaves us with x*y=9999999, you cant solve for x because you dont have enough information. what im suggesting is not going after the encryption, it IS uncrackable, so we bypass it and go to the steps they took to create the public key, the random number was not used in the key creation process, the random number is used in the encryption process after the key is generated. finding the random number is like shooting the messenger, its pointless, they would just send another one next time, i am suggesting we find out where the messages are coming from. i realize no one seems to understand this but i understand one thing very well, the public key is linked directly to the private key by math otherwise it would just be so random the ps3 couldnt tell if it was real or not, you are all assuming im going after the encryption but im not, look at how the public keys are generated BEFORE the encryption process is even started, public key is made in advance by math using factors that we now know, look it up, private key point multiplied by the base point on the curve = public key and we have the base point and the public key so why would you say we cant solve for the one unknown?
long story short, the encryption isnt crackable you are all right about that, but you are wrong to assume that has anything to do with what im suggesting. the key generation process is easily reversible, and that is what im after. if you could all just wrap your heads around the fact that im not talking about cracking the encryption we would be alright. the keys are linked, and we know how now, follow the link back to the private key, simple as that
key generation and encryption are two completely different things people, they are directly related to eachother but the encryption algorithm is impossible to crack where as the key generation algorithm(a completely seperate and simpler algorithm for which we have all the variables solved but the private key) is not even close to impossible