“So I found this counterexample, and saw that my attempted disproof was false, along with my dreams of fame and glory.”
I know how that feels. When I was 14 or so, I took a course on cryptography, and the textbook proclaimed that modular inverses were the basis of public-key algorithms like RSA. I felt that modular inverses were crackable, and I plodded along on the problem for a few weeks, until I finally discovered a polynomial-time algorithms for doing modular inverses. It turned out that I had reinvented Euclid’s algorithm, and the textbook authors were idiots.
“So I found this counterexample, and saw that my attempted disproof was false, along with my dreams of fame and glory.”
I know how that feels. When I was 14 or so, I took a course on cryptography, and the textbook proclaimed that modular inverses were the basis of public-key algorithms like RSA. I felt that modular inverses were crackable, and I plodded along on the problem for a few weeks, until I finally discovered a polynomial-time algorithms for doing modular inverses. It turned out that I had reinvented Euclid’s algorithm, and the textbook authors were idiots.
Well, that’s a pretty impressive “error” though. :-)