A Parallel Probabilistic Approach to Factorize a Semiprime

DOI: 10.4236/ajcm.2018.82013   PDF   HTML   XML   499 Downloads   983 Views   Citations

Abstract

In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic search with a probabilistic search, requires less memory and can be implemented on ordinary multicore computers. Experiments show that certain semiprimes of 27 to 46 decimal-bits can be validly factorized with the approach on personal computer in expected time.

Share and Cite:

Li, J. (2018) A Parallel Probabilistic Approach to Factorize a Semiprime. American Journal of Computational Mathematics, 8, 175-183. doi: 10.4236/ajcm.2018.82013.

1. Introduction

A semiprime is an odd composite number N that has exactly two distinct prime divisors, say p and q, such that 3 p < q . Factorization of the semiprimes has been a difficult problem in mathematics and computer science, especially factorization of a RSA number that is a large semiprime, as introduced and overviewed in articles [1] [2] [3] [4] [5] . Let k = q / p be the divisor-ratio of the semiprime N = p q ; article [6] discovered the genetic property of the odd integers and proved that the small divisor p can be calculated by finding the greatest common divisor (GCD) with an odd integer that lies in an odd interval I 0 that is determined by N itself; article [7] further pointed out that, by taking k to be a variable quantity, algorithms could be designed to factorize big semiprimes by parallel computing and the article also demonstrated a deterministic approach to factor the RSA numbers; article [8] recently made a further investigation on k’s influence to the distribution of p, showing that the interval I 0 is a cover of finite subintervals each of which is determined by a k and every two adjacent ones of which are linked with their unique common end. This means that p can be surely found out with a k-subdivision approach. Following such an idea, this paper makes an investigation on the new algorithm design for searching the odd integer that has GCD with N. As a result, an algorithm that incorporates a deterministic search with a probabilistic search is designed. This paper presents the related consequences. Section 2 lists the preliminaries for the later sections; Section 3 proves the mathematical foundations for the new algorithm; Section 4 introduces the new algorithm as well as its designing strategy and numerical experiments.

2. Preliminaries

This section lists the preliminaries that include definitions, symbols and lemmas, which are necessary for later sections.

2.1. Symbols and Notations

In this whole article, a semiprime N = p q means p and q are both odd prime numbers and 3 p < q . An odd interval [ a , b ] is a set of consecutive odd numbers that take a as the lower bound and b as the upper bound; for example, [ 3 , 11 ] = { 3 , 5 , 7 , 9 , 11 } . Symbol x is the floor function, an integer function of real number x that satisfies x x < x + 1 ; symbol GCD means the greatest common divisor; let m > 0 ; then e m b , e m p , e m q and e m 0 are defined by

e m b = N ( m + 1 , 2 m 1 1 ) = 2 m N 1

e m p = 2 m N p

e m q = 2 m N q

e m 0 = e m b 2 ( N + 1 2 1 )

Symbol A Δ = B 2 , which was defined in [8] , means A is half of B.

2.2. Lemmas

Lemma 1. (See in [8] ) Suppose N = p q is an odd composite number and k = q p 1 ; then e m p [ e m k l , e m k r ] , where m = log 2 N 1 , e m k l = e m b 2 ( 1 2 ( 1 + N k ) 1 ) , e m k r = e m b 2 1 2 ( 1 + N k + 1 ) and e m b = 2 m N 1 .

Lemma 2. (See in [8] ) Suppose N > 1 is an odd integer and k 1 < k 2 are positive integers. Let l s k 1 = 1 2 ( 1 + N k 1 + 1 ) + 1 , l s k 2 = 1 2 ( 1 + N k 2 + 1 ) + 1 , l b k 1 = 1 2 ( 1 + N k 1 ) and l b k 2 = 1 2 ( 1 + N k 2 ) ; then it holds

e m k l 1 < e m k r 1 e m k l 2 < e m k r 2

where e m k l 1 = e m b 2 ( l b k 1 1 ) , e m k l 2 = e m b 2 ( l b k 2 1 ) , e m k r 1 = e m b 2 ( l s k 1 1 ) and e m k r 2 = e m b 2 ( l s k 2 1 ) .

Particularly, when k 2 = k 1 + 1 it holds

e m k l 1 < e m k r 1 = e m k l 2 < e m k r 2

Lemma 3. (See in [8] ) For arbitrary odd number N > 1 , let l s i = 1 2 ( 1 + N i + 1 ) + 1 , l b i = 1 2 ( 1 + N i ) , e m i l = e m b 2 ( l b i 1 ) and e m i r = e m b 2 ( l s i 1 ) , where i = 1 , 2 , , ω are positive integers; then odd intervals I i = [ e m i l , e m i r ] satisfy

1) I i I i + 1 = e m i r ;

2) i = 1 i = ω I i = [ e m 0 , e m ω r ] ;

3) i = 1 i = I i = [ e m 0 , e m b ] ; as illustrated in Figure 1.

Lemma 4. (See in [8] ) Let Δ 0 = N + 1 2 be the length of the odd interval I 0 = [ e m 0 , e m b ] , Δ i and Δ i + 1 be respectively the lengths of the odd intervals I i and I i + 1 defined in Lemma 3; then when 1 < i N 6 16 , it holds 1 2 Δ i < Δ i + 1 < Δ i .

Lemma 5. (See in [8] ) Let Δ 0 = N + 1 2 be the length of the odd interval I 0 = [ e m 0 , e m b ] , Δ 1 , Δ 2 and Δ 3 , be respectively the lengths of I 1 , I 2 and I 3 ; then Δ 1 + Δ 2 + Δ 3 Δ = 1 2 Δ 0 and when Δ 0 26 it holds Δ 1 + Δ 2 > 1 4 Δ 0 .

Lemma 6. (See in [8] ) If k N β 3 α for some positive integers β 1 and α > β , then Δ k is at most 1 4 N α β 2 α ; otherwise it is at least 1 4 N α β 2 α 1

Figure 1. Odd intervals’ subdivision and cover.

1 4 N α β 2 α 1 . Particularly, arbitrary α 2 yields Δ k N 2 α 4 for k N α 1 3 α and Δ k N 2 α 4 1 for k N α 1 3 α 1 .

Lemma 7. (See in [8] ) Let I 1 , I 2 , , I ω be odd intervals defined in Lemma 3;

then there are intervals that contain at most N 4 4 nodes and there are intervals that contain at least N 4 4 1 nodes.

3. Algorithm Design and Numerical Experiments

Based on the previous lemmas, theorems and corollaries, one can easily draw the following conclusions.

1) If N = p q is a semiprime, then there is a term e m p that lies in the odd interval I 0 and satisfies p = G C D ( N , e m p ) ;

2) If I 0 is subdivided into a series of subintervals that are defined in Lemma

3, then e m p I k with k = q p , and the bigger k is the fewer nodes are

contained in I k . Among all the subintervals, I 1 , I 2 and I 3 dominate half of

I 0 . Lemma 6 shows that, when k N β 3 α 1 there are at least 1 4 N α β 2 α 1 nodes in I k .

These provide a guideline for designing new algorithm for integer factorization, as the following subsections demonstrates.

3.1. Strategy for Algorithm Design

Now it has gotten to know that finding e m p out means a successful factorization of N = p q . Since e m p hides itself in one of I 1 , I 2 , , I ω , it can surely be found out by searching the intervals one by one. Considering by Lemma 7 that there are intervals that contain small number of nodes that can be searched in small time and there are also intervals that contain too many nodes to be searched when N is very big, it is necessary to know which intervals contain small number of nodes and which ones contain large number of nodes and then perform a brute-force search on the small ones and perform other searches on the large ones. Since the brute-force search is a time-consuming process, a Tolerable Number (TN) can be defined to be an upper bound of nodes that are sure to be searched out in a Tolerable Time (TM), which was introduced in FU’s article [9] . Obviously, Lemma 6 indicates that TN can be used to determine α by

T N = N 2 α 4 and thus ω 0 = N α 1 3 α . Since the number of nodes in I ω is

smaller than that in I ω 0 if ω > ω 0 by Lemma 6, TN is a critical number for the brute-force search. All the intervals I ω 0 + 1 , I ω 0 + 2 , can be searched by the brute-force search.

Now it turns to the big intervals I 1 , I 2 , , I ω 0 , each of which contains more than TN nodes. It is sure that, applying TN to subdivide each of these big intervals can obtain a series of new small odd intervals and then assigning each of the newly-subdivided small subintervals a process in a parallel computing system can perform the brute-force search in TM, as tested by FU [9] . However, this might require huge computing resources. For example, FU’s approach took more than 8 days to factorize a big number of 46-decimaldigits on Chinese Tianhe Supper Computer with 392 processes. On the other hand, by Lemma 3, there is a big probability to find the objective node when applying a probabilistic approach. Thus it is worthy of trying a probabilistic search.

By now, setting a TN, calculating an α by T N = N 2 α 4 plus an ω by ω = N α 1 3 α and imagining varying k = q p result in a subdivision of the

interval I 0 into two kinds of subintervals, the kind of small ones and the kind of big ones, as shown in Figure 2. Each of the small ones contains no more than TN nodes and can be searched by the brute-force search while each of the big ones contains more than TN nodes that need probabilistic searching approaches to search.

Now consider a big odd subinterval I that contains n terms. Suppose the objective odd number o = p s lies at the m-th position. Referring to the analysis in [10] , it knows that, choosing randomly k ( k < m ) terms on the left of o, say o j , , o j 1 , o j k , and their respectively symmetric terms on the right of o, namely, o j , o j + 1 , , o j + k , yields o j k + + o j 1 + o j + o j + o j + 1 + ... + o j + k = 2 k o with j = 1 , 2 , , m k 1 . Therefore, choosing in I randomly 2k terms and adding the chosen terms might obtain o in big probability, as proved in [10] . With the help of multi-dimensional random-number generator, as introduced in [11] , it is easy to pick 2k random terms in I. Considering the case that o lies near the start-position or the end-position of the interval I might fail to pick the necessary number of terms, it is reasonable to make near I’s ends one or more small subintervals each of which contain TN of nodes. These small subintervals are called TN intervals and they can be searched in TM with brate-force searches. The remained part of I is called a probabilistic intervals, as shown in Figure 3. Such a subdivision that includes two TN intervals near the ends and a probabilistic interval in the middle is called a TNPTN subdivision. With the TNPTN subdivision, it is necessary to perform brute-force searches on the two TN intervals and a probabilistic search on the whole interval I.

3.2. TNPTN Parallel Probabilistic Algorithm

Based on the strategy for algorithm design stated in previous section, a parallel algorithm, which is called TNPTN MPI Algorithm, is designed to find an

Figure 2. Subdivision of interval I0.

Figure 3. TNPTN subdivision.

objective node N o b j that has common divisor p with N = p q . The algorithm assumes that k = q / p varies from 1 to an upper bound and assigns for each k a process to search N o b j . It requires initial input data N to be the big semiprime, TN to be the number of the maximal steps that a brute-force search performs and a number N r a n d with N r a n d < T N to set the number of random odd integers that are randomly picked in its searched interval with the multi-dimensional random-number generator introduced in [11] . It also requires a brute-force searching subroutine and a probabilistic searching subroutine to perform the operations.

3.3. Numerical Experiments

Numerical experiments were made on a Sugon workstation with Xeon(R) E5-2650 V3 processor of 20 cores and 128GB memory via C++ MPI programming with gmp big number library. Several big semiprimes with 27 to 46 decimal-digits are factorized, as shown in Table 1.

4. Conclusion and Future Work

It is a convention to make a comparison of a new approach to the old ones although, sometime, there is no comparability between two things. Accordingly, this section makes comparisons and then prospects some future work.

It can see from the implementation of algorithms list in previous section that, each of the algorithms 1, 2 and 3 needs memory only for storing a few integers to be taken into the computation. They cost less memory. Since the whole procedure is a parallel one, the time it costs depends on the resources joining the computation. Theoretically, it is at most O ( 2 N 4 ( l o g 2 N ) 3 ) bit-operations

providing that there is N 4 2 process joining the computation.

Now turn to the old ones. It is known that, ever since John Pollard raised in 1975 his Pollard’s Rho algorithm, which is a probabilistic algorithm and is efficient in factoring small integers, many algorithms of integer factorization have developed. As stated in the introductory section, the GNFS has been regarded the fastest approach to factorize big integers under both sequential and parallel computing and almost all the factorized RSA numbers are factorized by the approach with parallel computing. So here the new approach is merely compared to the Pollard’s Rho approach and the GNFS approach.

Table 1. Experiments on some big semiprimes.

First compare with the Pollard’s Rho approach. From the point-view of memory cost, the new approach is like the Pollard’s Rho approach that costs less memory. From the point-view of time consumption, the two are almost the same efficiency according to the experiments in articles [6] and [12] . However, as pointed out in article [13] , the Pollard’s Rho approach cannot be parallelised. Actually, this article is the first one that proposes a parallel probabilistic approach in factoring integers.

Next compare with the GNFS approach. The GNFS approach is a deterministic one that can be parallelised. As article [14] has pointed out, GNFS requires a large amount of memory. Hence from the point-view of memory cost, the new approach is superior to the GNFS. From the point-view of time consumption, the comparison cannot be available because the new approach has not been applied on the many computers as the GNFS used in factoring large RSA numbers. Nevertheless, it can see from the experiments of factoring the 46 decimal bits semiprime that, one computer of 20 cores can factorize it in 3 days.

There is another approach stated by Kurzweg U H [15] . Seeing from his series of Blogs, one can see that Kurzweg actually tried to find out ϕ ( N ) to factorize the semiprime N. The idea was early seen in chapter 6 of YAN’s book [1] . Actually, it is quite occasional for Kurzweg’s to factorize the numbers he reported because he has not brought an approach that finds out ϕ ( N ) inevitably.

By now it can see that, the approach raised in this article is surely worthy of investigation because it is truly derived from the theorems and corollaries that are proved mathematically. In spite that the new approach is less of successful cases of factoring the RSA numbers, it does factorize many odd integers as many old approaches did in the history. As a new approach, it leaves of course quite a lot of researches to improve and perfect. For example, the probabilistic searching procedure is very rough and needs improving, and the time complexity of the algorithm has not be evaluated till now for its probabilistic trait and also for the authors’ limitation of the required knowledge. This points out the study of the future work. Hope it is concerned more and successful in the future.

Acknowledgements

The research work is supported by the State Key Laboratory of Mathematical Engineering and Advanced Computing under Open Project Program No.2017A01, Department of Guangdong Science and Technology under project 2015A030401105, Foshan Bureau of Science and Technology under projects 2016AG100311, Project gg040981 from Foshan University. The authors sincerely present thanks to them all.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Yan, S.X. (2008) Cryptanalytic Attacks on RSA. Springer US, New York.
[2] Surhone, L.M., Tennoe, M.T. and Henssonow, S.F. (2011) RSA Factoring Challenge. Springer US, New York.
[3] Wanambisi, A.W., Aywa, S., Maende, C., et al. (2013) Advances in Composite Integer Factorization Bibinfojournal. Materials & Structures, 48, 1-12.
[4] Abubakar, A., Jabaka, S., Tijjani, B.I., et al. (2014) Cryptanalytic Attacks on Rivest, Shamir, and Adleman (RSA) Cryptosystem: Issues and Challenges. Journal of Theoretical & Applied Information Technology, 61, 1-7.
[5] Kessler, G.C. (2017) An Overview of Cryptography (Updated Version 26 February 2017).
http://commons.erau.edu/publication/412
[6] Wang, X.B. (2017) Genetic Traits of Odd Numbers with Applications in Factorization of Integers. Global Journal of Pure and Applied Mathematics, 13, 493-517.
[7] Wang, X.B. (2017) Strategy for Algorithm Design in Factoring RSA Numbers. IOSR Journal of Computer Engineering, 19, 1-7.
https://doi.org/10.9790/0661-1903020107
[8] Wang, X.B. (2018) Influence of Divisor-Ratio to Distribution of Semiprime’s Divisor. Journal of Mathematics Research, 10, 54-61.
https://doi.org/10.5539/jmr.v10n4p54
[9] Fu, D.B. (2017) A Parallel Algorithm for Factorization of Big Odd Numbers. IOSR Journal of Computer Engineering, 19, 51-54.
https://doi.org/10.9790/0661-1902055154
[10] Wang, X.B., Li, J.H., Duan, Z.H. and Wan, W. (2018) Probability to Compute Divisor of a Hidden Integer. Journal of Mathematics Research, 10, 1-5.
https://doi.org/10.5539/jmr.v10n1p1
[11] Hu, X.P. and Cui, H. (2010) Generating Multi-Dimensional Discrete Distribution Random Number. Sixth International Conference on Natural Computation IEEE 10-12, 1102-1104.
https://doi.org/10.1109/ICNC.2010.5583695
[12] Li, J.H. (2017) Algorithm Design and Implementation for a Mathematical Model of Factoring Integers. IOSR Journal of Mathematics, 13, 37-41.
https://doi.org/10.9790/5728-1301063741
[13] Brent, R.P. (1990) Parallel Algorithms for Integer Factorisation Number Theory and Cryptography. Loxton, J.H., Ed. Cambridge University Press, Cambridge, 26-37.
[14] Wang, Q., Fan, X. and Zhang, H. (2016) The Space Complexity Analysis in the General Number Field Sieve Integer Factorization Theoretical Computer Science, 630, 76-94.
[15] Kurzweg, U.H. (2012) More on Factoring Semi-Primes.
http://www2.mae.ufl.edu/uhk/MORE-ON-SEMIPRIMES.pdf

  
comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.