Fact-checked by Grok 2 weeks ago

RSA Factoring Challenge

The RSA Factoring Challenge was a cryptographic initiative launched by RSA Laboratories on March 18, 1991, aimed at advancing research in and evaluating the practical challenges of factoring large integers—numbers that are the product of exactly two prime factors—by offering escalating cash prizes for successful factorizations. The challenge comprised 54 such semiprimes, initially labeled RSA-100 through RSA-500 and RSA-617 based on their decimal digit counts (ranging from about 330 to 2,048 bits in length), with later additions like RSA-576, RSA-640, and up to RSA-2048 named by bit length to reflect their cryptographic relevance. Prizes started at $100 for the smallest numbers, such as RSA-129, and peaked at $200,000 for RSA-1024, incentivizing efforts and algorithmic innovations like the general number field sieve. These numbers were specially constructed to be difficult to factor, serving as benchmarks for the of , where the hardness of underpins the system's strength. Over the decades, progress accelerated with collaborative international teams using ; notable milestones include the factorization of RSA-129 in 1994 via a massive distributed effort involving thousands of Internet-connected machines, RSA-576 in 2003 after eight months of computation on hundreds of processors, and RSA-768 in 2009, which required over 2,000 CPU-years using the number field sieve on a cluster of machines. More recent achievements, post-challenge, include RSA-250 (829 bits) in February 2020 by a using the CADO-NFS software on supercomputers, equivalent to about 2,700 core-years of effort, with no larger challenge numbers factored since as of 2025, though larger ones like RSA-1024 remain unfactored. RSA Laboratories retired the challenge in 2007, citing the cryptography industry's matured understanding of required computational resources for factoring numbers of varying sizes, which better informed secure key length recommendations without needing ongoing prizes. Despite its discontinuation, the RSA numbers continue to influence research, driving improvements in factoring algorithms and highlighting the evolving balance between computational power and cryptographic security in an era of quantum threats.

History and Background

Origins and Launch

The Factoring Challenge was launched on March 18, 1991, by RSA Laboratories (then operating as RSA Data Security, later acquired by EMC Corporation in 2006 and by in 2016). This initiative provided a series of large numbers designed specifically for testing techniques, marking a key effort in the early commercialization of . The primary goals of the challenge were to stimulate academic and practical research in , to demonstrate the security of the algorithm by publicly tracking progress in factoring these carefully constructed semiprimes, and to establish benchmarks for evaluating the computational difficulty of various cryptographic key sizes. By offering concrete targets, it aimed to quantify how advances in computing power and algorithms impacted the feasibility of breaking -based systems, thereby informing standards for secure key lengths in the emerging field of digital . This focus addressed ongoing debates about the real-world robustness of , which relies on the presumed hardness of factoring products of two large primes, in the context of rapid hardware improvements during the early . The initial scope encompassed 41 challenge numbers, labeled RSA-100, RSA-110, ..., RSA-500 based on their decimal digit lengths (spaced at intervals of 10 digits), beginning with the smallest to foster broad participation and build momentum in the research community. These semiprimes were generated as products of two primes of comparable size, avoiding special forms that could ease , to ensure they represented typical RSA moduli. The challenge emerged against the backdrop of foundational developments in , including the 1976 Diffie-Hellman proposal and the 1978 publication, which had sparked widespread interest but also questions about long-term scalability amid accelerating computational capabilities. Validation of the challenge's design came swiftly with the factorization of RSA-100, a 100-decimal-digit number, completed on , 1991, by Arjen K. Lenstra using early resources. This rapid success for the smallest entry confirmed the setup's accessibility for initial testing while underscoring the escalating difficulty for larger instances, setting the stage for sustained engagement in research.

Evolution and Termination

In 2001, RSA Laboratories expanded the to align with evolving cryptographic standards and computational capabilities, shifting the nomenclature of challenge numbers to binary bit lengths from RSA-512 to RSA-2048. This relaunch introduced 8 new numbers, ranging from 576 bits to 2048 bits, extending the series to better test the practicality of factoring at scales relevant to modern RSA key sizes. Prizes were scaled upward to reflect the heightened difficulty, ranging from $10,000 for smaller numbers to a maximum of $200,000 for the 2048-bit . The expansion spurred increased participation from academic researchers and industry teams worldwide, fostering collaborative efforts that integrated advancements in the Number Field Sieve (NFS) algorithm, the dominant method for factoring large integers during this period. These developments highlighted the challenge's role in driving progress in , as teams leveraged and optimized NFS variants to tackle progressively larger numbers. In April 2007, RSA Laboratories announced the termination of the challenge, noting that all prizes for numbers up to RSA-640 had been claimed. The maximum prize of $200,000 was deemed insufficient to incentivize further efforts amid rapid advancements in hardware performance and algorithmic efficiency, which had dramatically reduced the time required for factorizations. RSA Laboratories explained that the industry had gained a more advanced understanding of 's cryptanalytic resilience, shifting emphasis to recommending minimum 2048-bit keys for practical security and addressing emerging threats from . As stated by RSA Laboratories: "Now that the industry has a considerably more advanced understanding of the cryptanalytic threat to the algorithm, RSA Laboratories no longer sees value in continuing to offer monetary rewards for factoring." Following the official end, no additional prizes were awarded, but the cryptographic community persisted in voluntarily factoring the remaining challenge numbers, contributing to ongoing research in integer factorization without financial incentives.

Mathematical Foundations

RSA Cryptography Basics

The RSA algorithm is a public-key cryptosystem developed by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1977, which enables secure data transmission without the need to share a secret key in advance. It operates using a modulus n formed as the product of two large prime numbers p and q, where n = p \times q. This structure allows for asymmetric encryption, where the public key is used for encrypting messages and the private key for decryption, making it foundational to modern cryptography. Key generation in RSA begins with the selection of two large, distinct prime numbers p and q, followed by the computation of the modulus n = p \times q. The totient function is then calculated as \phi(n) = (p-1)(q-1), and a public exponent e is chosen such that $1 < e < \phi(n) and e is coprime to \phi(n). The private exponent d is derived as the modular multiplicative inverse of e modulo \phi(n), satisfying d \equiv e^{-1} \pmod{\phi(n)}. The public key consists of (n, e), while the private key is (n, d). Encryption transforms a plaintext message m (where $0 \leq m < n) into ciphertext c = m^e \mod n using the public key. Decryption recovers the plaintext via m = c^d \mod n with the private key, leveraging for correctness since m^{\phi(n)} \equiv 1 \pmod{n} for m coprime to n. The security of RSA fundamentally relies on the computational infeasibility of factoring the modulus n back into its prime factors p and q when n is sufficiently large, such as 1024 bits or more, as breaking the system would require solving this . According to NIST guidelines, a 1024-bit RSA modulus provides approximately 80 bits of security, while larger sizes like 2048 bits offer 112 bits, underscoring the need for key lengths that resist current factoring capabilities. In the context of the , the selected numbers are semiprimes n = p \times q where p and q are primes of roughly equal size, directly mimicking the form of RSA moduli to test the practical limits of factorization attacks.

Integer Factorization Problem

The integer factorization problem involves determining the prime factors of a given composite integer n > 1, specifically finding non-trivial factors such as primes p and q where n = p \times q. This task is fundamental in and underpins the security of certain cryptographic systems, as multiplying large primes is computationally easy, while reversing the process—factoring—is believed to be significantly harder. On classical computers, no known algorithm solves integer factorization in polynomial time, with the best general-purpose methods achieving sub-exponential complexity. The General Number Field Sieve (GNFS), the most efficient algorithm for large instances, has an expected running time of L_n(1/3, (64/9)^{1/3} + o(1)), where L_n(a, c) = \exp(c (\log n)^a (\log \log n)^{1-a}), or equivalently O(\exp(c (\log n)^{1/3} (\log \log n)^{2/3})) for some constant c > 0. Semiprimes—products of two primes—are particularly challenging to factor, especially when the primes are balanced (p \approx q \approx \sqrt{n}), as this configuration maximizes resistance to known attacks; for instance, trial division, which tests divisors up to \sqrt{n}, becomes infeasible for semiprimes exceeding 100 decimal digits due to its exponential time requirements. The Factoring Challenge directly tested the practical boundaries of these algorithms by offering instances modeled after RSA moduli, ranging from 100 to 617 decimal digits in length, to gauge the feasibility of factoring numbers used in real-world during the 1991–2007 period. Although classical methods dominated efforts at the time, the problem's hardness was later highlighted by advances; Peter Shor's 1994 algorithm enables polynomial-time on a sufficiently large quantum computer, though such hardware remained impractical throughout the challenge era.

Challenge Mechanics

Selection of RSA Numbers

RSA Laboratories generated the challenge semiprimes by selecting pairs of large prime numbers p and q of equal bit length, ensuring they were roughly balanced (p \approx q), and computing n = p \times q. The primes were chosen randomly using a seeded into a validated , then rigorously tested for primality via methods such as the Miller-Rabin test with multiple witnesses followed by a Lucas test; the primes were also required to be congruent to 2 modulo 3 to facilitate use with a public exponent of 3 in cryptosystems. Once suitable primes were identified, their product was checked for the correct digit length and absence of small factors before publication, with the individual primes discarded and kept secret thereafter. The initial set of challenge numbers, launched in , consisted of semiprimes labeled RSA-100 through RSA-500 and RSA-617, each named for its approximate number of digits and increasing in size at intervals of roughly 10 digits to progressively test factoring capabilities. In , the challenge was expanded to include larger numbers specified by , from RSA-512 (approximately 155 digits) to RSA-2048 (approximately 617 digits), shifting focus to measures aligned with common cryptographic key sizes. This progression allowed the challenge to benchmark advancements in against evolving standards for secure key lengths. Each published n was provided in decimal form along with a checksum for integrity verification, and was guaranteed to be square-free as the product of exactly two distinct primes, with no additional factors or special structure beyond the balanced form to ensure fair testing of general-purpose factoring algorithms. To claim a successful , participants submitted the complete prime factors p and q along with primality proofs (such as certificates from probabilistic tests), which RSA Laboratories then verified by confirming p \times q = n and the primality of both factors before awarding any prizes. In total, 54 numbers were released across these phases, with difficulty scaling directly with their size to reflect practical cryptographic threats.

Prize Structure

The prize structure of the RSA Factoring Challenge provided cash incentives that increased with the size of the , thereby motivating researchers to tackle progressively harder problems. Initially launched in , the prizes were scaled according to the number of decimal digits in the RSA number, with smaller numbers receiving modest rewards to encourage early participation in demonstrating practical capabilities. In 2001, RSA Laboratories revised the structure to better align with cryptographic key lengths, adopting tiers based on bit length. Prizes ranged from $10,000 for factoring a 576-bit number to $200,000 for a 1024-bit number, with intermediate tiers such as $20,000 for a 640-bit number. Following this expansion, prizes for smaller numbers (below 576 bits) were either reduced or discontinued, as many had already been factored under scheme. The challenge was open to individuals and teams from anywhere in the world, with no limitations on the computational methods or employed, provided the factorization was complete and correct. Only the first verified submission for each number qualified for the . Claims were processed through submissions of the prime factors to RSA Laboratories at [email protected]. entailed independent checks, including of the submitted factors to reconstruct the original and application of probabilistic primality tests such as the Miller-Rabin test to confirm the primality of both factors and checks for the absence of overlooked smaller factors. By the challenge's end in , all prizes up to the 640-bit tier, including the $20,000 award for -640, had been claimed and paid out.

Notable Achievements

Early Factorizations

The early factorizations in the Factoring Challenge, spanning 1991 to 1999, showcased the transition from classical sieving methods to more advanced algorithms, validating the challenge's role in advancing techniques while highlighting the growing vulnerability of smaller RSA moduli. These efforts involved collaborative teams leveraging resources, often spanning global networks of workstations and idle machines, to tackle semiprimes of 100 to 140 digits. RSA-100, the inaugural 100-digit challenge number, was factored on April 1, 1991, by Arjen K. Lenstra using the algorithm on a single workstation, requiring approximately nine months of computation and earning a $1,000 prize. This success demonstrated the practicality of the for numbers around 330 bits, setting a benchmark for subsequent efforts. Building on this, the 129-digit RSA-129 was factored in April 1994 by a distributed team led by Derek Atkins, Michael Graff, Arjen K. Lenstra, and Paul Leyland, employing the multiple polynomial with large-prime variations. The factorization utilized idle cycles from about 1,600 computers worldwide over eight months, equivalent to roughly 5,000 MIPS-years of effort on an processor, and secured a $100 prize, which was donated to the ; the result garnered widespread media attention, including coverage in major newspapers, underscoring the challenge's public impact. From 1996 onward, factorizations shifted to early variants of the number , reflecting algorithmic evolution for larger semiprimes. RSA-130, a 130-digit number, was factored on April 10, 1996, by a team including Arjen K. Lenstra, Jim Cowie, and others at the CWI, using the number in a worldwide distributed effort totaling around 500 MIPS-years for sieving alone. Similarly, RSA-140 fell on February 2, 1999, to a collaboration led by Stefania Cavallar, Arjen K. Lenstra, and colleagues, again via the number on approximately 200 workstations, with the full computation estimated at 200 computer-years on 200 MHz machines. These achievements for RSA-130 through RSA-140 illustrated the scalability of multiple polynomial number implementations, reducing factorization times relative to quadratic methods for numbers exceeding 400 bits. Collectively, these early successes established the feasibility of factoring 100- to 140-digit semiprimes within years using accessible hardware, prompting cryptographic standards bodies to deem 512-bit (approximately 155-digit) RSA keys insecure by the late 1990s and advocate for longer moduli like bits or more to maintain security margins. This progression not only spurred refinements in number field sieve variants but also influenced recommendations in protocols such as SSL/TLS.

Record-Breaking Efforts

One significant milestone in the RSA Factoring Challenge occurred with the factorization of RSA-155, a 512-bit (155-decimal-digit) number, completed on August 22, 1999, by an international team led by Herman te Riele from the Centrum Wiskunde & Informatica (CWI) in the . This effort marked a key advancement in the application of the Number Field Sieve (NFS) algorithm, requiring approximately 4,000 MIPS-years of computation across distributed systems, and demonstrated the feasibility of factoring numbers approaching 512 bits with coordinated global resources. Among the prize-winning factorizations during the challenge's active period, RSA-576, a 576-bit (174-decimal-digit) number, was factored on December 3, 2003, by a team led by Jens Franke from the , including Thorsten Kleinjung, using an optimized general NFS implementation. The computation spanned about 13,200 MIPS-years, with the sieving phase dominating the effort through distributed processing on hundreds of processors, earning the team a prize from RSA Laboratories. Similarly, RSA-640, a 640-bit (193-decimal-digit) , was factored on November 2, 2005, by the same Bonn-based team in collaboration with the German Federal Agency for Security (BSI), utilizing five months of computation on 80 CPUs at 2.2 GHz. This factorization, which highlighted improvements in line sieving techniques, secured a $20,000 prize and underscored the scaling challenges of NFS for numbers beyond 600 bits. Following the challenge's termination in 2007, voluntary efforts continued to push factorization records, with RSA-768—a 768-bit (232-decimal-digit) number—factored on December 12, 2009, by an international team including researchers from CWI, EPFL, and INRIA, using the CADO-NFS software suite. The two-year computation involved extensive distributed sieving across multiple clusters, totaling around 2,000 core-years, and confirmed the NFS's dominance without any prize incentive. Subsequent post-challenge achievements included the of RSA-220 (729 bits, 220 digits) on , 2016, by a team using CADO-NFS on resources, requiring about 1,500 core-years primarily for the sieving and linear algebra phases. In December 2019, RSA-240 (795 bits, 240 digits) was factored by a collaboration led by Paul Zimmermann, involving roughly 900 core-years of distributed computation focused on advanced selection and matrix solving. The most recent record came in February 2020 with RSA-250 (829 bits, 250 digits), factored by a team including Fabrice Boudot and Emmanuel Thomé using CADO-NFS on European supercomputing facilities, consuming over 2,700 core-years with sieving as the primary bottleneck. These record-breaking factorizations relied heavily on frameworks, leveraging hundreds to thousands of processor cores across global networks for the resource-intensive sieving and matrix steps of the NFS algorithm, which together accounted for over 90% of the computational effort in each case. As of November 2025, RSA-1024 and all larger challenge numbers remain unfactored, with ongoing sporadic efforts limited by the exponential growth in required resources, estimated at millions of core-years for 1024-bit numbers using classical methods.

Legacy and Impact

Advancements in Factoring Algorithms

Prior to the RSA Factoring Challenge, the (QS) algorithm represented the state-of-the-art for factoring semiprimes up to approximately 100 digits, with practical implementations achieving records around 110 digits by the late . The multiple polynomial (MPQS), an enhancement that utilized multiple quadratic polynomials to improve sieving efficiency, extended these capabilities to over 120 digits by 1990, enabling the factorization of numbers like the 129-digit RSA-129 in 1994, though such efforts required significant computational resources. The challenge spurred the adoption and refinement of the Number Field Sieve (NFS), first introduced in the late 1980s for special forms but generalized in the 1990s to handle arbitrary integers via the General Number Field Sieve (GNFS). By the factorization of RSA-130 in 1996, GNFS had become the standard method for large-scale RSA numbers, surpassing QS and MPQS in asymptotic efficiency and practical performance for numbers exceeding 120 digits. Efforts to solve the challenge numbers drove key innovations in GNFS implementation, including optimized sieving techniques such as line sieving to accelerate the identification of smooth relations and advanced strategies for relation collection to handle the vast search spaces required. These were complemented by improvements in linear algebra over massive sparse matrices, often involving hundreds of millions of relations, and the development of frameworks that leveraged idle cycles across global networks of workstations. Such optimizations were essential for scaling GNFS to the challenge's larger targets, reducing the overhead of the most compute-intensive phases. A pivotal milestone came with the factorization of the 512-bit (155-digit) RSA-155 using GNFS, which required approximately 8,400 MIPS-years of computation—equivalent to several months on a distributed of hundreds of machines—dramatically shortening what would have taken years under prior methods like MPQS. Further progress was evident in the factorization of the 768-bit (232-digit) RSA-768, employing advanced GNFS variants with coprime polynomial selections to enhance smoothness probabilities and relation yields, completed after over 2,000 CPU-years across international collaborators. In the years following the challenge's conclusion in 2007, GNFS implementations integrated the elliptic curve method (ECM) as a preprocessing step to efficiently detect and remove small prime factors, thereby streamlining the main sieving phase for the remaining cofactor. By the 2010s, hardware accelerations using graphics processing units (GPUs) targeted cofactorization and sieving subroutines, yielding speedups of up to an order of magnitude in relation processing for mid-sized factors. While no polynomial-time breakthroughs emerged, ongoing refinements—particularly in polynomial selection and sieving parameters—continuously lowered the effective constant c in GNFS's subexponential complexity \exp(c (\log n)^{1/3} (\log \log n)^{2/3}), incrementally boosting performance for ever-larger integers.

Implications for Cryptography

The factorization of RSA-155 in 1999, equivalent to a 512-bit key, demonstrated the practical insecurity of such sizes for cryptographic use, prompting a rapid shift away from 512-bit RSA keys in favor of larger moduli. By the early , 1024-bit keys became the recommended minimum for providing adequate security against classical factoring attacks, remaining standard until around when growing computational power necessitated further increases. Today, 2048-bit or larger keys are the industry baseline for RSA, with 4096-bit moduli advised for long-term protection beyond 2030, reflecting ongoing advancements in factoring techniques revealed through challenges like RSA's. In response, standards bodies such as NIST updated their guidelines to enforce these larger key sizes; for instance, since 2019, NIST has required RSA moduli of at least 2048 bits for new key agreement and transport applications to achieve at least 112 bits of security strength. These updates were influenced by empirical data from factoring milestones, leading some sectors to migrate toward (ECC) for equivalent security with smaller key sizes and improved performance. The challenge's results also informed cryptographic research by providing benchmarks for hybrid attack models, where classical factoring is combined with other vulnerabilities, and heightened awareness of side-channel risks in RSA implementations. A major implication emerged from the theoretical threat posed by : can factor large integers in polynomial time on a sufficiently powerful quantum computer, rendering all current key sizes vulnerable regardless of length. This realization, amplified by classical factoring records that underscored the limits of even massive keys against future quantum hardware, drove NIST's standardization process, initiated in 2016 and culminating in the release of the first standards (FIPS 203, 204, and 205) in August 2024. As of 2025, 2048-bit remains secure against classical attacks but faces by 2030 under NIST guidelines due to quantum risks, with full disallowance planned after 2035; the challenge's legacy continues in benchmarking post-quantum alternatives, such as lattice-based schemes, to ensure their hardness matches or exceeds RSA's proven resilience.

References

  1. [1]
    RSA Number -- from Wolfram MathWorld
    RSA numbers are difficult to-factor composite numbers having exactly two prime factors (ie, so-called semiprimes) that were listed in the Factoring Challenge ...
  2. [2]
    RSA-200 Factored - MathWorld News
    RSA Laboratories sponsors the RSA Factoring Challenge to encourage research into computational number theory and the practical difficulty of factoring large ...
  3. [3]
    [PDF] Factorization of a 768-bit RSA modulus - Cryptology ePrint Archive
    Dec 12, 2009 · The RSA factoring challenge FAQ, http://www.rsa.com/rsalabs/node.asp?id=2094. 40. Q. Tarantino, http://www.youtube.com/watch?v=WtHTc8wIo4Q ...
  4. [4]
    RSA-250 - Caramba, Nancy
    Subject: Factorization of RSA-250 Date: February 28, 2020 For the past three months, ever since the DLP-240 record announced in December 2019 [1], ...Missing: factored | Show results with:factored
  5. [5]
    Integer Factoring Records
    General-purpose Algorithms: the largest integer factored with a general-purpose algorithm is RSA-250 (250 decimal digits), which was factored on February 28 ...Missing: date | Show results with:date
  6. [6]
    A 30-Year-Old Cryptographic Challenge Is About To Be Solved
    Jan 10, 2023 · It's taken more than 30 years, but the RSA Factoring Challenge could finally be close to being solved. The implications are obvious for the ...
  7. [7]
    [PDF] Frequently A s ked Questions about To d ay 's Cry p t o g ra p h y
    A predecessor to the RSA Factoring Challenge is RSA-129. ... In January 1998, RSA Laboratories launched the DES challenge II, which consists of a series of DES.
  8. [8]
    13.9 THE RSA CHALLENGE - Computer Security and Cryptography ...
    ... 1991; it consists of a list of numbers, each the product of two primes of roughly comparable size. There are 42 numbers in the challenge; the smallest length ...
  9. [9]
    [PDF] A Method for Obtaining Digital Signatures and Public-Key ...
    At the heart of our proposal is a new encryption method. This method provides an implementation of a “public-key cryptosystem,” an elegant concept invented by.Missing: 1970s | Show results with:1970s<|control11|><|separator|>
  10. [10]
    RSA poses $200000 crypto challenge - The Register
    RSA Security is running a factoring challenge that offers would-be code breakers a prize of up to $200,000 for finding the two numbers of ...Missing: expansion | Show results with:expansion
  11. [11]
    Mathematicians Collaborate To Solve RSA Factoring Challenge
    Apr 30, 2004 · Originally started in 1991 and relaunched with its current set of challenge numbers in 2001, RSA Laboratories' Factoring Challenge was ...
  12. [12]
    Why has the RSA factoring challenge been withdrawn?
    Oct 11, 2011 · My guess is that they withdrew the challenges for a mixture of the two following reasons: When a RSA challenge is broken, it makes bad press, ...Does Schnorr's 2021 factoring method show that the RSA ...What are those RSA Challenges, DES Challenges and RSA ...More results from crypto.stackexchange.comMissing: Laboratories retires
  13. [13]
    New RSA factoring challenge solved
    Dec 3, 2019 · A new RSA challenge problem has been solved. What does the result say about the strength of RSA encryption?Missing: counter skepticism
  14. [14]
    A method for obtaining digital signatures and public-key cryptosystems
    Feb 1, 1978 · An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
  15. [15]
    [PDF] Twenty Years of Attacks on the RSA Cryptosystem 1 Introduction
    The RSA cryptosystem, invented by Ron Rivest, Adi Shamir, and Len Adleman [21], was first publicized in the August 1977 issue of Scientific American.Missing: citation | Show results with:citation
  16. [16]
    Record 232-digit number from cryptography challenge factored
    Jan 8, 2010 · The RSA Factoring Challenge offered up a list of massive semiprimes—numbers composed of two prime factors—representative of the sort used in ...<|control11|><|separator|>
  17. [17]
    [PDF] Number Field Sieve with provable complexity - arXiv
    Jul 14, 2020 · The reason the General Number Field Sieve is so effective is that it uses strong algebraic con- structions to get a factorization, which allows ...
  18. [18]
    Factoring semi-primes with (quantum) SAT-solvers | Scientific Reports
    May 14, 2022 · The smallest semi-prime of these challenges is RSA-100: a 100-digit or 330-bit number. This number was factored in a few days almost immediately ...
  19. [19]
    [PDF] RSA Factoring Challenge: RSA-617 - MysteryTwister
    In 1991 RSA Inc [1] published 54 challenges with various key lengths for the modulus N (100 to 617 decimal digits). These RSA cipher challenges [2] were the ...Missing: sizes | Show results with:sizes
  20. [20]
    [quant-ph/9508027] Polynomial-Time Algorithms for Prime ... - arXiv
    Aug 30, 1995 · Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. Authors:Peter W. Shor (AT&T Research).
  21. [21]
    Where did they get numbers for RSA factoring challenge?
    Jul 21, 2017 · The process proceeded as follows: First, 30,000 random bytes were generated using a ComScire QNG hardware random number generator, attached to ...
  22. [22]
    The RSA Factor Challenge Numbers
    The checksum of each number is the residue of that number modulo 991889 (a six-digit prime number). Challenge Numbers: The ``RSA List'' RSA-100 ...
  23. [23]
    RSA-640 Factored - MathWorld Headline News
    While RSA-640 has slightly fewer digits than the previously factored RSA-200, its factorization carries the additional benefit of a cash reward of $20,000 from ...Missing: bit | Show results with:bit
  24. [24]
    Factorization of a 512-Bit RSA Modulus - SpringerLink
    This paper reports on the factorization of the 512-bit number RSA-155 by the Number Field Sieve factoring method (NFS) and discusses the implications for RSA.
  25. [25]
    [PDF] Factorization of a 512-Bit RSA Modulus* - CWI Amsterdam
    Herman te Riele, Walter Lioen, and Dik Winter. Factoring with the quadratic sieve on large vector computers. J. Comp. Appl. Math., 27:267-278, 1989. 33 ...
  26. [26]
    RSA-576 Factored - MathWorld News
    RSA Laboratories sponsors the RSA Factoring Challenge to encourage research into computational number theory and the practical difficulty of factoring large ...
  27. [27]
    RSA-640 Factored - Schneier on Security -
    Nov 9, 2005 · RSA-640 Factored. A team at the German Federal Agency for Information Technology Security has factored a 193-digit number.
  28. [28]
    [PDF] Factorization of a 768-bit RSA modulus
    Jun 23, 2010 · We used Kleinjung's 2006 algorithm (On polynomial selection ... Reference: Continued Fractions and Lattice Sieving, Jens. Franke and Thorsten ...
  29. [29]
    [PDF] Factorisation of RSA-220 with CADO-NFS - LORIA
    May 10, 2016 · We report on the factorization of RSA-220 (220 decimal digits), which is the 3rd largest integer factorization with the General Number Field ...
  30. [30]
    Comparing the difficulty of factorization and discrete logarithm: a 240 ...
    Jun 10, 2020 · We report on two new records: the factorization of RSA-240, a 795-bit number, and a discrete logarithm computation over a 795-bit prime field.Missing: 2019 Shanks
  31. [31]
    A Tale of Two Sieves - American Mathematical Society
    By 1994 the quadratic sieve had factored the famous 129-digit RSA challenge number that had been estimated in Martin Gardner's 1976 Sci- entific American column ...
  32. [32]
    [PDF] Factoring Large Integers with the Quadratic Sieve
    Jul 17, 2019 · Factoring 50-digit numbers became commonplace in 1980 and in. 1990 the record was 116 digits [39]. In Martin Gardner's 1976 Scientific. American ...
  33. [33]
    [PDF] Historical Background of the Number Field Sieve Factoring Method
    Nov 3, 1996 · With use of computers the method defeated the sieving devices and reigned until the introduction in 1982 of the Quadratic Sieve method, in ...
  34. [34]
    [PDF] An Introduction to the General Number Field Sieve - Virginia Tech
    Apr 17, 1998 · The General Number Field Sieve (GNFS) is the fastest known method for factoring “large” integers, where large is generally taken to mean over ...
  35. [35]
    [PDF] We Are on the Same Side. Alternative Sieving Strategies ... - Hal-Inria
    May 31, 2023 · In this article, we try to examine different sieving strategies to speed up this step since many improvements have been done on all other steps ...
  36. [36]
    Factorization of a 512-bit RSA modulus
    On August 22, 1999, we completed the factorization of the 512--bit 155--digit number RSA--155 with the help of the Number Field Sieve factoring method (NFS).
  37. [37]
    [PDF] ECM at Work - Cryptology ePrint Archive
    Sep 7, 2012 · The performance of the elliptic curve method (ECM) for integer factorization plays an important role in the security assessment of RSA-based ...Missing: integration | Show results with:integration
  38. [38]
    [PDF] Cofactorization on Graphics Processing Units
    It was shown that modern GPUs can be used to accelerate a compute-intensive part of the relation collection step of the number field sieve integer factorization ...
  39. [39]
    [PDF] History of Cryptographic Key Sizes - Cryptology ePrint Archive
    The RSA company itself published a list of factorization challenges at various key lengths to encourage people to look into the security of cryptography based ...
  40. [40]
  41. [41]