RSA numbers are composite numbers having exactly two prime factors (i.e., so-called semiprimes) that have been listed in the Factoring Challenge of RSA Security and have been particularly chosen to be difficult to factor.
While RSA numbers are much smaller than the largest known primes, their factorization is significant because of the curious property of numbers that proving or disproving a number to be prime ("primality testing") seems to be much easier than actually identifying the factors of a number ("prime factorization"). Thus, while it is trivial to multiply two large numbers p and q together, it can be extremely difficult to determine the factors if only their product pq is given. With some ingenuity, this property can be used to create practical and efficient encryption systems for electronic data.
RSA Laboratories sponsors the RSA Factoring Challenge to encourage research into computational number theory and the practical difficulty of factoring large integers, and because it can be helpful for users of the RSA encryption public-key cryptography algorithm for choosing suitable key lengths for an appropriate level of security. A cash prize is awarded to the first person to factor each challenge number.
RSA numbers were originally spaced at intervals of 10 decimal digits between 100 and 500 digits, and prizes were awarded according to a complicated formula. These original numbers were named according to the number of decimal digits, so RSA-100 was a hundred-digit number. As computers and algorithms became faster, the unfactored challenge numbers were removed from the prize list and replaced with a set of numbers with fixed cash prizes. At this point, the naming convention was also changed so that the trailing number would indicate the number of digits in the binary representation of the number. Hence, RSA-576 has 576 binary digits, which translates to 174 digits in decimal.
RSA numbers received widespread attention when a 129-digit number known as RSA-129 was used by R. Rivest, A. Shamir, and L. Adleman to publish one of the first public-key messages together with a $100 reward for the message's decryption (Gardner 1977). Despite widespread belief at the time that the message encoded by RSA-129 would take millions of years to break, it was factored in 1994 using a distributed computation which harnessed networked computers spread around the globe performing a multiple polynomial quadratic sieve (Leutwyler 1994). The result of all the concentrated number crunching was decryption of the encoded message to yield the profound plaintext message "The magic words are squeamish ossifrage." (For the benefit of non-ornithologists, an ossifrage is a rare predatory vulture found in the mountains of Europe.) The corresponding factorization (into a 64-digit number and a 65-digit number) is
On Feb. 2, 1999, a group led by H. te Riele completed factorization of RSA-140 into two 70-digit primes. In a preprint dated April 16, 2004, Aoki et al. factored RSA-150 into two 75-digit primes. On Aug. 22, 1999, a group led by H. te Riele completed factorization of RSA-155 into two 78-digit primes (te Riele 1999b, Peterson 1999). On December 2, Jens Franke circulated an email announcing factorization of the smallest prize number RSA-576 (Weisstein 2003). This factorization into two 87-digit factors was accomplished using a prime factorization algorithm known as the general number field sieve (GNFS).
As the following table shows, RSA-640 to RSA-2048 remain open, carrying awards from to to whoever is clever and persistent enough to track them down. A list of the open Challenge numbers may be downloaded from RSA or in the form of a Mathematica package from the MathWorld package archive.
number | digits | prize | factored (references) |
RSA-100 | 100 | Apr. 1991 | |
RSA-110 | 110 | Apr. 1992 | |
RSA-120 | 120 | Jun. 1993 | |
RSA-129 | 129 | Apr. 1994 (Leutwyler 1994, Cipra 1995) | |
RSA-130 | 130 | Apr. 10, 1996 | |
RSA-140 | 140 | Feb. 2, 1999 (te Riele 1999a) | |
RSA-150 | 150 | withdrawn? | Apr. 6, 2004 (Aoki 2004) |
RSA-155 | 155 | Aug. 22, 1999 (te Riele 1999b, Peterson 1999) | |
RSA-160 | 160 | Apr. 1, 2003 (Bahr et al. 2003) | |
RSA-576 | 174 | Dec. 3, 2003 (Franke 2003) | |
RSA-640 | 193 | open | |
RSA-704 | 212 | open | |
RSA-768 | 232 | open | |
RSA-896 | 270 | open | |
RSA-1024 | 309 | open | |
RSA-1536 | 463 | open | |
RSA-2048 | 617 | open |
Number Field Sieve, Prime Factorization, RSA Encryption, Semiprime
Aoki, K.; Kida, Y.; Shimoyama, T.; and Ueda, H. "GNFS Factoring Statistics of RSA-100, 110, ..., 150." April 16, 2004. http://eprint.iacr.org/2004/095.pdf.
Bahr, F.; Franke, J.; Kleinjung, T.; Lochter, M.; and Böhm, M. "RSA-160." http://www.loria.fr/~zimmerma/records/rsa160.
Cipra, B. "The Secret Life of Large Numbers." What's Happening in the Mathematical Sciences, 1995-1996, Vol. 3. Providence, RI: Amer. Math. Soc., pp. 90-99, 1996.
Cowie, J.; Dodson, B.; Elkenbracht-Huizing, R. M.; Lenstra, A. K.; Montgomery, P. L.; Zayer, J. A. "World Wide Number Field Sieve Factoring Record: On to Bits." In Advances in Cryptology--ASIACRYPT '96 (Kyongju) (Ed. K. Kim and T. Matsumoto.) New York: Springer-Verlag, pp. 382-394, 1996.
Flannery, S. and Flannery, D. In Code: A Mathematical Journey. London: Profile Books, pp. 46-47, 2000.
Franke, J. "RSA576." Privately circulated email reposted to primenumbers Yahoo! Group. http://groups.yahoo.com/group/primenumbers/message/14113.
Gardner, M. "Mathematical Games: A New Kind of Cipher that Would Take Millions of Years to Break." Sci. Amer. 237, 120-124, Aug. 1977.
Klee, V. and Wagon, S. Old and New Unsolved Problems in Plane Geometry and Number Theory, rev. ed. Washington, DC: Math. Assoc. Amer., p. 223, 1991.
Leutwyler, K. "Superhack: Forty Quadrillion Years Early, a 129-Digit Code is Broken." Sci. Amer. 271, 17-20, 1994.
Leyland, P. ftp://sable.ox.ac.uk/pub/math/rsa129.
Peterson, I. "Crunching Internet Security Codes." Sci. News 156, 221, Oct. 2, 1999.
RSA Security. "RSA Factoring Challenge." http://www.rsasecurity.com/rsalabs/challenges/factoring/.
RSA Security. "The RSA Challenge Numbers." http://www.rsasecurity.com/rsalabs/challenges/factoring/numbers.html.
RSA Security. "What is the RSA Factoring Challenge and What is RSA-129?" http://www.rsasecurity.com/rsalabs/faq/.
RSA Security. "Factorization of RSA-140." http://www.rsasecurity.com/rsalabs/challenges/factoring/rsa140.html.
RSA Security. "Factorization of RSA-155." http://www.rsasecurity.com/rsalabs/challenges/factoring/rsa155.html.
RSA Security. "Factorization of RSA-160." http://www.rsasecurity.com/rsalabs/challenges/factoring/rsa160.html.
Taubes, G. "Small Army of Code-breakers Conquers a 129-Digit Giant." Science 264, 776-777, 1994.
te Riele, H. "Factorisation of RSA-140." NMBRTHRY@listserv.nodak.edu mailing list. 4 Feb 1999a. http://listserv.nodak.edu/scripts/wa.exe?A2=ind9902&L=nmbrthry&P=302.
te Riele, H. "New Factorization Record." NMBRTHRY@listserv.nodak.edu mailing list. 26 Aug 1999b. http://listserv.nodak.edu/scripts/wa.exe?A2=ind9908&L=nmbrthry&P=1905.