Fact-checked by Grok 2 weeks ago

Semiprime

In , a semiprime is a that is the product of exactly two prime numbers, which may be equal or distinct. Examples include 4 = 2 × 2, 6 = 2 × 3, 9 = 3 × 3, 10 = 2 × 5, 14 = 2 × 7, 15 = 3 × 5, 21 = 3 × 7, and 22 = 2 × 11. Semiprimes form a significant subclass of composite numbers, bridging primes and more highly composite forms in the study of and distribution. The counting function π₂(x), which tallies the number of semiprimes less than or equal to x, has an asymptotic approximation of x (log log x) / log x, indicating their relative abundance compared to primes but sparsity relative to all integers. This density arises from the multiplicative structure, where semiprimes include both squares of primes (such as 4, 9, 25) and square-free semiprimes (products of distinct primes, such as 6, 10, 15). Beyond pure mathematics, semiprimes are foundational to computational number theory and cryptography, as factoring a large semiprime into its constituent primes is computationally intractable for sufficiently large instances, a property exploited in algorithms like RSA. In the RSA cryptosystem, the public key modulus is typically a semiprime formed by multiplying two large distinct primes, ensuring security relies on the presumed hardness of this factorization problem. Notable challenges, such as the factorization of RSA-129 (a 129-digit semiprime) in 1994, underscore both historical progress and ongoing research into semiprime properties.

Definition and Fundamentals

Definition

A is a that is the product of exactly two prime numbers, not necessarily distinct. For instance, $4 = 2 \times 2 and $6 = 2 \times 3 are semiprimes. Formally, a semiprime n can be expressed as n = p \times q, where p and q are prime numbers with p \leq q. Semiprimes differ from prime numbers, which have only one prime factor (themselves), and from higher prime powers such as $8 = 2^3, which involve more than two identical prime factors. The number 1 is excluded, as it is not the product of any primes. The term "semiprime" derives from "semi-" combined with "prime" and is used in number theory to describe such numbers with exactly two prime factors, counting multiplicity.

Types

Semiprimes can be classified based on whether their prime factors are identical or distinct, as well as by their parity and square-freeness. A square semiprime is the square of a prime number, denoted as n = p^2 where p is prime; examples include 4 ($2^2), 9 ($3^2), and 25 ($5^2). These form the sequence of prime squares, cataloged in OEIS A001248. In contrast, a non-square semiprime, also known as a distinct or discrete semiprime, is the product of two distinct primes, n = p \times q with p \neq q and both prime. Examples include 6 ($2 \times 3), 10 ($2 \times 5), and ($3 \times 5). These are precisely the square-free semiprimes, meaning they have no squared prime factors, and they constitute the sequence in OEIS A006881. Semiprimes can further be categorized by . An even semiprime is divisible by 2, which implies one of its prime factors must be 2, yielding forms like $2 \times p where p is an odd prime (or $2^2 = 4 for the square case); representative examples are 6, 10, and 14. Conversely, an odd semiprime has both prime factors odd, resulting in products like p \times q with p and q odd primes (or p^2 for odd p); examples include , 21 ($3 \times 7), and 25.

Examples

Small Semiprimes

The smallest semiprimes are the natural numbers greater than 1 that have exactly two prime factors, counted with multiplicity, denoted by the condition \Omega(n) = 2, where \Omega(n) is the total number of prime factors of n (with repetition). This includes both squares of primes (p^2) and products of two distinct primes (p \times q). The sequence of semiprimes begins with 4, 6, 9, 10, and continues, with all terms up to 100 listed below along with their factorizations. Among these, even semiprimes except for 4 are all of the form $2 \times p, where p is an odd prime, since any even number greater than 2 must include 2 as a factor and, to remain a semiprime, the cofactor must be prime. The density of semiprimes appears to increase initially in this range, with 34 such numbers up to 100, illustrating their relative frequency among small composites.
SemiprimeFactorization
4$2^2
6$2 \times 3
9$3^2
10$2 \times 5
14$2 \times 7
15$3 \times 5
21$3 \times 7
22$2 \times 11
25$5^2
26$2 \times 13
33$3 \times 11
34$2 \times 17
35$5 \times 7
38$2 \times 19
39$3 \times 13
46$2 \times 23
49$7^2
51$3 \times 17
55$5 \times 11
57$3 \times 19
58$2 \times 29
62$2 \times 31
65$5 \times 13
69$3 \times 23
74$2 \times 37
77$7 \times 11
82$2 \times 41
85$5 \times 17
86$2 \times 43
87$3 \times 29
91$7 \times 13
93$3 \times 31
94$2 \times 47
95$5 \times 19

Notable Examples

1 is excluded from the class of semiprimes, as it is not the product of two prime numbers; semiprimes require exactly two prime factors, counting multiplicity, and 1 has none. The smallest odd semiprime with distinct prime factors is = 3 × 5, marking an early historical example in the study of composite numbers beyond even semiprimes like 4 = 2 × 2 or 6 = 2 × 3. In puzzles and primality testing, semiprimes like 91 = 7 × 13 serve as notable examples of Fermat pseudoprimes; specifically, 91 is a pseudoprime to base 3, satisfying 3^{90} ≡ 1 (mod 91) despite being composite, which highlights their role in deceiving certain primality tests. In contrast, the first , 561 = 3 × 11 × 17, is a product of three primes and passes Fermat's test for all bases coprime to it, but semiprimes like 91 illustrate similar deceptive behavior for specific bases. Semiprimes appear infrequently as Mersenne numbers M_n = 2^n - 1, but notable cases include M_{11} = 2047 = 23 \times 89, the smallest Mersenne number that is a to base 2, and M_4 = 15 = 3 \times 5, the smallest such semiprime overall. Other indices yielding Mersenne semiprimes include 9 ($511 = 7 \times 73), 23 ($8388607 = 47 \times 178481), and 37, underscoring their rarity and utility in studying composite Mersenne forms. Among large-scale records, the RSA-250 semiprime, a 250-decimal-digit number (~829 bits) from the , represents a milestone as the largest such semiprime fully factored to date (as of 2025), achieved in February 2020 using the general number field sieve after approximately 2700 core-years of computation; its prime factors are two 125-digit primes, demonstrating the practical limits of classical factoring algorithms.

Properties

Arithmetic Properties

A semiprime n = p q, where p and q are primes (not necessarily distinct), exhibits specific divisibility properties determined by its prime factorization. If n is square-free, meaning p \neq q, then the positive divisors of n are exactly $1, p, q, and pq, yielding precisely four divisors. In contrast, if n is the square of a prime, so n = p^2, the divisors are $1, p, and p^2, resulting in exactly three divisors. These counts distinguish semiprimes from primes (two divisors) and numbers with more prime factors (more than four divisors for square-free cases). The sum of divisors function \sigma(n), which sums all positive divisors of n, takes a straightforward form for semiprimes due to the multiplicativity of \sigma. For a square-free semiprime n = p q with distinct primes p and q, \sigma(n) = (1 + p)(1 + q). For a prime square n = p^2, \sigma(n) = 1 + p + p^2. These expressions arise directly from the sum for each factor. Euler's totient function \phi(n), counting the integers up to n that are coprime to n, is also multiplicative and simplifies for semiprimes. For n = p q with p \neq q, \phi(n) = (p - 1)(q - 1). When n = p^2, \phi(n) = p(p - 1). These formulas reflect the exclusion of multiples of p and q from the count of coprimes. The greatest common divisor (GCD) and least common multiple (LCM) of a semiprime with another integer follow from their prime factorizations. For two square-free semiprimes n = p q and m = r s with all distinct primes, \gcd(n, m) = 1 and \operatorname{lcm}(n, m) = p q r s. If they share one prime, say p = r but q \neq s, then \gcd(n, m) = p and \operatorname{lcm}(n, m) = p q s. In general, \gcd(n, m) is the product of the shared prime factors raised to the minimum exponent, while \operatorname{lcm}(n, m) uses the maximum exponents. Semiprimes are not closed under : the product of two semiprimes is generally not a semiprime. For instance, the product of two square-free semiprimes n = p q and m = r s (all distinct primes) equals p q r s, which has four distinct prime factors and thus more than two. Even if some primes coincide, the result typically has more than two prime factors counting multiplicity, unless specifically arranged to reduce to exactly two.

Analytic Properties

Semiprimes are asymptotically equidistributed between the odd residue classes modulo 4, with the number ≤ x congruent to 1 mod 4 and to 3 mod 4 each ∼ (1/2) x (log log x) / log x. While temporary biases may occur due to the distribution of primes, the leading asymptotics show no disparity. More generally, semiprimes ≤ x are asymptotically equidistributed among the residue classes a mod q with gcd(a, q) = 1, each with asymptotic ∼ [1/φ(q)] x (log log x) / log x. A direct link exists between primes and semiprimes: if p is a prime (i.e., both p and $2p + 1 are prime), then the product p(2p + 1) is a semiprime. This construction yields specific semiprimes where the factors are related by the doubling relation, and such products appear in studies of prime chains and Cunningham chains of length 2. Semiprimes can behave like primes under certain probabilistic tests, notably as s. A n is a to base b if b^{n-1} \equiv 1 \pmod{n}, despite n not being prime; the smallest such semiprime is 341 = 11 × 31, which satisfies $2^{340} \equiv 1 \pmod{341}. These instances arise when the factors of the semiprime share compatible orders in the , fooling the Fermat test and illustrating analytic similarities to primes in . The density of semiprimes in arithmetic progressions follows from extensions of the , with positive asymptotic density in progressions a \pmod{q} where \gcd(a, q) = 1. This mirrors the equidistribution of primes but scaled by the semiprime counting function \pi_2(x) \sim \frac{x \log \log x}{\log x}, first established by Landau. Landau's foundational work on this asymptotic underpins related unsolved problems, such as the infinitude of primes in certain forms that influence semiprime distributions.

Enumeration

Counting Formulas

The number of semiprimes less than or equal to a given positive x, denoted \pi_2(x), can be exactly determined using the \pi(y), which gives the number of primes less than or equal to y. The formula is \pi_2(x) = \sum_{\substack{p \prime \\ p \le \sqrt{x}}} \left( \pi\left( \frac{x}{p} \right) - \pi(p-1) \right), where the sum is taken over all prime numbers p \le \sqrt{x}. This expression arises from counting the products p q \le x where p and q are primes with p \le q. For each fixed prime p \le \sqrt{x}, the number of suitable q \ge p is the number of primes in the interval [p, x/p], which is \pi(x/p) - \pi(p-1). The formula naturally includes the prime squares p^2 \le x, as each such square is counted when q = p in the term for that p; the total number of such squares is \pi(\sqrt{x}). The enumeration of semiprimes, including this exact counting formula, was first systematically studied by in his 1909 monograph Handbuch der Lehre von der Verteilung der Primzahlen. For practical computation of \pi_2(x), especially for moderate x, sieve methods are effective. First, generate all primes up to x using the . Then, to count semiprimes, initialize an array of size x+1 to zero and, for each prime p, iterate over primes q \ge p such that p q \le x, incrementing the array at position p q. The number of non-zero entries in the array up to x (or specifically those marked exactly once, ensuring no overcounting from multiple representations) gives \pi_2(x). Alternatively, a modified sieve can track the number of prime factors for each number up to x, counting those with exactly two (counting multiplicity for squares). These methods have O(x \log \log x). Recurrence relations for \pi_2(x) are less common, but the itself allows recursive if \pi(y) values are precomputed or approximated for smaller y, leveraging known recurrences or tabulations for the . The following table provides computed values of \pi_2(x) for small x using the exact :
x\pi_2(x)
104
10034
1000299
$10^42625
These values establish the scale of semiprime distribution for small limits; for x = 10^6, \pi_2(x) = 210035.

Distribution

The number of semiprimes not exceeding x, denoted \pi_2(x), satisfies the asymptotic formula \pi_2(x) \sim \frac{x \log \log x}{\log x} as x \to \infty. This result was first established by in 1909. Semiprimes have zero among the natural numbers, since \pi_2(x)/x \sim (\log \log x)/\log x \to 0 as x \to \infty. However, their growth rate exceeds that of the primes for sufficiently large x, as the \pi(x) \sim x / \log x is asymptotically smaller by a factor of \log \log x. The average gap between consecutive semiprimes up to x is approximately \log x / \log \log x. Refinements to the asymptotic for \pi_2(x) remain an active area of , particularly concerning exact terms. Current bounds on the in \pi_2(x) derive from those in the , such as |\pi(x) - \mathrm{li}(x)| \leq d_1 x (\log x)^{3/4} \exp(-d_2 \sqrt{\log x}) for explicit constants d_1, d_2 > 0. Under the , sharper estimates like |\pi(x) - \mathrm{li}(x)| < \sqrt{x} \log x / (8\pi) yield improved terms for \pi_2(x), though the precise connection to the hypothesis for semiprimes is unresolved.

Applications

In Cryptography

Semiprimes play a pivotal role in public-key cryptography, most notably in the RSA cryptosystem introduced by Rivest, Shamir, and Adleman in 1978. In RSA, the public modulus n is constructed as the product of two large, distinct prime numbers p and q, forming a semiprime whose factorization is computationally infeasible with current classical algorithms. The security of the system hinges on this hardness: while encryption and decryption rely on the ease of exponentiation modulo n, an adversary who factors n into p and q can compute the private key and decrypt messages. Key generation in RSA involves selecting p and q such that they are of comparable bit length to ensure balanced difficulty in factoring, typically producing an n of around 2048 bits to meet security standards as of 2025. According to NIST guidelines, a 2048-bit modulus provides at least 112 bits of security, sufficient for many applications through the mid-2020s, though migration to 3072 bits or larger is recommended by 2030 for sustained protection against advances in factoring. Trial division attacks, which test divisibility by small primes up to \sqrt{n}, become utterly impractical for such sizes, requiring on the order of $2^{1024} operations for a 2048-bit n. Instead, probabilistic methods like Pollard's rho algorithm, developed in 1975, are employed for potential factorization; it uses a pseudorandom sequence to detect cycles and find factors with expected time complexity O(\sqrt{{grok:render&&&type=render_inline_citation&&&citation_id=4&&&citation_type=wikipedia}}{n}), but remains infeasible for well-chosen large semiprimes due to the immense runtime on classical hardware. The historical factorization of RSA-129 in 1994 underscored both the resilience and evolving challenges of semiprime-based security. This 129-decimal-digit (approximately 426-bit) semiprime, part of an early challenge, was factored after eight months of distributed computation using the algorithm across over 1,600 workstations worldwide, revealing a 79-digit and a 77-digit . This event highlighted the practical hardness of semiprimes at the time but also spurred improvements in factoring techniques, prompting larger key sizes in subsequent deployments. Looking ahead, poses an existential threat to semiprime-based systems like through , proposed in 1994. This quantum routine efficiently factors semiprimes in polynomial time by finding the period of a related to n, potentially breaking 2048-bit on a sufficiently large, fault-tolerant quantum computer with thousands of logical qubits. While no such device exists as of 2025, the algorithm has driven the development of standards to safeguard against this vulnerability.

In Factoring and Computation

Factoring semiprimes is a central problem in , where the goal is to decompose a semiprime n = p \times q into its prime factors p and q. This task is known to be in both and , but it is neither known to be solvable in time (in ) nor NP-complete, leading to the widespread belief that it is . For large semiprimes with balanced prime factors, efficient factorization relies on advanced general-purpose algorithms. The quadratic sieve, introduced by Carl Pomerance in 1984, is effective for semiprimes up to about 100 digits by finding smooth quadratic residues modulo n to construct relations for linear algebra over the factor base. For even larger semiprimes exceeding 100 digits, the general number field sieve (GNFS) is the state-of-the-art method, leveraging algebraic number fields to sieve for smooth values in both rational and algebraic integers, achieving subexponential time complexity of approximately \exp(c (\log n)^{1/3} (\log \log n)^{2/3}) for constant c \approx 1.923. Certain structural properties of semiprimes allow for faster using specialized techniques. If one prime factor is small relative to n, trial division—systematically testing divisibility by primes up to \sqrt{n}—can efficiently identify it, though optimizations like the wheel reduce the number of trials. When the two prime factors are close in value (i.e., |p - q| is small), exploits the identity n = ((p+q)/2)^2 - ((p-q)/2)^2 by searching for nearby squares whose difference yields n. The , launched by Laboratories in 1991, provided monetary incentives for factoring specific large semiprimes known as , ranging from 100 to 1024 bits, to benchmark progress in . The challenge was discontinued in 2007 due to advances in and the reduced publicity value of publicized breaks. Despite its end, informal efforts persist, with researchers continuing to factor remaining to push computational boundaries. As of 2025, the largest semiprime factored using general-purpose classical algorithms is RSA-250, a 829-bit (250-digit) number, achieved in February by an international team using the GNFS on a requiring approximately 2,700 core-years of computation. Practical implementations of these algorithms are available in suites. Msieve provides an optimized implementation of the and early NFS variants, suitable for semiprimes up to around 80 digits on modest hardware. CADO-NFS, developed by a collaboration including INRIA, offers a complete, parallelized GNFS framework for factoring semiprimes beyond 100 digits, incorporating advanced sieving and linear algebra phases.

References

  1. [1]
    Semiprime -- from Wolfram MathWorld
    A semiprime is a composite number that is the product of two (possibly equal) primes. Examples include 4, 6, 9, 10, 14, 15, 21, 22.
  2. [2]
    [PDF] On the counting function of semiprimes - People
    A semiprime is a number that can be written as the product of two primes. The function π2(x) counts semiprimes less than or equal to x.
  3. [3]
    New Semi-Prime Factorization and Application in Large RSA Key ...
    Semi-prime factorization is an increasingly important number theoretic problem, since it is computationally intractable. Further, this property has been ...
  4. [4]
    [PDF] About Efficient Algorithm for Factoring Semiprime Number
    Sep 8, 2021 · The complexity needed to factor large semiprime numbers is in the heart of public key cryptography. It is very important to identify cases ...
  5. [5]
    A001358 - OEIS
    These numbers are sometimes called semiprimes or 2-almost primes. Numbers n such that Omega(n) = 2 where Omega(n) = A001222(n) is the sum of the exponents in ...
  6. [6]
    semiprime - Wiktionary, the free dictionary
    semiprime (plural semiprimes). (number theory) A natural number that is the product of two (not necessarily distinct) prime numbers.<|separator|>
  7. [7]
  8. [8]
    Levy's conjecture - PlanetMath.org
    Mar 22, 2013 · Conjecture (Émile Lemoine). All odd integers greater than 5 can be represented as the sum of an odd prime and an even semiprime.<|control11|><|separator|>
  9. [9]
    Prime Factor -- from Wolfram MathWorld
    lambda(n)=(-1)^(Omega(n)) is known as the Liouville function. The number of distinct prime factors of a number n is denoted omega(n) (Hardy and Wright 1979, p.
  10. [10]
    How to show that 91 is a pseudoprime to the base 3?
    Sep 27, 2011 · The given problem: Use Lemma 2.3.3 together with Fermat's little theorem to show that 91 is a pseudoprime to the base 3.How do I prove that that 91 is/is not a pseudoprime to base 2Prove that 91 is pseudoprime to base b. - Math Stack ExchangeMore results from math.stackexchange.comMissing: semiprime | Show results with:semiprime
  11. [11]
    Mersenne Number -- from Wolfram MathWorld
    The indices of Mersenne numbers that give semiprimes are 4, 9, 11, 23, 37, 41, 49, 59, 67, 83, ... (OEIS A085724). As of 2022, the largest known indices ...
  12. [12]
    Comparing the difficulty of factorization and discrete logarithm: a 240 ...
    Jun 10, 2020 · We report on two new records: the factorization of RSA-240, a 795-bit number, and a discrete logarithm computation over a 795-bit prime field.
  13. [13]
    Semiprimes - OeisWiki
    Jul 14, 2012 · Semiprimes are composite numbers with exactly two prime factors. If the prime factors of a semiprime are distinct, then the semiprime is squarefree.Missing: etymology | Show results with:etymology<|control11|><|separator|>
  14. [14]
    Divisor Function -- from Wolfram MathWorld
    The divisor function sigma_k(n) for n an integer is defined as the sum of the kth powers of the (positive integer) divisors of n, sigma_k(n)=sum_(d|n)d^k.
  15. [15]
    formula for sum of divisors - PlanetMath
    Mar 22, 2013 · ∑d∣nd=k∏i=1pmi+1i−1pi−1. ∑ d ∣ n d = ∏ i = 1 k p i m i + 1 - 1 p i - 1 . If we want only proper divisors, we should not include n in the sum, ...
  16. [16]
    Euler's totient function - Algorithms for Competitive Programming
    Dec 30, 2024 · $\phi(n)$, counts the number of integers between 1 and inclusive, which are coprime to . Two numbers are coprime if their greatest common divisor equals.
  17. [17]
    Sophie Germain Prime -- from Wolfram MathWorld
    A prime p is said to be a Sophie Germain prime if both p and 2p+1 are prime. The first few Sophie Germain primes are 2, 3, 5, 11, 23, 29, 41, 53, 83, 89,
  18. [18]
    [PDF] Fermat Pseudoprimes and Carmichael Numbers 1. Introduction
    Example: The number n = 645 is a Fermat pseudoprime to the base b = 2 since 2644 ≡ 1 mod 645, as can be shown using methods from class. Note that 645 = 3 · 5 · ...Missing: semiprime | Show results with:semiprime
  19. [19]
    [PDF] Landau's problems on primes - Numdam
    The work of Maier and Pomerance relied on deep analytic results about the distribution of generalized twin primes in arithmetic progressions. Finally, the work ...Missing: semiprimes | Show results with:semiprimes
  20. [20]
    Count the semiprime numbers in the given range [a..b]
    Dec 23, 2018 · Use the usual sieve to get the prime numbers up to N. Use the prime number to get semi-prime numbers up to N. You can do this by checking ...
  21. [21]
    Semiprimes up to 1000 - Prime Numbers
    Semiprimes: Semiprime is a natural number that is the product of two prime numbers. There is 299 semiprimes smaller than 1000.
  22. [22]
    Can you derive a formula for the semiprime counting function from ...
    Jun 20, 2014 · Setting k=2 gives us π2(x)∼xloglogxlogx. This comes from Landau's Handbuch der Lehre von der Verteilung der Primzahlen. It is way off at first, ...Does there exist an approximate formula which can calculate the ...Question on (Semi) Prime Counting Functions - Math Stack ExchangeMore results from math.stackexchange.com
  23. [23]
    [PDF] A Method for Obtaining Digital Signatures and Public-Key ...
    R.L. Rivest, A. Shamir, and L. Adleman. ∗. Abstract. An encryption method is presented with the novel property that publicly re- vealing an encryption key ...Missing: semiprime | Show results with:semiprime
  24. [24]
  25. [25]
    [PDF] Algorithms for Quantum Computation: - Discrete Log and Factoring
    This paper gives algorithms for the discrete log and the factoring problems that ... have been proposed, and the RSA public key cryptosystem [RSA], based on the ...Missing: original | Show results with:original
  26. [26]
    Reducing the integer factorization problem to an NP-Complete ...
    Nov 10, 2012 · Just to be absolutely clear, Integer Factorization is not known to be NP-intermediate, just suspected to be based on the lack of either NP- ...Why is FACTOR in Co-NP? - Computer Science Stack ExchangeWhat are the current known implications of the complexity of Integer ...More results from cs.stackexchange.com
  27. [27]
    Problems known to be in both NP and coNP, but not known to be in P
    Jul 14, 2010 · Integer factorization can be converted into decision problem: given n and k return YES if k-th bit of the smallest prime divisor of n is ...Evidence for integer factorization is in $P$ - MathOverflowWhy is integer factoring hard while determining whether an integer ...More results from mathoverflow.netMissing: credible | Show results with:credible
  28. [28]
    [PDF] The Quadratic Sieve Factoring Algorithm - Computer Science
    Dec 14, 2001 · For example, when RSA-129 was factored in 1994, a factor base of 524,339 primes was used. Some notes about components of the running time first.
  29. [29]
    [PDF] A Beginner's Guide To The General Number Field Sieve - UMD CS
    The General Number Field Sieve is an example of just such an advanced factoring algorithm. This is currently the best known method for factoring large numbers.
  30. [30]
    [PDF] An Introduction to the General Number Field Sieve - Virginia Tech
    Apr 17, 1998 · The General Number Field Sieve (GNFS) is the fastest known method for factoring “large” integers, where large is generally taken to mean over ...
  31. [31]
    [PDF] Cracking RSA with Various Factoring Algorithms - UMD CS
    Oct 2, 2020 · The runtime of Pollard Rho is proportional to the square root of input semiprime M. Depending on the implementation, failure may be returned by ...
  32. [32]
    A modified Fermat factoring algorithm to allow initial guess of $P
    Mar 26, 2025 · The question has been modified to specialize on Fermat factorization. In a nutshell, that algorithm is not suitable for factoring RSA semiprimes ...When is factoring semi-primes thought to be hard?Is there an algorithm for factoring N, which is just as simple as this ...More results from crypto.stackexchange.com
  33. [33]
    Projects - distributed.net
    Mar 11, 2015 · RSA Labs previously sponsored a series of challenges to factor successively larger numbers, each with an increasing prize amount. However, they ...
  34. [34]
    Progress in general purpose factoring - AI Impacts
    It claims that 106 digits had been factored by 1988, which implies that the early RSA challenge numbers were not state of the art.
  35. [35]
    Integer Factoring Records
    General-purpose Algorithms: the largest integer factored with a general-purpose algorithm is RSA-250 (250 decimal digits), which was factored on February 28 ...Missing: current semiprime 2025
  36. [36]
    upiter/msieve: MSIEVE: A Library for Factoring Large Integers - GitHub
    CADO-NFS is a complete NFS suite that includes state-of-the-art (or nearly so) implementations of all phases of the Number Field Sieve. The sieving tools in ...
  37. [37]
    CADO-NFS
    Mar 15, 2024 · CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers and computing discrete logarithms in finite ...