How To Solve The Riemann Equation With The Riemann Equation



Similar documents
Faster deterministic integer factorisation

Primality - Factorization

Factorization Methods: Very Quick Overview

Lecture 13 - Basic Number Theory.

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, Notes on Algebra

Cryptography and Network Security Chapter 8

= = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

Factoring Algorithms

Doug Ravenel. October 15, 2008

Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28

Preliminary Version: December 1998

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar

Cryptography and Network Security Number Theory

An Overview of Integer Factoring Algorithms. The Problem

Public Key Cryptography: RSA and Lots of Number Theory

RSA Question 2. Bob thinks that p and q are primes but p isn t. Then, Bob thinks Φ Bob :=(p-1)(q-1) = φ(n). Is this true?

Notes on Factoring. MA 206 Kurt Bryan

Factoring. Factoring 1

Lecture 13: Factoring Integers

Recent Breakthrough in Primality Testing

Factoring & Primality

Lecture 6 Black-Scholes PDE

FACTORING. n = fall in the arithmetic sequence

Continued Fractions. Darren C. Collins

The cyclotomic polynomials

I. Introduction. MPRI Cours Lecture IV: Integer factorization. What is the factorization of a random number? II. Smoothness testing. F.

How To Solve The Prime Factorization Of N With A Polynomials

Primality Testing and Factorization Methods

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

MEP Y9 Practice Book A

RSA Attacks. By Abdulaziz Alrasheed and Fatima

SOLUTIONS FOR PROBLEM SET 2

Applications of Fermat s Little Theorem and Congruences

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

STUDY ON ELLIPTIC AND HYPERELLIPTIC CURVE METHODS FOR INTEGER FACTORIZATION. Takayuki Yato. A Senior Thesis. Submitted to

The whole of analytic number theory rests on one marvellous formula due to Leonhard Euler ( ): n s = primes p. 1 p

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY

Overview of Number Theory Basics. Divisibility

Mean value theorems for long Dirichlet polynomials and tails of Dirichlet series

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction

by the matrix A results in a vector which is a reflection of the given

Homework until Test #2

Analysis of Binary Search algorithm and Selection Sort algorithm

Factoring integers, Producing primes and the RSA cryptosystem Harish-Chandra Research Institute

Elements of Applied Cryptography Public key encryption

Is n a Prime Number? Manindra Agrawal. March 27, 2006, Delft. IIT Kanpur

Chapter 8 - Power Density Spectrum

Factoring Algorithms

Determining the Optimal Combination of Trial Division and Fermat s Factorization Method

Computer and Network Security

A simple and fast algorithm for computing exponentials of power series

Notes 11: List Decoding Folded Reed-Solomon Codes

Study of algorithms for factoring integers and computing discrete logarithms

Public Key Cryptography and RSA. Review: Number Theory Basics

Solutions to TOPICS IN ALGEBRA I.N. HERSTEIN. Part II: Group Theory

Introduction. Appendix D Mathematical Induction D1

Introduction to Algebraic Geometry. Bézout s Theorem and Inflection Points

Factoring integers and Producing primes

OSTROWSKI FOR NUMBER FIELDS

ARBITRAGE-FREE OPTION PRICING MODELS. Denis Bell. University of North Florida

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Software Tool for Implementing RSA Algorithm

CONTINUED FRACTIONS AND FACTORING. Niels Lauritzen

FFT Algorithms. Chapter 6. Contents 6.1

8 Divisibility and prime numbers

SECTION 10-2 Mathematical Induction


9.2 Summation Notation

ELLIPTIC CURVES AND LENSTRA S FACTORIZATION ALGORITHM

3 1. Note that all cubes solve it; therefore, there are no more

Shor s algorithm and secret sharing

3. Mathematical Induction

JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson

Revised Version of Chapter 23. We learned long ago how to solve linear congruences. ax c (mod m)

Settling a Question about Pythagorean Triples

Computing exponents modulo a number: Repeated squaring

RAJALAKSHMI ENGINEERING COLLEGE MA 2161 UNIT I - ORDINARY DIFFERENTIAL EQUATIONS PART A

Systems with Persistent Memory: the Observation Inequality Problems and Solutions

An Introduction to the RSA Encryption Method

Notes on Network Security Prof. Hemant K. Soni

The application of prime numbers to RSA encryption

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

Some practice problems for midterm 2

ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION

Public Key (asymmetric) Cryptography

Integer Factorization

Integer Factorization

8 Primes and Modular Arithmetic

Number Theory Hungarian Style. Cameron Byerley s interpretation of Csaba Szabó s lectures

Integer Factorization using the Quadratic Sieve

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

0.4 FACTORING POLYNOMIALS

Using the ac Method to Factor

Cyclotomic Extensions

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Lecture 3: One-Way Encryption, RSA Example

Transcription:

Towards a New Subexponential University of Calgary 28 April 2010

1 with 2 3 with 4 (Calgary) Nancy LORIA 2 / 26

Motivation with Understanding factorisation and especially why the Number Field Sieve is the best current factoring approach. (Calgary) Nancy LORIA 3 / 26

Motivation with Understanding factorisation and especially why the Number Field Sieve is the best current factoring approach. Understand why a more natural approach using the Riemann ζ function fails so far. Are we doomed to bang into a wall through an analytic approach? (Calgary) Nancy LORIA 3 / 26

Fermat s Idea with Suppose we can find x,y integers with x 2 y 2 (mod N) and x ±y (mod N). Then 1 < gcd(x y,n) < N and this can be computed quickly, giving rise to a nontrivial factor of N. (Calgary) Nancy LORIA 4 / 26

Fermat s Idea with Suppose we can find x,y integers with x 2 y 2 (mod N) and x ±y (mod N). Then 1 < gcd(x y,n) < N and this can be computed quickly, giving rise to a nontrivial factor of N. To find x and y, the most successful technique uses smooth numbers (divisible by small primes only). It is due to Morrison & Brillhart. This idea is at the heart of the most successful factoring methods (QS and NFS), except ECM. (Calgary) Nancy LORIA 4 / 26

Running Times ECM, QS, NFS all have subexponential running times. with (Calgary) Nancy LORIA 5 / 26

Running Times with ECM, QS, NFS all have subexponential running times. QS: exp ( c 1 (log N) 1/2 (log log N) 1/2) ECM: exp ( c 2 (log p) 1/2 (log log p) 1/2), (where p is smallest prime dividing N) NFS: exp ( c 3 (log N) 1/3 (log log N) 2/3) (Calgary) Nancy LORIA 5 / 26

Presentation of Current Work We present an approach which is likely to yield a subexponential general purpose factoring algorithm. with (Calgary) Nancy LORIA 6 / 26

Presentation of Current Work with We present an approach which is likely to yield a subexponential general purpose factoring algorithm. It does not use the Morrison-Brillhart paradigm. (Calgary) Nancy LORIA 6 / 26

Presentation of Current Work with We present an approach which is likely to yield a subexponential general purpose factoring algorithm. It does not use the Morrison-Brillhart paradigm. It is in my view more natural, as it relates quantities known for their intrinsic arithmetical significance. (Calgary) Nancy LORIA 6 / 26

Presentation of Current Work with We present an approach which is likely to yield a subexponential general purpose factoring algorithm. It does not use the Morrison-Brillhart paradigm. It is in my view more natural, as it relates quantities known for their intrinsic arithmetical significance. Translates an arithmetic problem into an analytic one. (Calgary) Nancy LORIA 6 / 26

Presentation of Current Work with We present an approach which is likely to yield a subexponential general purpose factoring algorithm. It does not use the Morrison-Brillhart paradigm. It is in my view more natural, as it relates quantities known for their intrinsic arithmetical significance. Translates an arithmetic problem into an analytic one. All running times are proven, no assumptions! (Calgary) Nancy LORIA 6 / 26

Presentation of Current Work with We present an approach which is likely to yield a subexponential general purpose factoring algorithm. It does not use the Morrison-Brillhart paradigm. It is in my view more natural, as it relates quantities known for their intrinsic arithmetical significance. Translates an arithmetic problem into an analytic one. All running times are proven, no assumptions! Much room for future improvements. (Calgary) Nancy LORIA 6 / 26

Approaching Multiplicative Functions Let φ(n) be the Euler phi function. Suppose that N factors as N = pq, so that φ(n) = N p N p + 1 = f (p). with (Calgary) Nancy LORIA 7 / 26

Approaching Multiplicative Functions with Let φ(n) be the Euler phi function. Suppose that N factors as N = pq, so that φ(n) = N p N p + 1 = f (p). Then using Newton s method, an approximation to φ(n) will yield an approximation to p, which is enough to recover it. (Calgary) Nancy LORIA 7 / 26

Approaching Multiplicative Functions with Let φ(n) be the Euler phi function. Suppose that N factors as N = pq, so that φ(n) = N p N p + 1 = f (p). Then using Newton s method, an approximation to φ(n) will yield an approximation to p, which is enough to recover it. How do we find a good approximation to φ(n)? (Calgary) Nancy LORIA 7 / 26

First Attempt with Riemann with Riemann is ζ(s) = n 1 1 n s Rs > 1 It can be continued to a meromorphic function in C with simple pole with residue 1 at s = 1. Also ζ(s 1) ζ(s) = n 1 φ(n) n s Rs > 2 (Calgary) Nancy LORIA 8 / 26

Isolating φ(n) with Classical: Compute Φ(x) = n<x φ(n) by Φ(x) = 1 2πi 3+i 3 i ζ(s 1) ζ(s) and move line of integration to the left. x s s ds (Calgary) Nancy LORIA 9 / 26

Isolating φ(n) with Classical: Compute Φ(x) = n<x φ(n) by Φ(x) = 1 2πi 3+i 3 i ζ(s 1) ζ(s) x s s ds and move line of integration to the left. Problem: we hit the Riemann zeros, spooky beings! Can we avoid them? (Calgary) Nancy LORIA 9 / 26

Second Attempt with Riemann with We now consider σ(n) = N + 1 + p + q. As before, a close approximation to σ(n) will reveal p. Here ζ(s)ζ(s 1) = n 1 and hence if S(x) = n<x σ(n) we get σ(n) n s Rs > 2 S(x) = 1 2πi 3+i 3 i ζ(s 1)ζ(s) xs s ds (Calgary) Nancy LORIA 10 / 26

Second Attempt with Riemann with We now consider σ(n) = N + 1 + p + q. As before, a close approximation to σ(n) will reveal p. Here ζ(s)ζ(s 1) = n 1 and hence if S(x) = n<x σ(n) we get σ(n) n s Rs > 2 S(x) = 1 2πi 3+i 3 i ζ(s 1)ζ(s) xs s ds Problem: ζ(s) s (1 Rs)/2 as Is so cannot move the line of integration far enough to the left (to Rs 0) (Calgary) Nancy LORIA 10 / 26

The Mellin Transform Approach Riemann functional equation Singular Series with Multiplicative Functions (arithmetic) new method Poisson Summation formula (analytic) +? (Calgary) Nancy LORIA 11 / 26

The Multiplicative Function with We let r 2 and β m 0 fixed. Define σ r (n) = d β 1 1 dβ 2 2 dβ r 1 r 1 Then d 1 d 2 d r 1 n ζ(s)ζ(s β 1 ) ζ(s β r 1 ) = n=1 σ r (n) n s (Calgary) Nancy LORIA 12 / 26

The Test Function with We let ν R with ν > 1. Define { (1 t) ν 1 0 t 1 f ν (t) = 0 t 1 The Mellin transform of f ν is Γ(ν)Γ(s) Γ(ν + s) = 0 f ν (t)t s 1 dt (Calgary) Nancy LORIA 13 / 26

Inverse Mellin Transform We have with 1 2πi c+i c i ζ(s)ζ(s β 1 ) ζ(s β r 1 ) Γ(ν)Γ(s) Γ(ν + s) xs ds = n x σ r (n)f ν ( n x ) Call the right-hand side F(ν) = ( σ r (n) 1 n ) ν 1 x n x (Calgary) Nancy LORIA 14 / 26

Isolating p dividing N We estimate F (k) (ν) = n x σ r (n) ( 1 n ) ( ν 1 log k 1 n ) x x with If x = N + 1 we get N2 (Calgary) Nancy LORIA 15 / 26

Isolating p dividing N We estimate F (k) (ν) = n x σ r (n) ( 1 n ) ( ν 1 log k 1 n ) x x with If x = N + 1 we get N2 F (k) (ν) = ( 3log N) k σ r (N)N 3(ν 1) + O(N(2log N) k+r ) (Calgary) Nancy LORIA 15 / 26

Isolating p dividing N We estimate F (k) (ν) = n x σ r (n) ( 1 n ) ( ν 1 log k 1 n ) x x with If x = N + 1 we get N2 F (k) (ν) = ( 3log N) k σ r (N)N 3(ν 1) + O(N(2log N) k+r ) Choosing k > c 1 (ν + r)log N and supposing we can compute F (k) (ν) with good precision we get a value for σ r (N) up to an error O(N c 2 ), where c 2 as c 1. If N = pq, then as before this is sufficient to obtain p. (Calgary) Nancy LORIA 15 / 26

The Functional Equation with The Riemann is an meromorphic function with a single pole at 1 with residue 1 satisfying the functional equation (given here in asymmetric form) ζ(s) = (2π)s ( πs ) π Γ(1 s)sin ζ(1 s) 2 (Calgary) Nancy LORIA 16 / 26

New Identities with Moving the line of integration to the left and using the functional equation shows F(ν) ρ + (2πi)r β 1 β r 1 Γ(ν) (2πi) r+1 x(cos πν sinπν) {(2πi) r x} s Γ(s ν)γ(s + β 1 ) Γ(s + β r 1 ) (1+1/r) ζ(s)ζ(s + β 1 ) ζ(s + β r 1 )ds where ρ is some easily expressible residue. In view of the previous expression, it is appropriate to choose r so that x 1/r e so that the integral does not depend on x (hence N). (Calgary) Nancy LORIA 17 / 26

The Singular Series with Using the multiplication theorem ( Γ(s)Γ s + 1 ) ( Γ s + 2 ) ( Γ s + r 1 ) r r r = (2π) (r 1)/2 r 1/2 rs Γ(rs) we arrive at evaluating terms for F (k) (ν) which consist of derivatives of Γ(ν)(cos πν sinπν) times the following series d 1,...,d r 1 d β 1 1 d β 2 2 d β r 1 r 1 log j d r (d 1 d r ) 2 e 2πir(d 1 d r) 1/r with j k = O(log 2 x). Here r = [log x]. (Calgary) Nancy LORIA 18 / 26

Computing the Singular Series with How do we evaluate the singular series? Find an algorithm which computes it within e t in O(t c ) binary operations for some fixed c > 0. Can allow dependence on r to be bad, for instance e r. In general, need to evaluate d 1,...,d r 1 log j d r d c 1 1 dc 2 2 dcr r e iada 1 1 dar r with A = O(max ( 1/a 1,...,1/a r ) ) and a 1 + + a r = 1. (Calgary) Nancy LORIA 19 / 26

Poisson Summation Approach with Compute d 1,...,d r 1 e 1 d 1 R e 1 dr R log j d r d c 1 1 dc 2 2 dcr r e iada 1 1 dar r (Calgary) Nancy LORIA 20 / 26

Poisson Summation Approach with Compute d 1,...,d r 1 = d 1,...,d r 1 e 1 d 1 R e 1 dr R f (d 1,...,d r ) log j d r d c 1 1 dc 2 2 dcr r e iada 1 1 dar r (Calgary) Nancy LORIA 20 / 26

Poisson Summation Approach with Compute d 1,...,d r 1 = d 1,...,d r 1 = x 1,...,x r Z e 1 d 1 R e 1 dr R f (d 1,...,d r ) ˆf (x 1,...,x r ) log j d r d c 1 1 dc 2 2 dcr r e iada 1 1 dar r (Calgary) Nancy LORIA 20 / 26

Poisson Summation Approach with Compute d 1,...,d r 1 = d 1,...,d r 1 = x 1,...,x r Z e 1 d 1 R e 1 dr R f (d 1,...,d r ) ˆf (x 1,...,x r ) log j d r d c 1 1 dc 2 2 dcr r e iada 1 1 dar r Estimate the rate of decrease of ˆf. (Calgary) Nancy LORIA 20 / 26

Poisson Summation Approach with Compute d 1,...,d r 1 = d 1,...,d r 1 = x 1,...,x r Z e 1 d 1 R e 1 dr R f (d 1,...,d r ) ˆf (x 1,...,x r ) log j d r d c 1 1 dc 2 2 dcr r e iada 1 1 dar r Estimate the rate of decrease of ˆf. Evaluate single coefficients. (Calgary) Nancy LORIA 20 / 26

Rate of Decrease of ˆf with ˆf (x 1,...,x r ) = R r e 1 u R 1 e 1 u R r log j u r u c 1 1 uc 2 2 ucr r e iaua 1 1 uar r e 2πi(x 1u 1 + +x ru r) du 1 du r We can modify contours (u m e ±iθ u m for θ > 0) to get ˆf (x 1,...,x r ) = e ±iθ R r e e±irθ u R 1 e e±irθ ur R log j e ±iθ u r u c 1 1 uc 2 2 ucr r e ie±iθ Au a 1 1 uar r e 2πieiθ ( x 1 u 1 + + x r u r) du 1 du r (Calgary) Nancy LORIA 21 / 26

Rate of Decrease of ˆf (cont d) with ˆf (x 1,...,x r ) = e ±iθ therefore ˆf (x 1,...,x r ) R r e e±irθ u R 1 e e±irθ ur R log j e ±iθ u r u c 1 1 uc 2 2 ucr r e ie±iθ Au a 1 1 uar r e 2πieiθ ( x 1 u 1 + + x r u r) du 1 du r R r e cos(rθ) u R 1 e cos(rθ) ur R log j u r u c 1 1 uc 2 2 ucr r e ±A(sin θ)ua 1 1 uar r e 2π(sin θ)( x 1 u 1 + + x r u r) du 1 du r (Calgary) Nancy LORIA 22 / 26

Rate of Decrease of ˆf (end) with The cool case: A(sinθ)u a 1 1 uar r A(sinθ)(a 1 u 1 + + a r u r ) (2π δ)(sin θ)(u 1 + + u r ) i.e. if A (2π δ)min(1/a 1,...,1/a r ) for some δ > 0. (Calgary) Nancy LORIA 23 / 26

Rate of Decrease of ˆf (end) with The cool case: A(sinθ)u a 1 1 uar r A(sinθ)(a 1 u 1 + + a r u r ) (2π δ)(sin θ)(u 1 + + u r ) i.e. if A (2π δ)min(1/a 1,...,1/a r ) for some δ > 0. Problem: In our case A = (2π + O(log r/r))min(1/a 1,...,1/a r ) (Calgary) Nancy LORIA 23 / 26

Final Considerations Poisson Summation or purely analytic approach seems difficult to carry out for singular series. with (Calgary) Nancy LORIA 24 / 26

Final Considerations with Poisson Summation or purely analytic approach seems difficult to carry out for singular series. Hope one can find a method to treat the seemingly innocuous but revealing n,m 1 cos(an a m 1 a ) n 2 m 2 within e t3 when a = 1/t and A = 3π. In this case the best algorithm I found runs in O(C t ) whereas if A = π this is essentially O(t 2 ). (Calgary) Nancy LORIA 24 / 26

Final Considerations with Poisson Summation or purely analytic approach seems difficult to carry out for singular series. Hope one can find a method to treat the seemingly innocuous but revealing n,m 1 cos(an a m 1 a ) n 2 m 2 within e t3 when a = 1/t and A = 3π. In this case the best algorithm I found runs in O(C t ) whereas if A = π this is essentially O(t 2 ). Ultimately, this would show that factoring could be done in O(e r ) for r = log c N (subexponential). (Calgary) Nancy LORIA 24 / 26

Final Considerations with Poisson Summation or purely analytic approach seems difficult to carry out for singular series. Hope one can find a method to treat the seemingly innocuous but revealing n,m 1 cos(an a m 1 a ) n 2 m 2 within e t3 when a = 1/t and A = 3π. In this case the best algorithm I found runs in O(C t ) whereas if A = π this is essentially O(t 2 ). Ultimately, this would show that factoring could be done in O(e r ) for r = log c N (subexponential). Need to perform extensive numerical calculations. (Calgary) Nancy LORIA 24 / 26

with Completely new (?) approach to factoring. Advantage is that it transforms the arithmetic problem of factoring N into a purely analytic one (evaluation of the singular series, independent of N). Should lead to a deterministic subexponential factoring algorithm with proven running time faster than what is currently known. Preprint available on ArXiv. (Calgary) Nancy LORIA 25 / 26

with Thank You! (Calgary) Nancy LORIA 26 / 26