Cracking the Code: Why 15 and 21 Are (Almost) Special in CryptographyRate:


Table of Contents
Cracking the Code: Why 15 and 21 Are (Almost) Special in Cryptography
Tags: Cryptography

Recently, I came across an interesting discussion between cryptography experts Job Callas and Stephan Neuhaus. They were talking about certain special numbers - specifically 15 and 21 and how they behave in binary (the language of 1s and 0s that computer use).

I thought it would be fun to explain their conversation in simpler words!

1. The Claim

Jon mentioned that numbers like 15 and 21 have a special form:

(2^n - 1) × (2^n + 1)

In everyday language, that's:

In binary (1s and 0s), this tends to create patterns with strings of 1s, then some 0s, and then a 1 again.

2. The Confusion

Stephan noticed something odd:

Stephan tried even relaxing the formula a bit, but still couldn't make 21 behave the same way. He wondered:

"Am I misunderstanding something?"

3. The Expert Clarification

Jon replied that 7 is 2³ - 1, which is fine. But 3 is a bit unusual — it’s special because:

In binary, 3 is written as "11" — two 1s without any 0s between them. That’s rare and different from the neat patterns he was originally talking about.

So, in short:

4. The Takeaway

In math, especially in cryptography, tiny details matter a lot. Even numbers that seem similar can have hidden quirks once you dive into how they look in binary. And sometimes, a "special" form works perfectly for one number but only almost for another!

Author: Mikhail

No comments yet.

You must be logged in to leave a comment. Login here


Thread Back to Threads Thread

You May Also Like

What is Freelance Digital Marketing?
Tags: Digital Marketing, Entrepreneur

Freelance Digital Marketing is a self-employed contract where a professional uses digital means to help clients promote their products and improve sales.
Introduction to Cyber Forensics
Tags: Cybersecurity, Cyber Security, Cyber Forensic

Cyber crimes have increased manifolds these days. People are losing their hard earned money and reputation, just because some people with bad intentions are sitting there to make money off their negligence.
Future of Digital Identity Verification Methods
Tags: Identity, Verification

The way we prove who we are online is on the cusp of a revolution. We are moving beyond the age of static passwords and grainy photocopies towards a future of sophisticated verification methods that are both secure and user-friendly.
How to use Power Automate to count rows of a table on a web page?
Tags: Power Automate

Hi everyone, I need some help urgently! Have a query with regards to Power Automate.