Integer Factorization – Cryptology Meets Number Theory
DOI:
https://doi.org/10.26408/109.01Keywords:
cryptography, number theory, public-key cryptography, factorization, RSA Cryptosystems, quantum computing, shor algorithmAbstract
Integer factorization is one of the oldest mathematical problems. Initially, the interest in factorization was motivated by curiosity about behaviour of prime numbers, which are the basic building blocks of all other integers. Early factorization algorithms were not very efficient. However, this dramatically has changed after the invention of the well-known RSA public-key cryptosystem. The reason for this was simple. Finding an efficient factoring algorithm is equivalent to breaking RSA. The work overviews development of integer factoring algorithms. It starts from the classical sieve of Eratosthenes, covers the Fermat algorithm and explains the quadratic sieve, which is a good representative of modern factoring algorithms. The progress in factoring is illustrated by examples of RSA challenge moduli, which have been factorized by groups of mathematicians and cryptographers. Shor's quantum factorization algorithm with polynomial complexity is described and the impact on public-key encryption is discussed.References
Crandall, R., Pomerance, C., 2001, Prime Numbers: A Computational Perspective, Springer.
[2] Dattani, N.S., Bryans, N., 2014, Quantum Factorization of 56153 with only 4 Qubits, Quantum Physics, arXiv:1411.6758,
[3] Hirvensalo, M., 2001, Quantum Computing, Natural Computing Series, Springer.
[4] Kleinjung, T., Aoki, K., Franke, J., Lenstra, A.K., Thomé, E., Bos, J.W., Gaudry, P., Kruppa, A., Montgomery, P.L., Osvik, D.A., te Riele, H., Timofeev, A., Zimmermann, P., 2010, Factorization of a 768-bit RSA Modulus, CRYPTO’10 Proceedings of the 30th Annual Conference on Advances in Cryptology, August 15–19, Santa Barbara, CA, USA, pp. 333–350.
[5] Knuth, D., 1997, The Art of Computer Programming, vol. 2, Seminumerical Algorithms, 3rd ed., Addison-Wesley, Boston, MA, USA.
[6] Lehmer, D.H., Powers, R.E., 1931, On Factoring Large Numbers, Bull. Amer. Math. Soc., vol. 37, no. 10, pp. 770–776.
[7] Manasse, M., Lenstra, A.K., 1999, RSA Honor Roll, http://www.ontko.com/pub/rayo/primes/hr_ rsa.txt (20.08.2018).
[8] Martin-López, E., Laing, A., Lawson, T., Alvarez, R., Zhou, Xiao-Qi, O’Brien, J.L., 2012, Experimental Realization of Shor’s Quantum Factoring Algorithm using Qubit Recycling, Nature Photonics, vol. 6, no. 11.
[9] NIST, 2018, Post-Quantum Cryptography, https://csrc.nist.gov/Projects/Post-Quantum-Cryptography, (20.08.2018).
[10] Pieprzyk, J., Hardjono, T., Seberry, J., 2003, Fundamentals of Computer Security, Springer.
[11] Pomerance, C., 1996, A Tale of Two Sieves, Notices Amer. Math. Soc, vol. 43, pp.1473–1485.
[12] Rivest, R., Shamir, A., Adleman, L., 1978, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications of the ACM, vol. 21, no. 2, pp. 120–126.
[13] Shor, P.W., 1997, Polynomial-time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing 26.5, pp. 1484–1509.
[14] Vandersypen, L.M.K., Steffen, M., Breyta, G., Yannoni, C.S., Sherwood, M.H., Chuang, I.L., Experimental Realization of Shor’s Quantum Factoring Algorithm using Nuclear Magnetic Resonance, Nature, vol. 414 no. 6866, pp.883–887.
[15] Wagstaff, S.S. Jr., 2013, The Joy of Factoring, American Mathematical Society, Providence, RI, USA.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 The Author(s)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright to their work, licensing it under the Creative Commons Attribution License Attribution 4.0 International licence (CC BY 4.0) which allows articles to be re-used and re-distributed without restriction, as long as the original work is correctly cited. The author retains unlimited copyright and publishing rights.