Abstract

In this research, we delve into the challenges associated with factorization in the context of the RSA cryptosystem. The RSA cryptosystem's security relies on the computational complexity of breaking down its modulus, which is essentially a product of two prime numbers denoted as 'p' and 'q.' Notably, the RSA modulus differs from the typical factorization problem, as it involves exceptionally large prime numbers, each roughly half the size of the modulus itself. If one manages to determine the factors of this modulus, it compromises the security of the entire RSA cryptosystem, as these factors can be exploited to derive the private key.Within this article, we provide an overview of the advancements made in the realm of factoring RSA moduli. Recent efforts in RSA factorization have successfully tackled 250-digit decimal RSA moduli. We also explore the common algorithms employed in factorization and delve into approaches based on the Fermat factorization method. Additionally, we discuss the various programming tools utilized to handle the challenge of factoring large numbers. Furthermore, we delve into the enhancement of the simple Fermat Primality test as a means to expedite the Primality Testing algorithm. Lastly, we offer a concise summary outlining the steps involved in the Number Field Sieve algorithm.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call