Factorization of Large Numbers via Factorization of Small Numbers

Size: px
Start display at page:

Download "Factorization of Large Numbers via Factorization of Small Numbers"

Transcription

1 Global Journal of Pure and Applied Mathematics. ISSN Volume, Number 6 (6), pp Research India Publications Factorization of Large Numbers via Factorization of Small Numbers Xingbo Wang Department of Mechatronics Foshan University, Foshan City, Guangdong Province, PRC, 58 Abstract The article puts forward an elementary, easily-applicable and parallelable approach to factorize big odd composite numbers. The approach can turn factorization of a big odd composite number into factorization of certain small numbers. Mathematical deductions are exhibited in detail and numerical experiments are presented via factorization of the Mersenne numbers and Fermat numbers. Experiments show that, the more factors the big number contains, the faster the approach works. Keywords: Integer factorization; Odd composite number; Multiplication table; Algorithm MSC : A5,A5. INTRODUCTION Factorization of big integers has been a key topic in the field of number theory and cryptography. To meet the demands of information security, factorizing a big number still attracts a lot of researchers to contribute their efforts in developing kinds of approaches, as summarized in literatures [] to [4]. Among the various approaches, the multiplication-table based one is most easilyunderstood and easily-applicable. This was demonstrated by Jongsoo Park and Mathology Sys in their paper[5], as well as in WANG's paper[6]. This article, as a following work of the paper[6], makes a further investigation on multiplication-table based and tail-dependent factorization of odd composite numbers in a way that taking both the tail (the ones-digit) and the form (in term of 6n ) of a odd composite number into account. It first proves several equivalent relations between an odd composite number and its factors through their tails that are subordinate to the

2 558 Xingbo Wang multiplication-table, then digs out a transitional law among odd composite numbers of same form with the same tail, and then designs a parallelable algorithm that factorizes a big odd number by factorizing a certain small one.. PRELIMINARIES. Definitions and Notations In this whole article, symbol Z denotes all the positive integers and symbol Z denotes the positive integers together with. Symbol A Bmeans that result B is derived from condition A; symbol x Z means there exists an x in set Z +. Let k k integer n s decimal representation be n nk nk... n n ( nk nk... nn ) then the unit s digit n is called tail of n. This whole article only concerns integer s decimal representation. Symbol a b means b can be divided by a; symbol ( ab, ) and [ abare, ] to express respectively the greatest common divisor (GCD) and the least common multiple (LCM) of integers a and b. Suppose a set S is composed of elements s, s,..., namely, S { s, s,...} ; then symbol Ssmeans. i the i th term s i of S. In this whole article, odd number means that is bigger than 3 and are of the form 6k (k>)unless special remark is made.. Lemmas Lemma.. An arbitrary non-negative integers N can be expressed by N 6 n r, r 5, and an odd number bigger than 3 must be of the form either N 6n or N 6n, where n Z. If N is of the form 6n+ then so it is with N+6 for arbitrary integer ; if N is of the form 6n+ then so it is with N 6 for arbitrary integer n. If N is of the form 6n then so it is with N+6 for arbitrary integer ; if N is of the form 6n then so it is with N 6 for arbitrary integer n. Lemma. If N=(6k+)(6l+) is composite, then N6(6l+), N6(6k+) are all composite numbers for <k, <l. If N=(6k-)(6l-) is composite, then N6(6l-), N+6(6k-) are all composite numbers, for <k, <l. If N=(6k+)(6l-) is composite, then N+6(6l-), N+6(6k+) are all composite numbers, for <k, <l. Lemma.3. Integer n s decimal tail is n if and only if n n (mod). Lemma.4. The following statements on odd number N >3 are true for n k Z. (i) N is of the form 6n with tail if and only if it is of the form 3k 3. (ii) N is of the form 6n with tail 3 if and only if it is of the form 3k 3. (iii) N is of the form 6n with tail 7 if and only if it is of the form 3k 7. Z and

3 Factorization of Large Numbers via Factorization of Small Numbers 559 (iv) N is of the form 6n with tail 9 if and only if it is of the form 3k 9. (v) N is of the form 6n with tail if and only if it is of the form 3k. (vi) N is of the form 6n with tail 3 if and only if it is of the form 3k 3. (vii) N is of the form 6n with tail 7 if and only if it is of the form 3k 7. (viii) N is of the form 6n with tail 9 if and only if it is of the form 3k 9. Proof. Take the cases (i) and (vi) as examples. (i) Sufficiency. Let x3k 3; then it is of course of the form 6n under the condition of n Z and k Z. Note that, x 3(mod3) x 3(mod3) x (mod5), x (mod 6); x (mod3), x (mod) By Lemma.3, the sufficiency holds. Necessity. By Lemma.4, odd number N 6n with tail leads to N (mod) Hence 6n m 3n 5m. Since n Z and (3,5), it yields n 5 s, m 3 t, s Z, t Z. Consequently, N 3s 3k 3with k Z. (vi) Let N 6nwith tail 3; then N 3(mod) 6n m 3 3n 5m n 4 5 t, m 3t 6n 6(4 5 t) 3t 3 Lemma.5. Suppose m, n, s and t be non-negative integers; then N (3 m s)(3 n t) is of the form 3k if and only if st (mod3). Proof. N (3 m s)(3 n t) 3 mn 3tm 3sn st 3(3 mn tm sn) st Sufficiency. st (mod3) st 3u N 3(3 mn tm sn u) 3k. Necessity. N (3 m s)(3 n t) being of the form 3k results in N (mod3) 3(3 mn tm sn) st (mod3) st (mod3) ( st, ) Lemma.6. Let M m s n t where m, n, s and t are non-negative integers; if ( mn, ) (3 )(3 ) st (mod3) then for arbitrary q Z, it hold Proof.(Omitted) ( st, ) ( st, ) M( mn, ) 3 q (mod3), M( m q, n) (3( m q) s)(3 n t) (mod3) and ( st, ) M( m, nq) (3 m s)(3( n q) t) (mod3).

4 56 Xingbo Wang 3. MAIN RESULTS AND PROOFS Main results presented in this section include four parts. The first part is to show characteristics of factors in odd composite numbers 6n, the second is to construct sieves to select the odd composite numbers 6n according to the numbers tails, the third is to introduce a general approach to factorize an odd composite number according to the number s tail, and the fourth is to show the approach to factorize big odd composite numbers through factorization of certain small ones. 3. Factors in Odd Composite Numbers 6n Theorem 3.. Let N=6n+ be a composite number; then for certain s, t Z, N can be factorized into one of the following forms that are given in (3.), (3.), (3.3) and (3.4) in accordance with its tail being,3,7 or 9, respectively. m (3s 7)(3t 3) m (3s 3)(3t 7) m3 (3s 9)(3t 9) m4 (3s 3)(3t 3) ; s, t Z m5 (3s )(3t ) m6 (3s 7)(3t 3) m7 (3s 3)(3t 7) m8 (3s 9)(3t 9) m3 (3s 9)(3t 7) m3 (3s 7)(3t 9) m33 (3s 3)(3t 3) m34 (3s 3)(3t 3) ; s, t Z m35 (3s 3)(3t ) m36 (3s )(3t 3) m37 (3s 9)(3t 7) m38 (3s 7)(3t 9) m7 (3s 3)(3t 7) m7 (3s 7)(3t 3) m73 (3s 9)(3t 3) m74 (3s 3)(3t 9) ; s, t Z m75 (3s 7)(3t ) m76 (3s )(3t 7) m77 (3s 9)(3t 3) m78 (3s 3)(3t 9) m9 (3s 7)(3t 7) m9 (3s 3)(3t 3) m93 (3s 3)(3t 9) m94 (3s 9)(3t 3) ; s, t Z m95 (3s 7)(3t 7) m96 (3s 3)(3t 3) m97 (3s 9)(3t ) m98 (3s )(3t 9) (3.) (3.) (3.3) (3.4)

5 Factorization of Large Numbers via Factorization of Small Numbers 56 where the upper index + means the factorization is corresponding to N 6n and the first lower index i,3,7,9 means N is tailed by i, and the second lower index j,,...,8 means the j th one of the 8 possible factorizations. Proof. Here only take N of tail as an example. Let N ab with a, b Z. Since N is an odd composite number of the form 6n+, by Lemma, there are two possible cases matching to a and b. (i) a 6k and b6l, k, l Z ; (ii) a6kand b6l, k, l Z. By Lemma.4, pair (a, b) in case (i) satisfy ( a, b) {(3x 7,3 y 3),(3 x 3,3 y 7),(3x 9,3 y 9),(3 x 3,3 y 3) x, y Z } Hence the product N (6k )(6 l ) with tail must be in the set P given by P x y x y x y x y x y Z {(3 7,3 3),(3 3,3 7),(3 9,3 9),(3 3,3 3), } Similarly, the product N (6k )(6 l ) with tail must be in the set P given by P x y x y x y x y x y Z {(3,3 ),(3 7,3 3),(3 3,3 7),(3 9,3 9), } Theorem 3.. Let N be an odd composite number of the form 6n-with tail, 3,7 and 9; then for certain s, t Z, N can be factorized into one of the following forms that are given in (3.5), (3.6), (3.7) and (3.8) in accordance with its tail being,3,7 or 9, respectively. m (3s 3)(3t 7) m (3s 7)(3t 3) m3 (3s 7)(3t 3) m4 (3s 3)(3t 7) ; s, t Z m5 (3s 9)(3t 9) m6 (3s 9)(3t 9) m7 (3s )(3t 3) m8 (3s 3)(3t ) m3 (3s 9)(3t 7) m3 (3s 7)(3t 9) m33 (3s )(3t 3) m34 (3s 3)(3t ) ; s, t Z s35 (3s 7)(3t 9) m36 (3s 9)(3t 7) m37 (3s 3)(3t 3) m38 (3s 3)(3t 3) (3.5) (3.6)

6 56 Xingbo Wang m7 (3s )(3t 7) m7 (3s 7)(3t ) m73 (3s 9)(3t 3) m74 (3s 3)(3t 9) ; s, t Z m75 (3s 3)(3t 9) m76 (3s 9)(3t 3) m77 (3s 7)(3t 3) m78 (3s 3)(3t 7) (3.7) m9 (3s 7)(3t 7) m9 (3s 7)(3t 7) m93 (3s 3)(3t 3) m94 (3s 3)(3t 3) ; s, t Z m95 (3s )(3t 9) m96 (3s 9)(3t ) m97 (3s 9)(3t 3) m98 (3s 3)(3t 9) where the upper index - means the factorization is corresponding to N 6n and the first lower index i,3,7,9 means N is tailed by i, and the second lower index j,,...,8 means the j th one of the 8 possible factorizations. Proof. (Omitted) (3.8) 3. Sieve of Odd Composite Numbers of 6k According to Theorem 3. and 3., each odd composite number has its own form of factorization in correspondence to its tail and in terms of its form of 6n. Therefore a sieve can be constructed by means of that both an odd number's tail and its form of 6n are taken into account. This section constructs such a sieve. First, construct a sieve for odd composite numbers of the form 6k+ with tail by defining set S such that with S { s, s, s, s, s, s, s, s } (3.9) s { x x s ( k ) d, s 5l l 65, d 5(3( l ) 7); l, k Z } s { x x s ( k ) d, s 5l l 65, d 5(3( l ) 3); l, k Z } s3 { x x s ( k ) d, s 5l l, d 5(3( l ) 9); l, k Z } s4 { x x s ( k ) d, s 5l l, d 5(3( l ) 3); l, k Z } s5 { x x s ( k ) d, s 5l l 5, d 5(3( l ) 7); l, k Z } s6 { x x s ( k ) d, s 5l l 5, d 5(3( l ) 3); l, k Z } s7 { x x s ( k ) d, s 5l 9l 6, d 5(3( l ) ); l, k Z } s8 { x x s ( k ) d, s 5l l, d 5(3( l ) 9); l, k Z } Then the following theorem 5 ensures that S form a sieve for odd numbers of the form 6n+ and of the tail. (3.)

7 Factorization of Large Numbers via Factorization of Small Numbers 563 Theorem 3.3. Let S be defined and given by (3.9) and (3.); then (i) odd number 6x ( xs, i,,...,8) is a composite number and is tailed by l ; i (ii) arbitrary odd composite number of the form 6x with tail can find a seed in Proof. (i) Direct calculations yield S. where s3k3 and t 3l 3 6s (3l 3 3k 3 3)(3( l ) 7) (6( s t) 3)(6t 7) 6s (3l 3 3k 3 7)(3( l ) 3) (6( s t) 7)(6t 3) 6s3 (3l 3 3k 3 9)(3( l ) 9) (6( s t) 9)(6t 9) 6s4 (3l 3 3k 3 3)(3( l ) 3) (6( s t) 3)(6t 3) ; k, l Z 6s5 (3l 3 3k 3 3)(3( l ) 7) (6( s t) 3)(6t 7) 6s6 (3l 3 3k 3 7)(3( l ) 3) (6( s t) 7)(6t 3) 6s7 (3l 3 3k 3 )(3( l ) ) (6( s t) )(6t ) 6s8 (3l 3 3k 3 9)(3( l ) 9) (6( s t) 9)(6t 9). (3.) It can immediately see that all the numbers 6x ( xs i, i,,...,8) are composite and are of the form 3n and are of tail. (ii) By Theorem 3, arbitrary odd composite number of the form 6x with tail can be factorized into one of the 8 forms in (3.). Since (3.) is equivalent to (3.), which is derived from S, it is sure that arbitrary odd composite number of the form 6x with tail must find a seed in S. Similarly, with S, S, S, S, S, S and S are constructed as follows. 7 9 S { s, s, s, s, s, s, s, s } (3.) s3 { x x s ( k ) d, s 5l 7l 4, d 5(3( l ) 7); l, k Z } s3 { x x s ( k ) d, s 5l 7l 4, d 5(3( l ) 9); l, k Z } s33 { x x s ( k ) d, s 5l 8l 3, d 5(3( l ) 3); l, k Z } s34 { x x s ( k ) d, s 5l 8l 3, d 5(3( l ) 3); l, k Z } s35 { x x s ( k ) d, s 5l 3l, d 5(3( l ) ); l, k Z } s36 { x x s ( k ) d, s 5l 3l, d 5(3( l ) 3); l, k Z } s37 { x x s ( k ) d, s 5l 7l, d 5(3( l ) 7); l, k Z } s38 { x x s ( k ) d, s 5l 7l, d 5(3( l ) 9); l, k Z } (3.3) S { s, s, s, s, s, s, s, s } (3.4)

8 564 Xingbo Wang with with with with s7 { x x s ( k ) d, s 5l l 4, d 5(3( l ) 7); l, k Z } s7 { x x s ( k ) d, s 5l l 4, d 5(3( l ) 3); l, k Z } s73 { x x s ( k ) d, s 5l 4l 3, d 5(3( l ) 3); l, k Z } s74 { x x s ( k ) d, s 5l 4l 3, d 5(3( l ) 9); l, k Z } s75 { x x s ( k ) d, s 5l 6l 4, d 5(3( l ) ); l, k Z } s76 { x x s ( k ) d, s 5l 6l 4, d 5(3( l ) 7); l, k Z } s77 { x x s ( k ) d, s 5l 4l, d 5(3( l ) 3); l, k Z } s78 { x x s ( k ) d, s 5l 4l, d 5(3( l ) 9); l, k Z } (3.5) S { s, s, s, s, s, s, s, s } (3.6) s9 { x x s ( k ) d, s 5l 3l 88, d 5(3( l ) 7); l, k Z } s9 { x x s ( k ) d, s 5l 7l 48, d 5(3( l ) 3); l, k Z } s93 { x x s ( k ) d, s 5l 5l, d 5(3( l ) 9); l, k Z } s94 { x x s ( k ) d, s 5l 5l, d 5(3( l ) 3); l, k Z } s95 { x x s ( k ) d, s 5l 3l 8, d 5(3( l ) 7); l, k Z } s96 { x x s ( k ) d, s 5l 7l 8, d 5(3( l ) 3); l, k Z } s97 { x x s ( k ) d, s 5l l 3, d 5( 3( l ) ); l, k Z } s98 { x x s ( k ) d, s 5l l 3, d 5(3( l ) 9); l, k Z } (3.7) S { s, s, s, s, s, s, s, s } (3.8) s { x x s ( k ) d, s 5l 5l 7, d 5(3( l ) 7); l, k Z } s { x x s ( k ) d, s 5l 5l 7, d 5(3( l ) 3); l, k Z } s3 { x x s ( k ) d, s 5l 5l 37, d 5(3( l ) 3); l, k Z } s4 { x x s ( k ) d, s 5l 5l 37, d 5(3( l ) 7); l, k Z } s5 { x x s ( k ) d, s 5l 6l, d 5(3( l ) 9); l, k Z } s6 { x x s ( k ) d, s 5l 6l, d 5(3( l ) 9); l, k Z } s7 { x x s ( k ) d, s 5l 9l 3, d 5(3( l ) 3); l, k Z } s8 { x x s ( k ) d, s 5l 9l 3, d 5(3( l ) ); l, k Z } (3.9) S { s, s, s, s, s, s, s, s } (3.) s3 { x x s ( k ) d, s 5l l 4, d 5(3( l ) 7); l, k Z } s3 { x x s ( k ) d, s 5l l 4, d 5(3( l ) 9); l, k Z } s33 { x x s ( k ) d, s 5l 8l 54, d 5(3( l ) 3); l, k Z } s34 { x x s ( k ) d, s 5l 8l 54, d 5(3( l ) ); l, k Z } s35 { x x s ( k ) d, s 5l l 4, d 5(3( l ) 9); l, k Z } s36 { x x s ( k ) d, s 5l l 4, d 5(3( l ) 7); l, k Z } s37 { x x s ( k ) d, s 5l 3l, d 5(3( l ) 3); l, k Z } s38 { x x s ( k ) d, s 5l 3l, d 5(3( l ) 3); l, k Z } (3.) S { s, s, s, s, s, s, s, s } (3.)

9 Factorization of Large Numbers via Factorization of Small Numbers 565 with with s7 { x x s ( k ) d, s 5l l 73, d 5(3( l ) 7); l, k Z } s7 { x x s ( k ) d, s 5l l 73, d 5(3( l ) ); l, k Z } s73 { x x s ( k ) d, s 5l 9l 3, d 5(3( l ) 3); l, k Z } s74 { x x s ( k ) d, s 5l 9l 3, d 5(3( l ) 9); l, k Z } s75 { x x s ( k ) d, s 5l 9l 3, d 5(3( l ) 9); l, k Z } s76 { x x s ( k ) d, s 5l 9l 3, d 5(3( l ) 3); l, k Z } s77 { x x s ( k ) d, s 5l 6l, d 5(3( l ) 3); l, k Z } s38 { x x s ( k ) d, s 5l 6l, d 5(3( l ) 7); l, k Z } (3.3) S { s, s, s, s, s, s, s, s } (3.4) s9 { x x s ( k ) d, s 5l 8l 5, d 5(3( l ) 7); l, k Z } s9 { x x s ( k ) d, s 5l 8l 5, d 5(3( l ) 7); l, k Z } s93 { x x s ( k ) d, s 5l l, d 5(3( l ) 3); l, k Z } s94 { x x s ( k ) d, s 5l l, d 5(3( l ) 3); l, k Z } s95 { x x s ( k ) d, s 5l 5l 35, d 5(3( l ) 9); l, k Z } s96 { x x s ( k ) d, s 5l 5l 35, d 5(3( l ) ); l, k Z } s97 { x x s ( k ) d, s 5 l, d 5(3( l ) 3); l, k Z } s98 { x x s ( k ) d, s 5 l, d 5(3( l ) 9); l, k Z } (3.5) 3.3 General Approach To Factorize Odd Composite Numbers Based on sieves (3.9) to (3.5), new approaches to factorize odd composite numbers can be found as introduced in the following subsections Theorem with Proof Theorem 3.4. Suppose N is an odd composite number; s. s s, s. d are defined in sieves S and S respectively, where,3,7,9 following statements are true. i i s. s,, s, s. d i, j,,...,8 n (i) For N 6nwith tail i if there exists an l such that 5 s. d ( ) N 5. s. d ( n s. s ) n (ii) For N 6nwith tail i if there exists an l such that 5 s. d ( ) N 5. Proof. Taking s 3 as an example, a direct calculation yields s. d n s. s and ; then the, then, then

10 566 Xingbo Wang and s. s 5l 7l 4 3 s3. d 5(3( l ) 7) n k( s3. d) s3. s s3. d n s3. s n k(5(3( l ) 7)) 5l 7l 4; k Z, l Z 6n 6(5l 7l 4 k(5(3( l ) 7))) 3 l 3 34l 3 k(3( l ) 7) 3 (3l 3k )(3( l ) 7) s. d n s. s ( s. d) n s. s (3 l 3 3l 3 ) ( n 5l 7l 4) (5 5) l ( ) l ( n 5 3 4) l ( ) (( )) 455 ( n 5 3 4) ( 5 5) n n 55 5 The other cases are similarly calculated and all the results are list as follows. 6s (3l 3 3k 3)(3( l ) 7) 6s (3l 3 3k 7)(3( l ) 3) 6s3 (3l 3 3k 9)(3( l ) 9) 6s4 (3l 3 3k 3)(3( l ) 3) ; k, l Z 6s5 (3l 3 3k 3)(3( l ) 7) 6s6 (3l 3 3k 7)(3( l ) 3) 6s7 (3l 3 3k )(3( l ) ) 6s8 (3l 3 3k 9)(3( l ) 9) 6s3 (3l 3k 3 9)(3( l ) 7) 6s3 (3l 3k 3 7)(3( l ) 9) 6s33 (3l 3k 3 3)(3( l ) 3) 6s34 (3l 3k 3 3)(3( l ) 3) ; k, l Z 6s35 (3l 3k 3 3)(3( l ) ) 6s36 (3l 3k 3 )(3( l ) 3) 6s37 (3l 3k 3 9)(3( l ) 7) 6s38 (3l 3k 3 7)(3( l ) 9)

11 Factorization of Large Numbers via Factorization of Small Numbers 567 6s7 (3l 3 3k )(3( l ) 7) 6s7 (3l 3k 3 3)(3( l ) 3) 6s73 (3l 3k 3 )(3( l ) 3) 6s74 (3l 3k 3 7)(3( l ) 9) ; k, l Z 6s75 (3l 3k 3 3)(3( l ) ) 6s76 (3l 3k 3 9)(3( l ) 7) 6s77 (3l 3k 3 )(3( l ) 3) 6s78 (3l 3k 3 7)(3( l ) 9) 6s9 (3l 3k 3 3)(3( l ) 7) 6s9 (3l 3k 3 7)(3( l ) 3) 6s93 (3l 3k 3 )(3( l ) 9) 6s94 (3l 3k 3 )(3( l ) 3) ; k, l Z 6s95 (3l 3k 3 3)(3( l ) 7) 6s96 (3l 3k 3 7)(3( l ) 3) 6s97 (3l 3k 3 )(3( l ) ) 6s98 (3l 3k 3 9)(3( l ) 9) 6s (3l 3k 3 7)(3( l ) 7) 6s (3l 3k 3 3)(3( l ) 3) 6s3 (3l 3k 3 3)(3( l ) 3) 6s4 (3l 3k 3 7)(3( l ) 7) ; k, l Z 6s5 (3l 3k 3 )(3( l ) 9) 6s6 (3l 3k 3 )(3( l ) 9) 6s7 (3l 3k 3 9)(3( l ) 3) 6s (3l 3k 3 )(3( l ) ) 8

12 568 Xingbo Wang 6s3 (3l 3k 3 )(3( l ) 7) 6s3 (3l 3k 3 3)(3( l ) 9) 6s33 (3l 3k 3 9)(3( l ) 3) 6s34 (3l 3k 3 7)(3( l ) ) ; k, l Z 6s35 (3l 3k 3 3)(3( l ) 9) 6s36 (3l 3k 3 )(3( l ) 7) 6s37 (3l 3k 3 7)(3( l ) 3) 6s (3l 3k 3 )(3( l ) 3) 38 6s7 (3l 3k 3 9)(3( l ) 7) 6s7 (3l 3k 3 3)(3( l ) ) 6s73 (3l 3k 3 )(3( l ) 3) 6s74 (3l 3k 3 7)(3( l ) 9) ; k, l Z 6s75 (3l 3k 3 7)(3( l ) 9) 6s76 (3l 3k 3 )(3( l ) 3) 6s77 (3l 3k 3 3)(3( l ) 3) 6s (3l 3k 3 )(3( l ) 7) 38 6s9 (3l 3k 3 3)(3( l ) 7) 6s9 (3l 3k 3 3)(3( l ) 7) 6s93 (3l 3k 3 7)(3( l ) 3) 6s94 (3l 3k 3 7)(3( l ) 3) ; k, l Z 6s95 (3l 3k 3 9)(3( l ) 9) 6s96 (3l 3k 3 )(3( l ) ) 6s97 (3l 3k 3 )(3( l ) 3) 6s98 (3l 3k 3 )(3( l ) 9) 3.3. Algorithm and Examples Based on Theorem 3.4, algorithm, which is called Algorithm I, to factorize an odd composite number N can be designed by the following critical steps.

13 Factorization of Large Numbers via Factorization of Small Numbers 569 ==========Algorithm I ============ Step. Judge if N is a multiple of 3; if it is, do N=(N div 3) until N is not a multiple of 3; then go to Step 3. Step. Judge if N is a multiple of 5; if it is, do N=(N div 5) until N is not a multiple of 5; then go to Step 3. Step 3. Judge N s form, 6n+ or 6n-? Step 4. Extract n and the tail i from N; n Step 5. If N=6n+with tail i, find l such that 5 s. d ( n s. s ). n If N=6n-with tail i, find l such that 5 Step 6. If l + s is found, then. d ( ) ( N 6n ) 5 s. d n s. s. ; if l - s is found, then. d ( ) ( N 6n ) Example. Let N ; then N with tail 7. By Theorem 6 it yields shows l 664 and computation 5 l l l l 5999 (3( ) 7995) ( ) hence 7995 (( ) ) 64 Example. Let N ; then N with tail 7. By Theorem 6 it yields l l 6894 and computation shows 5 l l l l 94 (3( ) ) ( ) Hence 7477 (( ) ) 3.4 Approach to Turn Factorization of Big Numbers into Small Ones Theorem 3.4 and Algorithm I provide a general approach to factorize an odd composite number according to the number s tail. The approach can certainly reduce a lot of searching time. However, it can see that the approach is just a little better than that introduced in article [6]. For a very big number, it still costs a lot of time when the big number s factor is also big. This section presents an approach that turns the factorization of big number to small ones.

14 57 Xingbo Wang 3.5. Theorems and Algorithm By Lemma. and.4, it is easy to derive out the following Theorem 3.5. Theorem 3.5 Let m pa and n m 3pb be two odd numbers; then m and n are of the same tail and are of the same form in term of 6n. Seen from (3.) to (3.8), the following Theorem 3.6 holds. Theorem 3.6. Arbitrary composite number of the form 6n can always be a product of the form a( a 6 b) such that N a N 7 (3.6) N b 7 Arbitrary composite number 6n can always be a product of the form a( a 6b ) or a( a 6b 4) N a N 7 N b 7 where symbol means the floor function. Proof. Only for the inequalities. Now consider N 6n and N a( a 6 b). (3.7) 6 ab ( N a ) N a N a 6 a 7 N a N b b 6 7 N a N a a 6 7 N a N b b 6 7 Consider b is mandatory to be in the case of N a, it is reasonable to make it a rule that N a N 7 N b 7

15 Factorization of Large Numbers via Factorization of Small Numbers 57 Similarly, when N 6n, it will have N a N 7 N b 7 Theorem 3.5 and 3.6 directly deduce the following Algorithm II. =============Algorithm II================ Step. Judge if N is a multiple of 3; if it is, do N=(N div 3) until N is not a multiple of 3; then go to Step 3. Step. Judge if N is a multiple of 5; if it is, do N=(N div 5) until N is not a multiple of 5; then go to Step 3. Step 3. Judge N s form, 6n+ or 6n-? Step 4. Extract the tail i of N; Step 5. Let S N 7 Step 6. If N=6n+with tail i, find from X a composite number S such that S S ; If N=6n-with tail i, find from X i a composite number S such that S S ; where i=,3,7,9. Step 7. Judge if N-S is a multiple of 3; if it is not, go to Step 6. Step 8. Calculate g=gcd(s, N-S); if g= go to Step 6; else g N. i Obviously, the selected composite number S is a key element in Algorithm II. Generally speaking, S ought to make it easier to compute GCD(S, N-S). For convenience of programming, S can be produced by X i or X i list in Corollary, which is derived from Theorem 3.

16 57 Xingbo Wang Corollary 3.. The following i Xi i composite number of 6n+ and 6n- with tail i. X and (,3,7,9) X {9t 6t 9,9 t 66t,9 t t 39,9 t 4t 3 36,9 t 74t 84,9 t 86t 96 t Z } respectively produce odd X t t t t t t t 3 { , ,9 53,9 7 38t 493 t Z } X {9t 4t 7,9t 96t 47,9t 84t 87,9t 56t tz } X {9t 4t 49,9t 78t 69,9t 5t 589,9t 56t 899,9t t 89,9t 38t 59,9t t 39 t Z } X {9t 9t 6,9 t 9t,9 t 44t 55,9 t 6t 3 34 tz } X {9t 8t 3,9t 7t 43,9t 8t 33,9t 6t 73 tz } X t t t t t t t t 7 { , , , ,9t 44t 57 t Z } X t t t t t t t t {9 7 9,9 8 99,9 9 9, tz } In addition, it can see that both Algorithm I and Algorithm II are parallelable Numerical Experiments Table shows the results of numerical experiments on some of the Mersenne and Fermat Numbers. The experiments are made via C++ gmp big number library on a PC with a Intel Xeon E545 CPU and 4GB memory. Table is a comparison of Algorithm I, II, III and IV. It indicates that the Algorithm IV is faster than the other three. Table : Experiments on Mersenne and Fermat Numbers N S GCD(S,N-S) Factor of N

17 Factorization of Large Numbers via Factorization of Small Numbers CONCLUSION It is both a traditional approach and a fresh method to find the law of factorization of big odd numbers according to the numbers' tails together with their multipliable relations. In contrast to classical methods of sieves, the approaches introduced in this article are elementary, easily-understood and easily-applicable. Deductions and experiments show that they are valid and could be even faster ones. In addition, their being parallelable traits will make them a wider range of applications. Hope the approaches work better in the future. ACKNOWLEDGEMENTS The research work is supported by the national Ministry of science and technology under project 3GA785, Department of Guangdong Science and Technology under projects 5A345 and 5A4, Foshan Bureau of Science and Technology under projects 6AG3, Special Innovative Projects 4KTSCX56, 4SFKC3 and 4QTLXXM4 from Guangdong Education Department. The authors sincerely present thanks to them all. REFERENCES [] Luke Valenta, Shaanan Cohney, Alex Liao,Joshua Fried, Satya Bodduluri, Nadia Heninger,"Factoring as a Service", IACR Cryptology eprint Archive,5,-9 [] X X Liu,X X Zou and J L Tan, "Survey of large integer factorization algorithms, Application Research of Computers",4,3():3-37 [3] Sonal Sarnaik, Dinesh Gadekar, Umesh Gaikwad, "An overview to Integer factorization and RSA in Cryptography", International Journal For Advance Research In Engineering and [4] technology(ijaret), 4,(IX):-7 [4] D R Brown, "Breaking RSA May Be As Difficult As Factoring", Journal of Cryptology archive,6,9():-4 [5] Jongsoo Park,Mathology Sys, "Prime Sieve and Factorization Using Multiplication Table", Journal of Mathematics Research,,4(3):7- [6] Xingbo WANG,"Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers", IOSR Journal of Mathematics,6,(5):-7

18 574 Xingbo Wang

Algorithm Design and Implementation for a Mathematical Model of Factoring Integers

Algorithm Design and Implementation for a Mathematical Model of Factoring Integers IOSR Journal of Matheatics (IOSR-JM e-iss: 78-578, -ISS: 39-765X. Volue 3, Issue I Ver. VI (Jan. - Feb. 07, PP 37-4 www.iosrjournals.org Algorith Design leentation for a Matheatical Model of Factoring

More information

PRELIMINARIES This section lists for later sections the necessary preliminaries, which include definitions, notations and lemmas.

PRELIMINARIES This section lists for later sections the necessary preliminaries, which include definitions, notations and lemmas. MORE O SQUARE AD SQUARE ROOT OF A ODE O T TREE Xingbo Wang Departent of Mechatronic Engineering, Foshan University, PRC Guangdong Engineering Center of Inforation Security for Intelligent Manufacturing

More information

Series of Integers in Arithmetic Progression with a Common Property of Two Parts of Equal Sums

Series of Integers in Arithmetic Progression with a Common Property of Two Parts of Equal Sums IOSR Journal of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 39-765X. Volume, Issue Ver. III (Mar. - Apr. 06), PP 37-4 www.iosrjournals.org Series of Integers in Arithmetic Progression with a Common Property

More information

4 Number Theory and Cryptography

4 Number Theory and Cryptography 4 Number Theory and Cryptography 4.1 Divisibility and Modular Arithmetic This section introduces the basics of number theory number theory is the part of mathematics involving integers and their properties.

More information

2 Arithmetic. 2.1 Greatest common divisors. This chapter is about properties of the integers Z = {..., 2, 1, 0, 1, 2,...}.

2 Arithmetic. 2.1 Greatest common divisors. This chapter is about properties of the integers Z = {..., 2, 1, 0, 1, 2,...}. 2 Arithmetic This chapter is about properties of the integers Z = {..., 2, 1, 0, 1, 2,...}. (See [Houston, Chapters 27 & 28]) 2.1 Greatest common divisors Definition 2.16. If a, b are integers, we say

More information

Integers and Division

Integers and Division Integers and Division Notations Z: set of integers N : set of natural numbers R: set of real numbers Z + : set of positive integers Some elements of number theory are needed in: Data structures, Random

More information

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory. CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L06, Steve/Courses/2011/S2/CSS322/Lectures/number.tex,

More information

Algorithms. Shanks square forms algorithm Williams p+1 Quadratic Sieve Dixon s Random Squares Algorithm

Algorithms. Shanks square forms algorithm Williams p+1 Quadratic Sieve Dixon s Random Squares Algorithm Alex Sundling Algorithms Shanks square forms algorithm Williams p+1 Quadratic Sieve Dixon s Random Squares Algorithm Shanks Square Forms Created by Daniel Shanks as an improvement on Fermat s factorization

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Spotlight on Science J. Robert Buchanan Department of Mathematics 2011 What is Cryptography? cryptography: study of methods for sending messages in a form that only be understood

More information

Perfect if and only if Triangular

Perfect if and only if Triangular Advances in Theoretical and Applied Mathematics ISSN 0973-4554 Volume 1, Number 1 (017), pp. 39-50 Research India Publications http://www.ripublication.com Perfect if and only if Triangular Tilahun Muche,

More information

Number Theory A focused introduction

Number Theory A focused introduction Number Theory A focused introduction This is an explanation of RSA public key cryptography. We will start from first principles, but only the results that are needed to understand RSA are given. We begin

More information

4 Powers of an Element; Cyclic Groups

4 Powers of an Element; Cyclic Groups 4 Powers of an Element; Cyclic Groups Notation When considering an abstract group (G, ), we will often simplify notation as follows x y will be expressed as xy (x y) z will be expressed as xyz x (y z)

More information

3 The fundamentals: Algorithms, the integers, and matrices

3 The fundamentals: Algorithms, the integers, and matrices 3 The fundamentals: Algorithms, the integers, and matrices 3.4 The integers and division This section introduces the basics of number theory number theory is the part of mathematics involving integers

More information

Efficiency of RSA Key Factorization by Open-Source Libraries and Distributed System Architecture

Efficiency of RSA Key Factorization by Open-Source Libraries and Distributed System Architecture Baltic J. Modern Computing, Vol. 5 (2017), No. 3, 269-274\ http://dx.doi.org/10.22364/bjmc.2017.5.3.02 Efficiency of RSA Key Factorization by Open-Source Libraries and Distributed System Architecture Edgar

More information

Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry. Spring 2006

Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry. Spring 2006 Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry Spring 2006 1 / 1 Computer Science & Engineering 235 Introduction to Discrete Mathematics Sections 2.4 2.6 of Rosen Introduction I When talking

More information

All variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points.

All variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points. Math 152, Problem Set 2 solutions (2018-01-24) All variables a, b, n, etc are integers unless otherwise stated. Each part of a problem is worth 5 points. 1. Let us look at the following equation: x 5 1

More information

Divisibility. Chapter Divisors and Residues

Divisibility. Chapter Divisors and Residues Chapter 1 Divisibility Number theory is concerned with the properties of the integers. By the word integers we mean the counting numbers 1, 2, 3,..., together with their negatives and zero. Accordingly

More information

Applied Cryptography and Computer Security CSE 664 Spring 2017

Applied Cryptography and Computer Security CSE 664 Spring 2017 Applied Cryptography and Computer Security Lecture 11: Introduction to Number Theory Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline What we ve covered so far: symmetric

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a

More information

Optimization of new Chinese Remainder theorems using special moduli sets

Optimization of new Chinese Remainder theorems using special moduli sets Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2010 Optimization of new Chinese Remainder theorems using special moduli sets Narendran Narayanaswamy Louisiana State

More information

Lecture 6: Introducing Complexity

Lecture 6: Introducing Complexity COMP26120: Algorithms and Imperative Programming Lecture 6: Introducing Complexity Ian Pratt-Hartmann Room KB2.38: email: ipratt@cs.man.ac.uk 2015 16 You need this book: Make sure you use the up-to-date

More information

Number Tree LCM HCF Divisibility Rules Power cycle Remainder Theorem Remainder of powers a n b n Last and Second last digit Power of Exponents Euler s

Number Tree LCM HCF Divisibility Rules Power cycle Remainder Theorem Remainder of powers a n b n Last and Second last digit Power of Exponents Euler s Vedic Numbers Number Tree LCM HCF Divisibility Rules Power cycle Remainder Theorem Remainder of powers a n b n Last and Second last digit Power of Exponents Euler s Theorem Fermet s Theory Wilson Theorem

More information

A Guide to Arithmetic

A Guide to Arithmetic A Guide to Arithmetic Robin Chapman August 5, 1994 These notes give a very brief resumé of my number theory course. Proofs and examples are omitted. Any suggestions for improvements will be gratefully

More information

cse547, math547 DISCRETE MATHEMATICS Professor Anita Wasilewska

cse547, math547 DISCRETE MATHEMATICS Professor Anita Wasilewska cse547, math547 DISCRETE MATHEMATICS Professor Anita Wasilewska LECTURE 12 CHAPTER 4 NUMBER THEORY PART1: Divisibility PART 2: Primes PART 1: DIVISIBILITY Basic Definitions Definition Given m,n Z, we say

More information

Cryptography. Number Theory with AN INTRODUCTION TO. James S. Kraft. Lawrence C. Washington. CRC Press

Cryptography. Number Theory with AN INTRODUCTION TO. James S. Kraft. Lawrence C. Washington. CRC Press AN INTRODUCTION TO Number Theory with Cryptography James S Kraft Gilman School Baltimore, Maryland, USA Lawrence C Washington University of Maryland College Park, Maryland, USA CRC Press Taylor & Francis

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

Addition. Ch1 - Algorithms with numbers. Multiplication. al-khwārizmī. al-khwārizmī. Division 53+35=88. Cost? (n number of bits) 13x11=143. Cost?

Addition. Ch1 - Algorithms with numbers. Multiplication. al-khwārizmī. al-khwārizmī. Division 53+35=88. Cost? (n number of bits) 13x11=143. Cost? Ch - Algorithms with numbers Addition Basic arithmetic Addition ultiplication Division odular arithmetic factoring is hard Primality testing 53+35=88 Cost? (n number of bits) O(n) ultiplication al-khwārizmī

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 9 September 30, 2015 CPSC 467, Lecture 9 1/47 Fast Exponentiation Algorithms Number Theory Needed for RSA Elementary Number Theory

More information

7.2 Applications of Euler s and Fermat s Theorem.

7.2 Applications of Euler s and Fermat s Theorem. 7.2 Applications of Euler s and Fermat s Theorem. i) Finding and using inverses. From Fermat s Little Theorem we see that if p is prime and p a then a p 1 1 mod p, or equivalently a p 2 a 1 mod p. This

More information

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 9.1 Chapter 9 Objectives

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

CS March 17, 2009

CS March 17, 2009 Discrete Mathematics CS 2610 March 17, 2009 Number Theory Elementary number theory, concerned with numbers, usually integers and their properties or rational numbers mainly divisibility among integers

More information

= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2

= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2 8. p-adic numbers 8.1. Motivation: Solving x 2 a (mod p n ). Take an odd prime p, and ( an) integer a coprime to p. Then, as we know, x 2 a (mod p) has a solution x Z iff = 1. In this case we can suppose

More information

This is a recursive algorithm. The procedure is guaranteed to terminate, since the second argument decreases each time.

This is a recursive algorithm. The procedure is guaranteed to terminate, since the second argument decreases each time. 8 Modular Arithmetic We introduce an operator mod. Let d be a positive integer. For c a nonnegative integer, the value c mod d is the remainder when c is divided by d. For example, c mod d = 0 if and only

More information

6 SQUARES AND SQUARE ROOTS

6 SQUARES AND SQUARE ROOTS 6 SQUARES AND SQUARE ROOTS Exercise 6.1 Q.1. What will be the unit digit of the squares of the following numbers? (i) 81 (ii) 272 (iii) 799 (iv) 3853 (v) 1234 (vi) 26387 (vii) 52698 (viii) 99880 (ix) 12796

More information

Introduction to Number Theory

Introduction to Number Theory INTRODUCTION Definition: Natural Numbers, Integers Natural numbers: N={0,1,, }. Integers: Z={0,±1,±, }. Definition: Divisor If a Z can be writeen as a=bc where b, c Z, then we say a is divisible by b or,

More information

DICKSON POLYNOMIALS OVER FINITE FIELDS. n n i. i ( a) i x n 2i. y, a = yn+1 a n+1 /y n+1

DICKSON POLYNOMIALS OVER FINITE FIELDS. n n i. i ( a) i x n 2i. y, a = yn+1 a n+1 /y n+1 DICKSON POLYNOMIALS OVER FINITE FIELDS QIANG WANG AND JOSEPH L. YUCAS Abstract. In this paper we introduce the notion of Dickson polynomials of the k + 1)-th kind over finite fields F p m and study basic

More information

Cryptosystem. Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage

Cryptosystem. Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage Cryptosystem Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage f(m). The receiver computes f 1 (f(m)). Advantage: Cannot

More information

Lecture 6: Cryptanalysis of public-key algorithms.,

Lecture 6: Cryptanalysis of public-key algorithms., T-79.159 Cryptography and Data Security Lecture 6: Cryptanalysis of public-key algorithms. Helsinki University of Technology mjos@tcs.hut.fi 1 Outline Computational complexity Reminder about basic number

More information

Chapter 5: The Integers

Chapter 5: The Integers c Dr Oksana Shatalov, Fall 2014 1 Chapter 5: The Integers 5.1: Axioms and Basic Properties Operations on the set of integers, Z: addition and multiplication with the following properties: A1. Addition

More information

A group of figures, representing a number, is called a numeral. Numbers are divided into the following types.

A group of figures, representing a number, is called a numeral. Numbers are divided into the following types. 1. Number System Quantitative Aptitude deals mainly with the different topics in Arithmetic, which is the science which deals with the relations of numbers to one another. It includes all the methods that

More information

The set of integers will be denoted by Z = {, -3, -2, -1, 0, 1, 2, 3, 4, }

The set of integers will be denoted by Z = {, -3, -2, -1, 0, 1, 2, 3, 4, } Integers and Division 1 The Integers and Division This area of discrete mathematics belongs to the area of Number Theory. Some applications of the concepts in this section include generating pseudorandom

More information

Number Theory. Modular Arithmetic

Number Theory. Modular Arithmetic Number Theory The branch of mathematics that is important in IT security especially in cryptography. Deals only in integer numbers and the process can be done in a very fast manner. Modular Arithmetic

More information

Lecture 11: Number Theoretic Assumptions

Lecture 11: Number Theoretic Assumptions CS 6903 Modern Cryptography April 24, 2008 Lecture 11: Number Theoretic Assumptions Instructor: Nitesh Saxena Scribe: Robert W.H. Fisher 1 General 1.1 Administrative Homework 3 now posted on course website.

More information

Public Key Encryption

Public Key Encryption Public Key Encryption 3/13/2012 Cryptography 1 Facts About Numbers Prime number p: p is an integer p 2 The only divisors of p are 1 and p s 2, 7, 19 are primes -3, 0, 1, 6 are not primes Prime decomposition

More information

Discrete Structures Lecture Primes and Greatest Common Divisor

Discrete Structures Lecture Primes and Greatest Common Divisor DEFINITION 1 EXAMPLE 1.1 EXAMPLE 1.2 An integer p greater than 1 is called prime if the only positive factors of p are 1 and p. A positive integer that is greater than 1 and is not prime is called composite.

More information

MATH Fundamental Concepts of Algebra

MATH Fundamental Concepts of Algebra MATH 4001 Fundamental Concepts of Algebra Instructor: Darci L. Kracht Kent State University April, 015 0 Introduction We will begin our study of mathematics this semester with the familiar notion of even

More information

Divisibility in the Fibonacci Numbers. Stefan Erickson Colorado College January 27, 2006

Divisibility in the Fibonacci Numbers. Stefan Erickson Colorado College January 27, 2006 Divisibility in the Fibonacci Numbers Stefan Erickson Colorado College January 27, 2006 Fibonacci Numbers F n+2 = F n+1 + F n n 1 2 3 4 6 7 8 9 10 11 12 F n 1 1 2 3 8 13 21 34 89 144 n 13 14 1 16 17 18

More information

Executive Assessment. Executive Assessment Math Review. Section 1.0, Arithmetic, includes the following topics:

Executive Assessment. Executive Assessment Math Review. Section 1.0, Arithmetic, includes the following topics: Executive Assessment Math Review Although the following provides a review of some of the mathematical concepts of arithmetic and algebra, it is not intended to be a textbook. You should use this chapter

More information

Encryption: The RSA Public Key Cipher

Encryption: The RSA Public Key Cipher Encryption: The RSA Public Key Cipher Michael Brockway March 5, 2018 Overview Transport-layer security employs an asymmetric public cryptosystem to allow two parties (usually a client application and a

More information

Fall 2017 Test II review problems

Fall 2017 Test II review problems Fall 2017 Test II review problems Dr. Holmes October 18, 2017 This is a quite miscellaneous grab bag of relevant problems from old tests. Some are certainly repeated. 1. Give the complete addition and

More information

download instant at

download instant at 2 CRYPTOGRAPHY AND NUMBER THEORY 2.1 CRYPTOGRAPHY AND MODULAR ARITHMETIC Pages 54 to 56 Problem 1 Problem 2 Problem 3 Problem 4 14 mod 9 = 5; 1 mod 9 = 8; 11 mod 9 = 7. KHUH LV D PHVVDJH. EBOB FP X JBPPXDB.

More information

Number theory (Chapter 4)

Number theory (Chapter 4) EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?

More information

PRIME NUMBERS YANKI LEKILI

PRIME NUMBERS YANKI LEKILI PRIME NUMBERS YANKI LEKILI We denote by N the set of natural numbers: 1,2,..., These are constructed using Peano axioms. We will not get into the philosophical questions related to this and simply assume

More information

Proofs. Methods of Proof Divisibility Floor and Ceiling Contradiction & Contrapositive Euclidean Algorithm. Reading (Epp s textbook)

Proofs. Methods of Proof Divisibility Floor and Ceiling Contradiction & Contrapositive Euclidean Algorithm. Reading (Epp s textbook) Proofs Methods of Proof Divisibility Floor and Ceiling Contradiction & Contrapositive Euclidean Algorithm Reading (Epp s textbook) 4.3 4.8 1 Divisibility The notation d n is read d divides n. Symbolically,

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.5 Direct Proof and Counterexample V: Floor and Ceiling Copyright Cengage Learning. All

More information

a the relation arb is defined if and only if = 2 k, k

a the relation arb is defined if and only if = 2 k, k DISCRETE MATHEMATICS Past Paper Questions in Number Theory 1. Prove that 3k + 2 and 5k + 3, k are relatively prime. (Total 6 marks) 2. (a) Given that the integers m and n are such that 3 (m 2 + n 2 ),

More information

Discrete mathematics I - Number theory

Discrete mathematics I - Number theory Discrete mathematics I - Number theory Emil Vatai (based on hungarian slides by László Mérai) 1 January 31, 2018 1 Financed from the financial support ELTE won from the Higher Education

More information

Analyzing and Optimizing the Combined Primality test with GCD Operation on Smart Mobile Devices

Analyzing and Optimizing the Combined Primality test with GCD Operation on Smart Mobile Devices Analyzing and Optimizing the Combined Primality test with GCD Operation on Smart Mobile Devices Hosung Jo 1 and Heejin Park 2 1 Department of Electronics and Computer Engineering, Hanyang University, Seoul,

More information

Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers

Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-75X. Volume 1, Issue 5 Ver. VIII (Sep. - Oct.01), PP 01-07 www.iosrjourals.org Seed ad Sieve of Odd Composite Numbers with Applicatios i

More information

Lecture 2. The Euclidean Algorithm and Numbers in Other Bases

Lecture 2. The Euclidean Algorithm and Numbers in Other Bases Lecture 2. The Euclidean Algorithm and Numbers in Other Bases At the end of Lecture 1, we gave formulas for the greatest common divisor GCD (a, b), and the least common multiple LCM (a, b) of two integers

More information

OBTAINING SQUARES FROM THE PRODUCTS OF NON-SQUARE INTEGERS

OBTAINING SQUARES FROM THE PRODUCTS OF NON-SQUARE INTEGERS OBTAINING SQUARES FROM THE PRODUCTS OF NON-SQUARE INTEGERS The difference between two neighboring squares n 2 and (n+1) 2 is equal to 2n+1 for any integer n=1,2,3,. Thus the numbers generated by n 2 -A

More information

With Question/Answer Animations. Chapter 4

With Question/Answer Animations. Chapter 4 With Question/Answer Animations Chapter 4 Chapter Motivation Number theory is the part of mathematics devoted to the study of the integers and their properties. Key ideas in number theory include divisibility

More information

The numbers 1, 2, 3, are called the counting numbers or natural numbers. The study of the properties of counting numbers is called number theory.

The numbers 1, 2, 3, are called the counting numbers or natural numbers. The study of the properties of counting numbers is called number theory. 6.1 Number Theory Number Theory The numbers 1, 2, 3, are called the counting numbers or natural numbers. The study of the properties of counting numbers is called number theory. 2010 Pearson Education,

More information

Notes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I

Notes. Number Theory: Applications. Notes. Number Theory: Applications. Notes. Hash Functions I Number Theory: Applications Slides by Christopher M. Bourke Instructor: Berthe Y. Choueiry Fall 2007 Computer Science & Engineering 235 Introduction to Discrete Mathematics Sections 3.4 3.7 of Rosen cse235@cse.unl.edu

More information

Simple Math: Cryptography

Simple Math: Cryptography 1 Introduction Simple Math: Cryptography This section develops some mathematics before getting to the application. The mathematics that I use involves simple facts from number theory. Number theory is

More information

Experience in Factoring Large Integers Using Quadratic Sieve

Experience in Factoring Large Integers Using Quadratic Sieve Experience in Factoring Large Integers Using Quadratic Sieve D. J. Guan Department of Computer Science, National Sun Yat-Sen University, Kaohsiung, Taiwan 80424 guan@cse.nsysu.edu.tw April 19, 2005 Abstract

More information

Quiz 1, Mon CS 2050, Intro Discrete Math for Computer Science

Quiz 1, Mon CS 2050, Intro Discrete Math for Computer Science Quiz 1, Mon 09-6-11 CS 050, Intro Discrete Math for Computer Science This quiz has 10 pages (including this cover page) and 5 Problems: Problems 1,, 3 and 4 are mandatory ( pages each.) Problem 5 is optional,

More information

Solutions to Practice Final

Solutions to Practice Final s to Practice Final 1. (a) What is φ(0 100 ) where φ is Euler s φ-function? (b) Find an integer x such that 140x 1 (mod 01). Hint: gcd(140, 01) = 7. (a) φ(0 100 ) = φ(4 100 5 100 ) = φ( 00 5 100 ) = (

More information

Topic Contents. Factoring Methods. Unit 3: Factoring Methods. Finding the square root of a number

Topic Contents. Factoring Methods. Unit 3: Factoring Methods. Finding the square root of a number Topic Contents Factoring Methods Unit 3 The smallest divisor of an integer The GCD of two numbers Generating prime numbers Computing prime factors of an integer Generating pseudo random numbers Raising

More information

MATH 145 Algebra, Solutions to Assignment 4

MATH 145 Algebra, Solutions to Assignment 4 MATH 145 Algebra, Solutions to Assignment 4 1: a) Find the inverse of 178 in Z 365. Solution: We find s and t so that 178s + 365t = 1, and then 178 1 = s. The Euclidean Algorithm gives 365 = 178 + 9 178

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information

and LCM (a, b, c) LCM ( a, b) LCM ( b, c) LCM ( a, c)

and LCM (a, b, c) LCM ( a, b) LCM ( b, c) LCM ( a, c) CHAPTER 1 Points to Remember : REAL NUMBERS 1. Euclid s division lemma : Given positive integers a and b, there exists whole numbers q and r satisfying a = bq + r, 0 r < b.. Euclid s division algorithm

More information

Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?

Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Alexander May, Maike Ritzenhofen Faculty of Mathematics Ruhr-Universität Bochum, 44780 Bochum,

More information

The RSA Cipher and its Algorithmic Foundations

The RSA Cipher and its Algorithmic Foundations Chapter 1 The RSA Cipher and its Algorithmic Foundations The most important that is, most applied and most analyzed asymmetric cipher is RSA, named after its inventors Ron Rivest, Adi Shamir, and Len Adleman.

More information

On Exponentially Perfect Numbers Relatively Prime to 15

On Exponentially Perfect Numbers Relatively Prime to 15 On Exponentially Perfect Numbers Relatively Prime to 15 by Joseph F. Kolenick Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in the Mathematics Program YOUNGSTOWN

More information

Wilson s Theorem and Fermat s Little Theorem

Wilson s Theorem and Fermat s Little Theorem Wilson s Theorem and Fermat s Little Theorem Wilson stheorem THEOREM 1 (Wilson s Theorem): (p 1)! 1 (mod p) if and only if p is prime. EXAMPLE: We have (2 1)!+1 = 2 (3 1)!+1 = 3 (4 1)!+1 = 7 (5 1)!+1 =

More information

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer?

2x 1 7. A linear congruence in modular arithmetic is an equation of the form. Why is the solution a set of integers rather than a unique integer? Chapter 3: Theory of Modular Arithmetic 25 SECTION C Solving Linear Congruences By the end of this section you will be able to solve congruence equations determine the number of solutions find the multiplicative

More information

Senior Math Circles Cryptography and Number Theory Week 2

Senior Math Circles Cryptography and Number Theory Week 2 Senior Math Circles Cryptography and Number Theory Week 2 Dale Brydon Feb. 9, 2014 1 Divisibility and Inverses At the end of last time, we saw that not all numbers have inverses mod n, but some do. We

More information

Beautiful Mathematics

Beautiful Mathematics Beautiful Mathematics 1. Principle of Mathematical Induction The set of natural numbers is the set of positive integers {1, 2, 3,... } and is denoted by N. The Principle of Mathematical Induction is a

More information

Fall 2017 September 20, Written Homework 02

Fall 2017 September 20, Written Homework 02 CS1800 Discrete Structures Profs. Aslam, Gold, & Pavlu Fall 2017 September 20, 2017 Assigned: Wed 20 Sep 2017 Due: Fri 06 Oct 2017 Instructions: Written Homework 02 The assignment has to be uploaded to

More information

Exercises Exercises. 2. Determine whether each of these integers is prime. a) 21. b) 29. c) 71. d) 97. e) 111. f) 143. a) 19. b) 27. c) 93.

Exercises Exercises. 2. Determine whether each of these integers is prime. a) 21. b) 29. c) 71. d) 97. e) 111. f) 143. a) 19. b) 27. c) 93. Exercises Exercises 1. Determine whether each of these integers is prime. a) 21 b) 29 c) 71 d) 97 e) 111 f) 143 2. Determine whether each of these integers is prime. a) 19 b) 27 c) 93 d) 101 e) 107 f)

More information

Notation Index. gcd(a, b) (greatest common divisor) NT-16

Notation Index. gcd(a, b) (greatest common divisor) NT-16 Notation Index (for all) B A (all functions) B A = B A (all functions) SF-18 (n) k (falling factorial) SF-9 a R b (binary relation) C(n,k) = n! k! (n k)! (binomial coefficient) SF-9 n! (n factorial) SF-9

More information

Homework #2 solutions Due: June 15, 2012

Homework #2 solutions Due: June 15, 2012 All of the following exercises are based on the material in the handout on integers found on the class website. 1. Find d = gcd(475, 385) and express it as a linear combination of 475 and 385. That is

More information

Sets. We discuss an informal (naive) set theory as needed in Computer Science. It was introduced by G. Cantor in the second half of the nineteenth

Sets. We discuss an informal (naive) set theory as needed in Computer Science. It was introduced by G. Cantor in the second half of the nineteenth Sets We discuss an informal (naive) set theory as needed in Computer Science. It was introduced by G. Cantor in the second half of the nineteenth century. Most students have seen sets before. This is intended

More information

Section 4. Quantitative Aptitude

Section 4. Quantitative Aptitude Section 4 Quantitative Aptitude You will get 35 questions from Quantitative Aptitude in the SBI Clerical 2016 Prelims examination and 50 questions in the Mains examination. One new feature of the 2016

More information

ECM at Work. Joppe W. Bos and Thorsten Kleinjung. Laboratory for Cryptologic Algorithms EPFL, Station 14, CH-1015 Lausanne, Switzerland 1 / 14

ECM at Work. Joppe W. Bos and Thorsten Kleinjung. Laboratory for Cryptologic Algorithms EPFL, Station 14, CH-1015 Lausanne, Switzerland 1 / 14 ECM at Work Joppe W. Bos and Thorsten Kleinjung Laboratory for Cryptologic Algorithms EPFL, Station 14, CH-1015 Lausanne, Switzerland 1 / 14 Motivation The elliptic curve method for integer factorization

More information

CRYPTOGRAPHIC COMPUTING

CRYPTOGRAPHIC COMPUTING CRYPTOGRAPHIC COMPUTING ON GPU Chen Mou Cheng Dept. Electrical Engineering g National Taiwan University January 16, 2009 COLLABORATORS Daniel Bernstein, UIC, USA Tien Ren Chen, Army Tanja Lange, TU Eindhoven,

More information

Number theory (Chapter 4)

Number theory (Chapter 4) EECS 203 Spring 2016 Lecture 10 Page 1 of 8 Number theory (Chapter 4) Review Questions: 1. Does 5 1? Does 1 5? 2. Does (129+63) mod 10 = (129 mod 10)+(63 mod 10)? 3. Does (129+63) mod 10 = ((129 mod 10)+(63

More information

MATH 4400 SOLUTIONS TO SOME EXERCISES. 1. Chapter 1

MATH 4400 SOLUTIONS TO SOME EXERCISES. 1. Chapter 1 MATH 4400 SOLUTIONS TO SOME EXERCISES 1.1.3. If a b and b c show that a c. 1. Chapter 1 Solution: a b means that b = na and b c that c = mb. Substituting b = na gives c = (mn)a, that is, a c. 1.2.1. Find

More information

5: The Integers (An introduction to Number Theory)

5: The Integers (An introduction to Number Theory) c Oksana Shatalov, Spring 2017 1 5: The Integers (An introduction to Number Theory) The Well Ordering Principle: Every nonempty subset on Z + has a smallest element; that is, if S is a nonempty subset

More information

Chapter 5.1: Induction

Chapter 5.1: Induction Chapter.1: Induction Monday, July 1 Fermat s Little Theorem Evaluate the following: 1. 1 (mod ) 1 ( ) 1 1 (mod ). (mod 7) ( ) 8 ) 1 8 1 (mod ). 77 (mod 19). 18 (mod 1) 77 ( 18 ) 1 1 (mod 19) 18 1 (mod

More information

Chapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices. Integers & Algorithms (2.5)

Chapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices. Integers & Algorithms (2.5) CSE 54 Discrete Mathematics & Chapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices Integers & Algorithms (Section 2.5) by Kenneth H. Rosen, Discrete Mathematics & its Applications,

More information

Mathematical Foundations of Public-Key Cryptography

Mathematical Foundations of Public-Key Cryptography Mathematical Foundations of Public-Key Cryptography Adam C. Champion and Dong Xuan CSE 4471: Information Security Material based on (Stallings, 2006) and (Paar and Pelzl, 2010) Outline Review: Basic Mathematical

More information

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers Number Theory: Applications Number Theory Applications Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Results from Number Theory have many applications

More information

7. Prime Numbers Part VI of PJE

7. Prime Numbers Part VI of PJE 7. Prime Numbers Part VI of PJE 7.1 Definition (p.277) A positive integer n is prime when n > 1 and the only divisors are ±1 and +n. That is D (n) = { n 1 1 n}. Otherwise n > 1 is said to be composite.

More information

Chapter 1. Number of special form. 1.1 Introduction(Marin Mersenne) 1.2 The perfect number. See the book.

Chapter 1. Number of special form. 1.1 Introduction(Marin Mersenne) 1.2 The perfect number. See the book. Chapter 1 Number of special form 1.1 Introduction(Marin Mersenne) See the book. 1.2 The perfect number Definition 1.2.1. A positive integer n is said to be perfect if n is equal to the sum of all its positive

More information

Number Theory. Number Theory. 6.1 Number Theory

Number Theory. Number Theory. 6.1 Number Theory 6.1 Number Theory Number Theory The numbers 1, 2, 3, are called the counting numbers or natural numbers. The study of the properties of counting numbers is called number theory. 2 2010 Pearson Education,

More information

Remainders. We learned how to multiply and divide in elementary

Remainders. We learned how to multiply and divide in elementary Remainders We learned how to multiply and divide in elementary school. As adults we perform division mostly by pressing the key on a calculator. This key supplies the quotient. In numerical analysis and

More information