Consider a program that all it does is multiply two numbers. Suppose you see an answer and it is 24. There is nothing about the answer 24 that ensures that you know what the inputs were. The inputs could be 1 & 24, 2 & 12, 3 & 8, or 4 & 6.
You may look at an encryption program and know and understand how the encryption takes place. But, the point of encryption is that you can't tell what the input was from the output.
The multiplication problem is extremely easy and one can narrow down the possible inputs. However as simple as it is, you could never be sure which of the inputs generated the output this time.
Searching for the private key that renders something meaningful from the output is extremely complex. And that is the point, finding the key may be possible, but if it takes you longer than the age of the universe using the fastest computers available, then it is effectively impossible to break.
You may look at an encryption program and know and understand how the encryption takes place. But, the point of encryption is that you can't tell what the input was from the output.
The multiplication problem is extremely easy and one can narrow down the possible inputs. However as simple as it is, you could never be sure which of the inputs generated the output this time.
Searching for the private key that renders something meaningful from the output is extremely complex. And that is the point, finding the key may be possible, but if it takes you longer than the age of the universe using the fastest computers available, then it is effectively impossible to break.
Upvote
0