Integer factorization records

Integer factorization records

= Numbers of a general form =

The first very large distributed factorisation was RSA129, a challenge number described in the Scientific American article of 1977 which first popularised the RSA cryptosystem. It was factorised between September 1993 and April 1994, using MPQS, with relations contributed by about 600 people from all over the Internet, and the final stages of the calculation performed on a MasPar supercomputer at Bell Labs.

Between January and August 1999, RSA-155, a challenge number prepared by the RSA company, was factorised using GNFS with relations again contributed by a large group, and the final stages of the calculation performed in just over nine days on the Cray C916 supercomputer at the SARA Amsterdam Academic Computer Center.

In January 2002, Franke et al announced the factorisation of a 158-digit cofactor of 2953+1, using a couple of months on about 25 PCs at the University of Bonn, with the final stages done using a cluster of six Pentium-III PCs.

In April 2003, the same team factored RSA-160 using about a hundred CPUs at BSI, with the final stages of the calculation done using 25 processors of an SGI Origin supercomputer.

The 174-digit RSA-576 was factored by Franke, Kleinjung and members of the NFSNET collaboration in December 2003, using resources at BSI and the University of Bonn; soon afterwards, Aoki, Kida, Shimoyama, Sonoda and Ueda announced that they had factored a 164-digit cofactor of 21826+1.

A 176-digit cofactor of 11281+1 was factored by Aoki, Kida, Shimoyama and Ueda between February and May 2005 using machines at NTT and Rikkyo University in Japan. [cite web |url=http://www.loria.fr/~zimmerma/records/11_281+ |accessdate=2007-05-23 |title=Factorization of 176-digit number|author=K. Aoki, Y. Kida, T. Shimoyama, H. Ueda]

The RSA-200 challenge number was factored by Franke, Kleinjung et al between December 2003 and May 2005, using a cluster of 80 Opteron processors at BSI in Germany; the announcement was made on 9 May 2005. [cite web |url=http://www.loria.fr/~zimmerma/records/rsa200|accessdate=2007-05-23 |title=RSA200|author=F. Bahr, M. Boehm, J. Franke, T. Kleinjung] They later (November 2005) factored the slightly smaller RSA-640 challenge number.

Numbers of a special form

12151−1, of 542 bits (163 digits), was factored between April and July 1993 by a team at CWI and Oregon State University. [cite web|url=http://krum.rz.uni-mannheim.de/cabench/sieve-record.html|accessdate=2007-11-23|title=Record Number Field Sieve Factorisations|author=P. L. Montgomery ]

2773+1, of 774 bits (233 digits), was factored between April and November 2000 by 'The Cabal', with the matrix step done over 250 hours on the Cray also used for RSA-155. [cite web | url=http://ftp.cwi.nl/herman/SNFSrecords/SNFS-233|accessdate=2007-11-23|title=233-digit SNFS factorization|author='The Cabal' ]

2809-1, of 809 bits (244 digits), had its factorisation announced at the start of January 2003. Sieving was done at the CWI, at the Scientific Computing Institute and the Pure Mathematics Department at Bonn University, and using private resources of J. Franke, T. Kleinjung and the family of F. Bahr. The linear algebra step was done by P. Montgomery at SARA in Amsterdam. [cite web | url=http://ftp.cwi.nl/herman/SNFSrecords/SNFS-244|accessdate=2007-11-23|title=M809|author=J. Franke]

6353−1, of 911 bits (275 digits), was factored by Aoki, Kida, Shimoyama and Ueda between September 2005 and January 2006 using SNFS. [cite web |url=http://www.loria.fr/~zimmerma/records/6353|accessdate=2007-05-23 |title=SNFS274|author=K. Aoki, Y. Kida, T. Shimoyama, H. Ueda]

21039−1, of 1039 bits (313 digits) (though a factor of 23 bits was already known) was factored between September 2006 and May 2007 by a group including K. Aoki, J. Franke, T. Kleinjung, A. K. Lenstra and D. A. Osvik, using computers at NTT, EPFL and the University of Bonn. [cite web | url=http://listserv.nodak.edu/cgi-bin/wa.exe?A2=ind0705&L=nmbrthry&T=0&P=1019 |accessdate=2007-05-23| title=Factorization of the 1039th Mersenne number|author=K. Aoki, J. Franke, T. Kleinjung, A. K. Lenstra, D. A. Osvik] [cite web | url=http://eprint.iacr.org/2007/205 | author= Kazumaro Aoki and Jens Franke and Thorsten Kleinjung and Arjen Lenstra and Dag Arne Osvik |accessdate=2007-12-19 | title=A kilobit special number field sieve factorization]

How do these compare to what can be done by individuals?

As of the end of 2007, thanks to the constant decline in memory prices, the ready availability of multi-core 64-bit computers, and the availability of the Bonn group's efficient sieving code via [http://sourceforge.net/project/showfiles.php?group_id=140917 ggnfs] and robust open-source software such as [http://www.boo.net/~jasonp/qs.html msieve] for the finishing stages, special-form numbers of up to 750 bits and general-form numbers of up to about 520 bits can be factored in a few months on a few PCs by a single person without any special mathematical experience (see [http://www.mersenneforum.org/showpost.php?p=124079&postcount=97] for a 518-bit example). These bounds would increase to about 850 and 570 if it were possible to secure the collaboration of a few dozen PCs; the limit is the amount of memory in a single machine.

References


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Lenstra elliptic curve factorization — The Lenstra elliptic curve factorization or the elliptic curve factorization method (ECM) is a fast, sub exponential running time algorithm for integer factorization which employs elliptic curves. Technically, the ECM is classified as a… …   Wikipedia

  • Gaussian integer — In number theory, a Gaussian integer is a complex number whose real and imaginary part are both integers. The Gaussian integers, with ordinary addition and multiplication of complex numbers, form an integral domain, usually written as Z[i]. The… …   Wikipedia

  • RSA numbers — In mathematics, the RSA numbers are a set of large semiprimes (numbers with exactly two prime factors) that are part of the RSA Factoring Challenge. The challenge was to find the prime factors but it was declared inactive in 2007. [RSA… …   Wikipedia

  • Mersenne prime — Named after Marin Mersenne Publication year 1536[1] Author of publication Regius, H. Number of known terms 47 Conjectured number of terms Infinite …   Wikipedia

  • List of mathematics articles (I) — NOTOC Ia IA automorphism ICER Icosagon Icosahedral 120 cell Icosahedral prism Icosahedral symmetry Icosahedron Icosian Calculus Icosian game Icosidodecadodecahedron Icosidodecahedron Icositetrachoric honeycomb Icositruncated dodecadodecahedron… …   Wikipedia

  • RSA Factoring Challenge — The RSA Factoring Challenge was a challenge put forward by RSA Laboratories on March 18 1991 to encourage research into computational number theory and the practical difficulty of factoring large integers and cracking RSA keys used in… …   Wikipedia

  • Peter Montgomery — Peter Lawrence Montgomery is an American mathematician who has published widely in the more mathematical end of the field of cryptography. He is currently a researcher in the cryptography group at Microsoft Research.Montgomery is particularly… …   Wikipedia

  • Prime number — Prime redirects here. For other uses, see Prime (disambiguation). A prime number (or a prime) is a natural number greater than 1 that has no positive divisors other than 1 and itself. A natural number greater than 1 that is not a prime number is… …   Wikipedia

  • Quadratic sieve — The quadratic sieve algorithm (QS) is a modern integer factorization algorithm and, in practice, the second fastest method known (after the general number field sieve). It is still the fastest for integers under 100 decimal digits or so, and is… …   Wikipedia

  • Discrete logarithm — In mathematics, specifically in abstract algebra and its applications, discrete logarithms are group theoretic analogues of ordinary logarithms. In particular, an ordinary logarithm loga(b) is a solution of the equation ax = b over the… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”