ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION



Similar documents
CHAPTER 5. Number Theory. 1. Integers and Division. Discussion

Math 319 Problem Set #3 Solution 21 February 2002

The application of prime numbers to RSA encryption

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

6.2 Permutations continued

Today s Topics. Primes & Greatest Common Divisors

The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

Every Positive Integer is the Sum of Four Squares! (and other exciting problems)

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

An Overview of Integer Factoring Algorithms. The Problem

Primality Testing and Factorization Methods

MATHEMATICAL INDUCTION. Mathematical Induction. This is a powerful method to prove properties of positive integers.

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

8 Primes and Modular Arithmetic

TEXAS A&M UNIVERSITY. Prime Factorization. A History and Discussion. Jason R. Prince. April 4, 2011

Lecture 13 - Basic Number Theory.

Factoring & Primality

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

Applications of Fermat s Little Theorem and Congruences

Integer Factorization using the Quadratic Sieve

Study of algorithms for factoring integers and computing discrete logarithms

Homework until Test #2

k, then n = p2α 1 1 pα k

GREATEST COMMON DIVISOR

a 11 x 1 + a 12 x a 1n x n = b 1 a 21 x 1 + a 22 x a 2n x n = b 2.

CS 103X: Discrete Structures Homework Assignment 3 Solutions

Factoring Algorithms

Elementary Number Theory

RSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Kevin James. MTHSC 412 Section 2.4 Prime Factors and Greatest Comm

Primality - Factorization

15 Prime and Composite Numbers

RSA and Primality Testing

FACTORING. n = fall in the arithmetic sequence

Cryptography and Network Security Chapter 8

Elements of Applied Cryptography Public key encryption

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

3. Mathematical Induction

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

SUM OF TWO SQUARES JAHNAVI BHASKAR

Congruent Number Problem

On the largest prime factor of x 2 1

Note on some explicit formulae for twin prime counting function

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12

CONTINUED FRACTIONS AND FACTORING. Niels Lauritzen

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

MATH 289 PROBLEM SET 4: NUMBER THEORY


CIS 5371 Cryptography. 8. Encryption --

MATH 537 (Number Theory) FALL 2016 TENTATIVE SYLLABUS

On the generation of elliptic curves with 16 rational torsion points by Pythagorean triples

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Doug Ravenel. October 15, 2008

Lecture 13: Factoring Integers

Continued Fractions and the Euclidean Algorithm

mod 10 = mod 10 = 49 mod 10 = 9.

Handout #1: Mathematical Reasoning

Chapter 11 Number Theory

Lectures on Number Theory. Lars-Åke Lindahl

PYTHAGOREAN TRIPLES KEITH CONRAD

MATH10040 Chapter 2: Prime and relatively prime numbers

On Generalized Fermat Numbers 3 2n +1

Winter Camp 2011 Polynomials Alexander Remorov. Polynomials. Alexander Remorov

2 Primality and Compositeness Tests

Primes in Sequences. Lee 1. By: Jae Young Lee. Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov

Mathematical Induction

8 Divisibility and prime numbers

The Fundamental Theorem of Arithmetic

Public Key Cryptography: RSA and Lots of Number Theory

Full and Complete Binary Trees

Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28

Handout NUMBER THEORY

Theorem3.1.1 Thedivisionalgorithm;theorem2.2.1insection2.2 If m, n Z and n is a positive

GCDs and Relatively Prime Numbers! CSCI 2824, Fall 2014!

Quotient Rings and Field Extensions

POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

Notes on Factoring. MA 206 Kurt Bryan

Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University

Settling a Question about Pythagorean Triples

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY

So let us begin our quest to find the holy grail of real analysis.

Primes, Factoring, and RSA A Return to Cryptography. Table of contents

Factorization Methods: Very Quick Overview

Groups in Cryptography

Number Theory Hungarian Style. Cameron Byerley s interpretation of Csaba Szabó s lectures

MATH 22. THE FUNDAMENTAL THEOREM of ARITHMETIC. Lecture R: 10/30/2003

A Factoring and Discrete Logarithm based Cryptosystem

ON FIBONACCI NUMBERS WITH FEW PRIME DIVISORS

Cryptography and Network Security

26 Ideals and Quotient Rings

SYSTEMS OF PYTHAGOREAN TRIPLES. Acknowledgements. I would like to thank Professor Laura Schueller for advising and guiding me

Integer roots of quadratic and cubic polynomials with integer coefficients

Lemma 5.2. Let S be a set. (1) Let f and g be two permutations of S. Then the composition of f and g is a permutation of S.

A New Generic Digital Signature Algorithm

Cryptography and Network Security Chapter 10

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction

Transcription:

ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION Aldrin W. Wanambisi 1* School of Pure and Applied Science, Mount Kenya University, P.O box 553-50100, Kakamega, Kenya. Shem Aywa 2 Department of Mathematics, Masinde Muliro University of Science and Technology, P.O Box 190-50100, Kakamega, Kenya. Cleophas Maende 3 School of Post Graduate Studies, Mount Kenya University, P.O box 342-00100, Thika, Kenya. Geoffrey Muchiri Muketha 4 Department of Information Technology, Meru University of Science and Technology, P.O Box 672-60200, Meru, Kenya. Abstract: There various algorithms that can factor large integers but very few of these algorithms run in polynomial time. This fact makes them inefficient. The apparent difficulty of factoring large integers is the basis of some modern cryptographic algorithms. In this paper we propose an algebraic approach to factoring composite integer. This approach reduces the number of steps to a finite number of possible differences between two primes. Keywords: Composite integer, Primes, Algebraic decomposition, Algorithm 1.0 Introduction There are no known algorithms which can factor arbitrary large integers efficiently. Probabilistic algorithms such as the Pollard rho and Pollard p-1 algorithm are in most cases more efficient than the trial division and Fermat factorization algorithms [6]. However, probabilistic algorithms can fail when given certain prime products: for example, Pollard's rho algorithm fails for N = 21. Integer factorization algorithms are an important subject in mathematics, both for complexity theory, and for practical purposes such as data security on computers [3]. From [5], the differences between consecutive primes provide an important base in developing new approaches in integer factorization. 2.0 Basic concepts 2.1 Prime Numbers An integer 2 is prime if it has no positive divisors other than 1 and itself. An integer greater than or equal to 2 that is not a prime is composite. 2.2 Lemma An integer 2 is composite if and only if it has factors a and b such that 1 < < and 1 < <. Proof Let 2 The if direction is obvious. For only if, assume that n is composite. Then it has a positive integer factor a such that 1 and. This means that there is a b with =. Since n and a are positive, so is b. Hence 1 and 1. By Divisibility properties of integers, and. Since 1 and we have 16

1 < <. If b = 1 then a = n, which is not possible, so 1. If b = n then a = 1, which is also not possible. So 1 < <, finishing this half of the argument [6]. 2.3 Lemma If > 1, then there is a prime p such that p n. Proof Let S denote the set of all integers greater than 1 that have no prime divisor. We must show that S is empty. If S is not empty then by the Well-Ordering Property it has a smallest member; call it m. Now m > 1 and has no prime divisor. Then m cannot be prime (as every number is a divisor of itself). Hence m is composite. Therefore (by result above) m = ab where 1 < < and 1 < <. Since1 < <, the factor a is not a member of S. So a must have a prime divisor p. Then p a and a m, so by divisibility properties of integers, p m. This contradicts the assumption that m has no prime divisor. So the set S must be empty [6]. 3.0 Existing Integer factorization algorithms 3.1 Trial Division Trial division is brute- force method of finding a divisor of an integer by simply plugging in one or a set of integers and seeing if they divide. Repeated application of trial division to obtain the complete prime factorization of a number is called direct search factorization. An individual integer being tested is called a trial divisor [1]. 3.2 Direct search factorization Direct search factorization is the simplest (and most simple-minded) prime factorization algorithm. It consists of searching for factors of a number by systematically performing trial divisions usually using a sequence of increasing numbers. Multiples of small primes are commonly excluded to reduce the number of trial divisors, but just including them is sometimes faster than the time required to exclude them. Direct search factorization is very inefficient, and can be used only with fairly small numbers. When using this method on a number, only divisors up to (where is the floor function) need to be tested. This is true since if all integers less than this had been tried, then + 1 < (1) In other words, all possible factors have had their cofactors already tested. It is also true that, when the smallest prime factor of is >, then its cofactor (such that = ) must be prime. To prove this, suppose that the smallest p is >. If =, then the smallest value and could assume is. But then = = > (2) This cannot be true. Therefore, must be prime, so = [1]. 17

3.3 The logarithm estimation algorithm The fundamental theorem of arithmetic states that every positive integer can be written uniquely as a product of primes, when the primes in the product are written in non decreasing order. The fundamental theorem of arithmetic implies that any composite integer can be factored. Let n be a composite integer a product of two primes p and q which are not necessary equal but close as is in the RSA [3]. Now clearly the logarithm of the two primes is approximately ½ (log n). After the approximate logarithm has been obtained the nearest prime can be determined through direct search. For example 21, first 1/2 (log 21) = 07563, the nearest primes with this 3 and 7. For Blum integers, which has extensively been used in the domain of cryptography, are integers with form, where p and q are different primes both 3 mod 4 and are odd integers. These integers can be divided two types: 1. =, hence 1 2 log log, the actual values of p and q can be estimated from primes nearest to the integer equivalent to. 2. =, where at least one of is greater than 1, hence log 1 2 log log similarly the and can be estimated as. This estimation algorithm reduces the number of steps that can be used determine the prime factors of composite integers [5]. 4.0 The Proposed Algebraic Approach This section discusses the results of the research. A study of differences of consecutive primes reveals trends that we exploit in this paper. 4.1 Twin primes Twin primes have a difference of 2. Thus if p and q are any two consecutive twin primes then the product can be given by ( 1)( + 1). Now consider a composite integer = that is a product of twin primes. Then 1 + 1 = + 1 = = ± + 1 Taking the appropriate value of n to be approximately p then q follows at once. 4.2 Blum integers A Blum integer is a composite integer that is a product of two primes both congruent to 1 modulo 4. The difference between any two such consecutive primes is 4. Thus if p and q are two primes both congruent to 1 modulo 4, then = 4 Therefore if we let p to be say n-2 and q to be say n+2, then a Blum integer = 2 + 2 = 4 = 18

= + 4 = ± + 4 An appropriate value of n gives us approximate p and q hence the prime factors of our composite integer. 4.3 Other composite integers In this section we consider other composite integers which are products of primes with differences of 6, 8, 10, 12, 14, 16 e.t.c. now just like the case of Twin and Blum integers, if = is any composite integer, with difference of say 6, then clearly = 6 Thus if we let = 3 and = + 3 then a composite integer = Therefore = ± + 9 3 + 3 = 9 = = + 9 An appropriate value of n gives approximate values of the prime factors of the composite integer. For any general composite integer =, with the difference the prime factors are approximately = ± + (3) Using the relation (3), we can obtain prime factors of composite integers on condition that the integer is a product of two primes no matter how large. This method reduces the steps that lead to factorization of a large integer to say polynomial time. If for example we take the case of RSA cryptosystem which is based on the prime factorization problem in which the primes are relatively close, the steps taken to arrive at the prime factors are greatly reduced. This then can be done in polynomial time. 5.0 Results A comparison of the approach above with other algorithms like the trial method, the direct search, the General Number Field Sieves [2], the logarithm method shows a great reduction in the number of steps. The algebraic approach uses differences, which repeat themselves across the set of primes. Considering any two consecutive primes which are sufficiently large, we find that the difference ranges approximately between 2 and 24. Working with this approach makes the number of steps to arrive at the prime factors to the number of even numbers in this range. Then the question is how large a composite integer can be to be efficiently decomposed by the algorithm? If this approach is combined by the logarithm then any integer no matter how large can be factored though with some bit of approximation. 19

6.0 Conclusion International Journal of Mathematics and Statistics Studies The algebraic approach brings out important revelations that can be exploited in the quest of efficiently factoring large composite integers. Though this puts the security of the world s money and many government secrets at risk, it s an important move in the growth of knowledge. The algorithm runs in polynomial time. If a study can be carried to establish the maximum difference between two consecutive primes and their relationships, this will strengthen the approach. A cryptographic primitive based on these differences is also likely to be probabilistic and very efficient and commercially viable comparable to the RSA and ECC. References [1]. Connelly B. Integer Factorization Algorithms. December 7, 2004 [2]. "General number field sieve." From Wikipedia, an online encyclopedia. November 13, 2004. Available: http://en.wikipedia.org/wiki/gnfs [3]. Wesstein, Eric W. "RSA Encryption." From Mathworld, an online encyclopedia. April, 2001. Available: http://mathworld.wolfram.com/rsaencryption.html [4]. "Integer factorization. Difficulty and complexity." From Wikipedia, an online encyclopedia. October 30, 2004. Available: http://en.wikipedia.org/wiki/integer_factorization [5] Wanambisi A.W., Aywa S., Maende C. Muketha G. M., Advances in composite integer factorization, Journal of Mathematical Theory and Modeling, March 2013 [6] Hefferon J. Elementary Number Theory, December, 2003 Authors' contributions All authors contributed to the conceptualisation of the paper which is an excerpt of W.A.W. PhD dissertation. W.A.W. did the initial review, the selection of abstracts, and the identification of papers to be included in the final review. SA, CM and GMM contributed to the assessment of papers and reviewed the results of the analysis. W.A.W drafted the manuscript, and all authors contributed to its completion. Acknowledgements Thanks to those who have been instrumental in the success of this research: The Masinde Muliro University of Science and Technology, the adviser, for participating in this research study and for their support of this study. * E-mail of the corresponding author: wawanambisi@gmail.com 20