RSA Number


RSA numbers are composite numbers having exactly two prime factors (i.e., so-called semiprimes) that have been listed in the Factoring Challenge of RSA Security and have been particularly chosen to be difficult to factor.

While RSA numbers are much smaller than the largest known primes, their factorization is significant because of the curious property of numbers that proving or disproving a number to be prime ("primality testing") seems to be much easier than actually identifying the factors of a number ("prime factorization"). Thus, while it is trivial to multiply two large numbers p and q together, it can be extremely difficult to determine the factors if only their product pq is given. With some ingenuity, this property can be used to create practical and efficient encryption systems for electronic data.

RSA Laboratories sponsors the RSA Factoring Challenge to encourage research into computational number theory and the practical difficulty of factoring large integers, and because it can be helpful for users of the RSA encryption public-key cryptography algorithm for choosing suitable key lengths for an appropriate level of security. A cash prize is awarded to the first person to factor each challenge number.

RSA numbers were originally spaced at intervals of 10 decimal digits between 100 and 500 digits, and prizes were awarded according to a complicated formula. These original numbers were named according to the number of decimal digits, so RSA-100 was a hundred-digit number. As computers and algorithms became faster, the unfactored challenge numbers were removed from the prize list and replaced with a set of numbers with fixed cash prizes. At this point, the naming convention was also changed so that the trailing number would indicate the number of digits in the binary representation of the number. Hence, RSA-576 has 576 binary digits, which translates to 174 digits in decimal.

RSA numbers received widespread attention when a 129-digit number known as RSA-129 was used by R. Rivest, A. Shamir, and L. Adleman to publish one of the first public-key messages together with a $100 reward for the message's decryption (Gardner 1977). Despite widespread belief at the time that the message encoded by RSA-129 would take millions of years to break, it was factored in 1994 using a distributed computation which harnessed networked computers spread around the globe performing a multiple polynomial quadratic sieve (Leutwyler 1994). The result of all the concentrated number crunching was decryption of the encoded message to yield the profound plaintext message "The magic words are squeamish ossifrage." (For the benefit of non-ornithologists, an ossifrage is a rare predatory vulture found in the mountains of Europe.) The corresponding factorization (into a 64-digit number and a 65-digit number) is

(Leutwyler 1994, Cipra 1995).

On Feb. 2, 1999, a group led by H. te Riele completed factorization of RSA-140 into two 70-digit primes. In a preprint dated April 16, 2004, Aoki et al. factored RSA-150 into two 75-digit primes. On Aug. 22, 1999, a group led by H. te Riele completed factorization of RSA-155 into two 78-digit primes (te Riele 1999b, Peterson 1999). On December 2, Jens Franke circulated an email announcing factorization of the smallest prize number RSA-576 (Weisstein 2003). This factorization into two 87-digit factors was accomplished using a prime factorization algorithm known as the general number field sieve (GNFS).

As the following table shows, RSA-640 to RSA-2048 remain open, carrying awards from to to whoever is clever and persistent enough to track them down. A list of the open Challenge numbers may be downloaded from RSA or in the form of a Mathematica package from the MathWorld package archive.

number digits prize factored (references)
RSA-100 100   Apr. 1991
RSA-110 110   Apr. 1992
RSA-120 120   Jun. 1993
RSA-129 129 Apr. 1994 (Leutwyler 1994, Cipra 1995)
RSA-130 130   Apr. 10, 1996
RSA-140 140   Feb. 2, 1999 (te Riele 1999a)
RSA-150 150 withdrawn? Apr. 6, 2004 (Aoki 2004)
RSA-155 155   Aug. 22, 1999 (te Riele 1999b, Peterson 1999)
RSA-160 160   Apr. 1, 2003 (Bahr et al. 2003)
RSA-576 174 Dec. 3, 2003 (Franke 2003)
RSA-640 193 open
RSA-704 212 open
RSA-768 232 open
RSA-896 270 open
RSA-1024 309 open
RSA-1536 463 open
RSA-2048 617 open

Number Field Sieve, Prime Factorization, RSA Encryption, Semiprime



References

Aoki, K.; Kida, Y.; Shimoyama, T.; and Ueda, H. "GNFS Factoring Statistics of RSA-100, 110, ..., 150." April 16, 2004. http://eprint.iacr.org/2004/095.pdf.

Bahr, F.; Franke, J.; Kleinjung, T.; Lochter, M.; and Böhm, M. "RSA-160." http://www.loria.fr/~zimmerma/records/rsa160.

Cipra, B. "The Secret Life of Large Numbers." What's Happening in the Mathematical Sciences, 1995-1996, Vol. 3. Providence, RI: Amer. Math. Soc., pp. 90-99, 1996.

Cowie, J.; Dodson, B.; Elkenbracht-Huizing, R. M.; Lenstra, A. K.; Montgomery, P. L.; Zayer, J. A. "World Wide Number Field Sieve Factoring Record: On to Bits." In Advances in Cryptology--ASIACRYPT '96 (Kyongju) (Ed. K. Kim and T. Matsumoto.) New York: Springer-Verlag, pp. 382-394, 1996.

Flannery, S. and Flannery, D. In Code: A Mathematical Journey. London: Profile Books, pp. 46-47, 2000.

Franke, J. "RSA576." Privately circulated email reposted to primenumbers Yahoo! Group. http://groups.yahoo.com/group/primenumbers/message/14113.

Gardner, M. "Mathematical Games: A New Kind of Cipher that Would Take Millions of Years to Break." Sci. Amer. 237, 120-124, Aug. 1977.

Klee, V. and Wagon, S. Old and New Unsolved Problems in Plane Geometry and Number Theory, rev. ed. Washington, DC: Math. Assoc. Amer., p. 223, 1991.

Leutwyler, K. "Superhack: Forty Quadrillion Years Early, a 129-Digit Code is Broken." Sci. Amer. 271, 17-20, 1994.

Leyland, P. ftp://sable.ox.ac.uk/pub/math/rsa129.

Peterson, I. "Crunching Internet Security Codes." Sci. News 156, 221, Oct. 2, 1999.

RSA Security. "RSA Factoring Challenge." http://www.rsasecurity.com/rsalabs/challenges/factoring/.

RSA Security. "The RSA Challenge Numbers." http://www.rsasecurity.com/rsalabs/challenges/factoring/numbers.html.

RSA Security. "What is the RSA Factoring Challenge and What is RSA-129?" http://www.rsasecurity.com/rsalabs/faq/.

RSA Security. "Factorization of RSA-140." http://www.rsasecurity.com/rsalabs/challenges/factoring/rsa140.html.

RSA Security. "Factorization of RSA-155." http://www.rsasecurity.com/rsalabs/challenges/factoring/rsa155.html.

RSA Security. "Factorization of RSA-160." http://www.rsasecurity.com/rsalabs/challenges/factoring/rsa160.html.

Taubes, G. "Small Army of Code-breakers Conquers a 129-Digit Giant." Science 264, 776-777, 1994.

te Riele, H. "Factorisation of RSA-140." NMBRTHRY@listserv.nodak.edu mailing list. 4 Feb 1999a. http://listserv.nodak.edu/scripts/wa.exe?A2=ind9902&L=nmbrthry&P=302.

te Riele, H. "New Factorization Record." NMBRTHRY@listserv.nodak.edu mailing list. 26 Aug 1999b. http://listserv.nodak.edu/scripts/wa.exe?A2=ind9908&L=nmbrthry&P=1905.