Oddbean new post about | logout
 If a public key can be found using a private key, is there a possibility that institutions with the best mathematicians cannot reverse engineer it and apply that as an algorithm depending on the type of encryption?