1. Introduction
The RSA (Rivest–Shamir–Adleman) cryptosystems apply large semi-primes in an encryption algorithm for the generation of public keys and private keys to successfully secure an online communication [
1,
2,
3]. The security of such cryptosystems depends on prime factorization of large numbers being a huge computing challenge [
4,
5,
6]. Though the semi-prime factorization of large numbers has always interested mathematicians for centuries, the practical importance of preserving the security of these cryptosystems has led to exploration of the limitations of existing approaches towards the emergence of new methods, thereby redefining the cybersecurity landscape from time to time [
7,
8,
9,
10,
11,
12,
13].
In the past two decades, integer factorization algorithms have evolved by improving existing ones to a great extent such that very large semi-primes of more than 250 decimal digits can be factorized with sufficient computing power [
14,
15,
16,
17]. Some of the famous integer factorization algorithms are Lenstra’s elliptic curve algorithm [
18], Pomerance’s quadratic sieve, and the General Number Field Sieve [
19,
20]. Not only mathematicians, but also computing professionals and organizations have been exploring the properties of primes for several decades. More recently, their research directions have moved towards developing efficient tests for primality with the key objective of creating several applications in the domain of information security, particularly the RSA public key cryptosystem. A sieve in this context refers to the process of searching for prime numbers among all the integers up to a prescribed bound [
6,
20,
21]. The early practical building blocks of public-key cryptography are attributed to the Diffie–Hellman protocol over finite fields and the RSA cryptosystem. Though several other cryptographic primitives have entered the landscape, the RSA and finite field Diffie–Hellman methods are more prevalent in terms of their use for secure information transmission and key exchange in the computing field [
22]. The key sizes in these primitives are much longer when compared to elliptic curve-based cryptosystems. Thus, finding semi-primes has been a challenge and has drawn immense attention among researchers looking to break the RSA cryptosystem [
23,
24].
Our previous research work involved proposing several factorization methods including approaches using Pythagorean triples, sum of squares, and polynomials, as well as investigation of their impact on RSA attacks [
25,
26,
27,
28,
29,
30]. Readers are encouraged to refer to our previous work and related published articles in the literature that provide the preliminary definitions and commonly used mathematical notations adopted in this work. In this paper, we take a modest step to further the method of continued fractions by applying one line factoring algorithms with an effect on semi-prime factorization of the RSA primitive. The main aim of this paper is to characterize k:kN as per Lehman [
31] and apply this to Hart’s one line factorization method [
32]. Our research work is the first of its kind in exploring the relationship between the convergence of
and the attributes of
, which is used in Hart’s one line factorization algorithm and has applications in cryptography. Little is known about the attributes of
, and our research provides a better understanding of its relationship with the convergence of a solution. This paper presents the theory of our factorization approach and illustrates the working of our method with examples for breaking keys of different sizes. Our key contribution lies in the reduction of the search space and the faster solution to the semi-prime factorization problem. We provide the practical implementation and results of our experimentation conducted using small and large semi-primes as well as RSA250, which has 250 decimal digits (829 bits). In addition, our modest contribution includes considering a general form of the Brahmagupta–Fibonacci identity [
33] and applying it to the difference of squares, which extends our earlier work on the sum of squares approach for semi-prime factorization [
15,
17].
The organization of this paper is as follows:
Section 2 provides a brief background history and theory on continued fractions. In
Section 3, we present our method to factorize using continued fractions as a worked example. The application of our approach for factoring RSA250 is detailed in
Section 4. Our practical observations are described in
Section 5.
Section 6 provides suitable measures of performance for our proposed method and future research ideas.
Section 7 describes the difference of squares and, finally, in
Section 8, the conclusions and contributions of this ongoing research are summarized.
2. Theory
The theory on continued fractions and the history of various factorization methods form the back backbone of this research investigation. Fermat’s factorization method which was formulated in the early 1600’s uses the difference of squares and was published much later [
34,
35,
36]. However, most modern factorization algorithms are based on Fermat’s factorization method [
37,
38,
39,
40]. In the 1920s, Maurice Kraitchik presented a notable improvement to Fermat’s factorization. Instead of having a number
as a difference of squares, Kraitchik determined that it would suffice to find a difference of squares equal to a multiple of
[
41]. This can be mathematically stated as
. In 1985, Pomerance’s Quadratic Factoring Algorithm [
19] used Kraitchik’s scheme with the steps given below:
- (1)
Generate congruences .
- (2)
Determine factorizations of and for some of the congruences.
- (3)
Determine a subset of the factored congruences which, when multiplied, produce a special congruence .
- (4)
Factorization of .
Consider . This can be rewritten as given below:
- (1)
.
- (2)
.
- (3)
.
- (4)
or .
Our premise is that if we can find such a solution as mathematically derived in the above steps, then the greatest common divisor (gcd) will be a solution to the factorization of
. We carefully consider Knuth’s work of 1981, which states that attempting to factorize a semi-prime
with
“is a rather curious way to proceed, if not down right stupid” [
42]. Further, according to Knuth, finding
is clearly a chicken and egg scenario. In this work, we aim to perform experiments to investigate the characteristics of
by working backwards from the answer and narrowing the search field for possible
values. Further, we study many correct solutions which are the convergences of
, which have not been explored previously. We believed that this ongoing research work would lead to interesting findings and make better use of our narrower definition of the parameterization of
We next provide a brief background of related articles and their evolution in this domain. Continued Fraction Factorization (CFRAC) is well defined among factorization algorithms and is the baseline against which all others are measured. In number theory, the CFRAC method was the first general-purpose factorization algorithm that was efficiently implemented in 1975 as a computer algorithm by Morrison and Brillhart [
7] using the continued fraction approach of
. A few years later, Pomerance and Wagstaff explored this further and considered in detail the Knuth–Schroeppel function, which attempted to find suitable values for
that generated new ideas for factoring large integers [
43,
44]. Subsequently, Williams and Shallit provided a computational history of factoring and the refinement of several ideas in this space [
45]. While such combinations of number theory ideas have their mathematical merits, in this paper, our interest lies in finding a more simple and elegant approach that can motivate many researchers from the information security domain to explore further in this direction. We focus on the initial work published in 1974 by Lehman, who considered the ratio of
as
such that
[
46]. After nearly four decades, Hart considered Lehman’s work and ideas from Shank’s method (SQUFOF) reported in 1982 [
31] and subsequently developed a one line factoring algorithm in 2012 [
32].
From the above equation provided in (2), namely , we obtain
. If we let , then .
Our simple approach looks for a value which provides a perfect square. The greatest common divisor will be a solution to the factorization of .
We propose a new method that considers the continued fraction of the factorization of . The mathematical representation and the logic of the algorithm are as follows.
, where
are the convergences of
.
The circular conundrum observed by Knuth [
31] is that
and that
.
If is known, then a convergence can be found and then a suitable value can be determined. Hence, we have the chicken and the egg conundrum:
- (1)
We cannot know because we do not know
- (2)
We cannot solve for because we do not know .
However, our study in this direction is not limited by Knuth’s observation that this “is a rather curious way to proceed, if not Down Right Stupid” [
42]. Regardless of the obvious short comings provided by Knuth, we explore our proposed approach with worked examples in the next section, which provides the basis of our main investigation into applying our method for successfully factorizing RSA250 in the subsequent section.
3. Worked Examples
We provide the verified working of our factorization approach using two worked examples in this section. In the first example, we consider an integer (13,290,059) to factorize using continued fractions. This can be achieved with a brute force search by incrementing through until . This provides us with a factorization of 13,290,059 with factors .
Let us now consider the solution and describe the ratio of as a continued fraction such that 4261/3119 => 1 2 1 2 1 2 1 1 3 12.
We will now consider each convergent fraction of the continued fraction in turn until we find a value which provides a solution to .
Using our approach, the fourth convergence for 4261/3119 => 1 2 1 2 1 2 1 1 3 12 provides the solution. The first four convergences are indicated by [k,x,y,z]. Note that when , a solution is found.
.
For the example considered here, we arrive at
. From the above, it can be verified easily that the fourth convergence finds the factors as the solution for this example. We note that all other convergences after this one also provide suitable values for
that lead to a solution. Other approaches such as Silverman’s method require many polynomials to generate the residues [
47].
As a second example, we consider the integer 21,565,941,721,999,797,939,843,713,963, a 95-bit prime number as illustrated by Crandall and Pomerance [
48] on pg307. To factorize using continued fractions, the solution can be achieved with a brute force search by incrementing through
until the following value is reached:
This obtains a factorization of 21,565,941,721,999,797,939,843,713,963 with factors .
Consider the solution describing the ratio of as a continued fraction such that 1,000,000,000,000,037/21,565,941,721,999 ⇒ 46 2 1 2 2 2 2 1 1 1 3 8 13 1 263 1 5 38 1 4 1 2 8 2 1 1 2.
The continued fraction length is 26 and, by applying our approach, the 11th convergence provides a suitable value and the resulting factorization shown below:
.
.
.
.
.
.
.
.
.
.
.
For the example considered here, we arrive at .
From the above, it can be verified that the eleventh convergence finds the factors as the solution for this example. As per the previous example, all other convergences after this one also provide suitable values for
and lead to a solution. The two worked examples shown above demonstrate the simplicity of our proposed approach and the steps for convergence of a solution. The first example is a smaller integer, while the second is a very large integer, which is used for illustration in other studies found in the literature [
48]. From the above-described worked examples, we arrive at the following three general properties:
Our main interest is in applying our approach to the breaking of keys as key sizes for RSA and finite field Diffie–Hellman have become unwieldy. In the next section, we demonstrate the use of our approach to factorize RSA250.
4. Application to Breaking RSA250
At the center of secure information transmission is the RSA cryptosystem. An information transmission scheme that meets a 128-bit security strength is widely accepted with a key size of approximately 3072 bits [
24]. Even though high computing power is currently affordable with advancements in information and communication technologies, there are certain practical reasons for public key cryptographic schemes employing weak keys. One main reason for implementing weak key sizes is to ensure backward compatibility. Further, small key sizes are used in embedded environments with a scarcity of computational power for public-key cryptographic operations. Hence, several research studies assess the difficulty of the mathematical problem of prime factorization that underpins the security of RSA. They focus on the feasibility of integer factorization and the RSA factoring challenges thereof. A recent research study’s target was the RSA240 factoring challenge [
24], while previous records were related to breaking 768-bit keys [
23,
28]. RSA250 has 250 decimal digits (829 bits) and was only factored in 2020, which makes it a good candidate for exploring our method as it is of great research interest in the field of information security.
In this paper, let us now consider RSA250 to apply our approach of factorization where we limit the search using the attributes . We note that is known for RSA250 and hence the convergences for are known. Let us consider the numbers given below for RSA250:
[N] 2140324650240744961264423072839333563008614715144755017797754920881418023447140136643345519095804679610992851872470914587687396261921557363047454770520805119056493106687691590019759405693457452230589325976697471681738069364894699871578494975937497937
[P] 64135289477071580278790190170577389084825014742943447208116859632024532344630238623598752668347708737661925585694639798853367
[Q] 33372027594978156556226010605355114227940760344767554666784520987023841729210037080257448673296881877565718986258036932062711
The ratio of is given by the continued fraction below and has a length of 261. The italicized and underlined part of the continued fraction provides the first suitable convergence for which leads to a solution.
1 1 11 1 3 1 4 2 1 2 6 3 1 1 1 1 1 1 26 1 4 1 4 4 7 1 3 1 1 2 3 2 1 1 7 1 4 1 1 1 5 1 1 1 1 6 12 5 1 1 2 3 1 2 1 1 2 77 1 32 21 1 1 3 5 1 2 11 3 1 1 1 30 1 4 4 1 2 5 2 1 2 1 21 1 2 3 1 7 2 1 1 4 9 1 25 1 28 1 1 1 34 1 1 4 1 2 1 6 2 6 5 5 2 4 1 3 3 2 5 1 1 2 3 1 1 3 5 1 1 5 1 1 3 2 36 2 3 2 1 1 1 9 12 1 1 3 1 1 4 1 4 1 14 1 2 2 6 1 1 1 2 25 47 1 1 5 1 5 1 2 3 2 1 183 1 1 1 1 4 3 1 3 1 1 2 3 1 6 19 1 1 2 1 2 2 1 1 1 4 4 1 44 3 1 29 1 12 3 17 1 1 1 11 1 36 36 2 1 8 14 1 7 5 2 1 3 1 8 16 19 1 6 9 1 3 2 1 1 1 2 1 1 4 2 2 1 221 1 1 4 1 3 1 1 4 2 2 17 1 4 2
The 93rd convergence produces a suitable value which provides the solution for the factorization of RSA250 as given below:
[20443421210970393950075714352526296832610301015822553922756728245500732959311323112,
6614798436316441172282844923498308148226213631865434648727190399017807486039139073942545631415475256341666247623393955394055140997466682174264049017168200037978399935,
63565612507432739868213955281603065344711254828495897407657403845305428771221668091,
0].
In the case of RSA250, the underlined part of the continued fraction convergence given above for the convergence of the ratio illustrates that, using our method, a convergence using only 93 of the 261 terms produces a suitable value.
= 2^3 × 3 × 7 × 103 × 281 × 3407 × 72,907 × 157,733 × 334,993 × 26,532,262,619,089 × 106,061,927,979,829 × 113,832,765,910,030,508,110,732,786,883.
In RSA250, the representations of
and
have the same number of decimal digits. Using this property and the value of
, a lower bound and an upper bound for possible
values can be determined [
49]. The challenge is to find such a restricted search space for suitable
values. Using our method, an upper bound as well as a lower bound for
can be determined to limit that search area for suitable
values. For the case of RSA250, the ratio of
convergences reduces to a problem of a ratio given by a 41-bit convergence divided by another 41-bit convergence that results in an upper bound and lower bound for
. The essence of this is that our method reduces the problem of the search space in a prime field with 125 decimal digits for RSA250, which has 250 decimal digits. The problem reduces to searching for ratios (convergences) whose denominators and numerators are 41-decimal digit composites. We note that one of the composites is 113,832,765,910,030,508,110,732,786,883, which is a 30-decimal digit number.
The purpose of choosing a known RSA250 factorization to apply our method is twofold: firstly, we are able to determine that a solution exists, and secondly, we are able to determine the practical implication of our approach in reducing the size of the numbers that need to be manipulated to arrive at such a semi-prime factorization solution faster for breaking keys in real-life applications. The authors do acknowledge that the search now involves a larger range of composite candidates for the numerator and the denominator in determining the lower bound and upper bound for suitable values. Next, we provide further observations through the practical implementation presented that would interest researchers and practitioners in the field of information security.
5. Practical Implementation and Observations
In this section, we provide a practical implementation of our factorization approach using continued fractions and discuss our observations based on our experiment conducted with large integers. We note that brute force searching is feasible only for smaller integers. As reported in the literature, brute force methods are usually time-consuming and hence may not be efficient for many real-time applications [
50,
51]. Also, for large numbers, the
method may not be optimal. However, for all RSA numbers whose factorizations are known, a key observation provided in this paper shows that there is a relationship between the length of the continued fraction and the position where the first suitable
value appears. Further, all congruencies after this first
value are also valid
solutions. Exploring this relationship significantly reduces the search field for
. More experimental exploration in this direction is an area of our ongoing research.
We provide a three-step algorithm below and the practical implementation along with the source code in the Java programming language. The Java code illustrates the simplicity of the practical implementation of our algorithm and the potential to further develop applications in information security. Firstly, we present how the continued fraction is generated using the ratio of a known . We then use this set of convergences to create each convergence . From this we then determine . We recall . An explanation of the three steps in the algorithm and the Java code of the implementation are provided below.
Step 1: Obtain the continued fraction using the factorization of An implementation of this step in the Java programming language was developed to practically demonstrate our simple approach. The continued fraction is returned as shown in the code snippet of our implementation in Java:
public static BigInteger [] ContinuedFraction(BigInteger [] R) {
BigInteger [] ConFrac = new BigInteger [1000];
BigInteger NUMER=R[0], DENOM=R[1];
int i=0;
while(!(DENOM.equals(BigInteger.ONE))) {
R=NUMER.divideAndRemainder(DENOM);
ConFrac[i]=R[0];
NUMER=DENOM;
DENOM=R[1];i++;
}
ConFrac[i]=NUMER;
return ConFrac;
}
Step 2: For a specified number of convergence terms, calculate the convergence. The implementation in Java was developed as follows and the convergence fraction is returned.
public static BigInteger [] GetRatio(BigInteger [] ContinuedFraction,int SeriesLength) {
BigInteger [] RATIO = new BigInteger [2];
BigInteger RATIO2, NUMERATOR=BigInteger.ONE, DENOMINATOR;
RATIO[1]=BigInteger.ONE; DENOMINATOR=ContinuedFraction[SeriesLength];
for(int i=SeriesLength;i>0;i--) {
RATIO2=DENOMINATOR;
RATIO[1]=NUMERATOR;
RATIO[0]=ContinuedFraction[i-1];
NUMERATOR=RATIO2;
DENOMINATOR=RATIO2.multiply(RATIO[0]).add(RATIO[1]);
}
RATIO[0]=DENOMINATOR;
RATIO[1]=NUMERATOR;
return RATIO;
}
Step 3: Test the convergence and see if this is a solution for which that solves . The Java implementation of the logic is provided below and the result is presented as .
Public static Boolean ConFracSeries(BigInteger [] ContinuedFraction,int SeriesLength,
BigInteger N) {
BigInteger [] RATIO = new BigInteger [2], KABC = new BigInteger [4];
Boolean done=true;
int Maximum_Factors = 1000;
BigInteger [] R1Factors = new BigInteger [Maximum_Factors];
BigInteger [] R2Factors = new BigInteger [Maximum_Factors];
BigInteger K4;
for(int i=0;i<SeriesLength;i++) {
RATIO=GetRatio(ContinuedFraction,i);
K4=RATIO[0].multiply(RATIO[1]).multiply(new BigInteger(“4”));
String str=““+RATIO[0]+”/”+RATIO[1]+”=>“;System.out.print(str);
KABC=Get_KABC(K4,N); str=“ [k,a,b,c]=[“+KABC[0]+”,”+KABC[1]+”,”+KABC[2]+
“,”+KABC[3]+”]”; System.out.println(str);
if(KABC[3].equals(BigInteger.ZERO)) {i=SeriesLength;}
return done;
}
The astute reader will observe that for
, a solution is found when
. Another observation is that there are intermediate solutions which may be used in concert to find a solution. Some ideas from Silverman using multiple polynomials may produce results [
47]. Similarly, some recent research focusing on quantum computing and blockchain technologies requires that RSA cryptography be revisited [
52,
53,
54]. However, we observe that it is still not easy to solve the RSA modulus using quantum computing. Shor’s algorithm requires as many qubits as there are bits in the modulus [
12,
36,
55]. Quantum computers which can attack RSA easily are not expected in the immediate future. These ideas form areas of future ongoing research and are beyond the scope of this paper.
6. Extension to Research Using Difference of Squares
Our research investigations through the experimental study conducted have resulted in several findings, as described in previous sections. These form encouraging foundations for us to explore the theory of the difference of squares as a future research direction. Our observations from the practical examples given above motivate us to extend our research using difference of squares. We now explore this idea of difference of squares with the Brahmagupta–Fibonacci identity [
33], normally applied to
and
each as a sum of two squares. We apply the Brahmagupta–Fibonacci identity to
and
which we now express as a difference of two squares. We note that the Brahmagupta–Fibonacci identity has an inherent constraint in that it can only be applied to semi-primes congruent to
. Further, the two primes forming the construction of the semi-prime must also be congruent to
. This constraint limits the solvable semi-primes to a quarter of the possibilities. We are limited to only
for the solvable semi-primes as
,
cannot be resolved.
We note that the Brahmagupta–Fibonacci two-square identity is analogous to Euler’s four-square identity and this is relevant to the semi-prime factorization problem. A summary follows of the Brahmagupta–Fibonacci identity as well as its extensibility, which is also known as Euler’s Factorization.
Previously, the result arrived at was a sum of four squares which can be expressed as the product of two sums of two squares, as shown below:
Euler’s factorization method [
23] can be mathematically formulated as shown below:
The parity (
E: even;
O: odd) of the squares can be used to find a factor, as presented in our earlier work [
15].
We observe that the limitation of the sum of four squares is that it only applies to , which relates to Fermat’s Christmas Theorem discovered as early as 1640. Fermat’s Christmas Theorem on the sum of two squares states that an odd prime can be expressed as if .
The method outlined above is restricted to provide factors of semi-primes whose construction is of the form only. The solutions are limited in this case. It is observed that with , , the solvable semi-primes cannot be resolved.
We now propose an extension to the Brahmagupta–Fibonacci identity outlined above by not considering the sums of squares for the two prime number construction of the semi-prime. Instead, we will now consider the difference of squares. Using the difference of squares allows all of the primes, both and to be expressed in this way. By considering the difference of squares all primes can be considered, and, as a consequence, all semi-prime constructions may now be considered (not just the ∗ constructions).
The limitation of the sums of squares method of factorization is the key motivation in our work to consider the difference of squares. We then investigated with the following question in mind:
Can we modify the Brahmagupta–Fibonacci identity [
33] so that it can be applied to the difference of squares?
If we can find such a method, then we posit that Fermat’s factorization can be used.
This removes the constraint and includes all primes, namely .
The modified Brahmagupta–Fibonacci identity can be applied to the product of two differences of two squares as shown below:
, where P and Q are both odd primes.
Further, this can be extended such that
, where
P and
Q are both odd primes.
, ,
.
In
Section 4, we showed that the convergence provides a value for
that can be bound within a search field of composites with reduced complexity to about 1/3 of the number that is considered for factorization. We acknowledge that this is now in a composite field rather than a search in a prime field. The attributes of
are now further constrained and the search in the composites now requires that additional constraints be met, as shown below:
, ,
.
The above theoretical ideas pave the way for future research into extending the proposed algorithm with the aim of further reducing the search space in order to find a faster solution to the semi-prime factorization problem. However, comparative investigations on the difference of squares method are considered to be future work as they are beyond the scope of this paper.
7. Measures of Performance and Future Research
In this section, we identify suitable measures of performance for our proposed method and further improvement ideas in our ongoing research work. We consider the relationships between solutions of the form
and how the solution is found in a reduced search space. However, many intermediate solutions exist and we look for relationships between the following:
Further, we look for forms which fit into the modified Brahmagupta–Fibonacci identity.
7.1. Measures of Performance
Our ongoing research is motivated by comparing measures of performance for our method with some popular existing works. We summarize them below:
Lehman’s method [
31] looked for multipliers
. This obtained a factoring time of
The method presented here places a constraint on the lower bound of by removing continued fraction convergences which are unlikely to find a suitable value. We observe that a convergence appears approximately within one-third of the convergence and provides the upper and lower bound interval. A faster solution can be achieved by segmenting the interval to search in multi-processor platforms. This would be part of our ongoing research work considering other research ideas such as the difference of squares presented earlier.
It would be worthwhile to consider intermediate solutions of the form , which may otherwise have been discarded, that provide solutions to Such criteria would restrict the number of candidates for which are subjected to the limits of .
Our experiments were conducted with a computer with the following specifications: Intel Xeon E5-2697 v2 2.7 GHz, 32 GB DDR3 memory. From our previous example (21,565,941,721,999,797,939,843,713,963, which is a 95-bit prime number) considered by Crandall and Pomerance [
48] on pg307, we present the performance of our algorithm. A brute force search finds that 17,887/6172 leads to a factorization, with an exhaustive search time of 10 min 38 s.
Observe that .
From the earlier example, the continued fraction length was 26 and the 11th convergence provided a suitable value. The resulting factorization is shown below:
The continued fraction for is given as
1,000,000,000,000,037/21,565,941,721,999 => 46 2 1 2 2 2 2 1 1 1 3 8 13 1 263 1 5 38 1 4 1 2 8 2 1 1 2
Observe that the
.
Recalling the brute force method also obtains
A brute force search found the solution using the fraction 17,887/6172, whose factorizations are [31 577]/[2 2 1543], confirming the solution using our proposed method above.
7.2. Improvements and Future Research
Hart used
as
which is already known [
21]. We improved this by using
. This helps in reducing the search space to arrive at a faster convergence of a solution to the semi-prime factorization problem.
Wiener’s cryptographic attack against RSA using the continued fraction method [
55] motivates many researchers to continue exploring faster approaches to factorization of RSA. Public key encryption uses Euler’s totient function [
56,
57], which provides the basis for factoring algorithms that have a major impact on cybersecurity. Hence, past works on number theory, primality testing, and the implementation of algorithms [
58,
59,
60,
61,
62,
63] have been the backbone of this research work to arrive at a new method. Further, the speeding up of existing methods using more efficient methods and the adoption of more computing power, including parallelism [
64,
65,
66,
67], have fueled this ongoing research. Our research investigations have taken a modest step forward in this work and will continue to further reduce the search space for arriving at a solution to the semi-prime factorization problem more quickly. We hope that our research work on Hart’s one line factorization method will stimulate interest in this method. In future work, we intend to investigate the use of our narrower definition of the parameterization of
to demonstrate further improvements in the Wiener attack. The scope of this investigation is well outside of this paper due to the limitations stated before.
8. Conclusions
This paper proposed a new approach of applying continued fractions to the one line factoring algorithm. Lower ordered convergences as representations of that form continued fractions were applied to Hart’s one line factoring algorithm. We illustrated our method using a worked example as well as by finding the factors of RSA250 successfully. The key contributions of this work that paves the way for further research are as follows:
We established that continued fraction convergences as representations of provide solutions to Hart’s one line factorization.
We explored relationships of the form for convergence.
We investigated the suitability of the modified Brahmagupta–Fibonacci identity for factorization considering
Our experimental findings include the RSA modulus, the ratio of to be constrained by a particular number of bits.
such that .
is still an area of interest and may yet yield deeper connections.
In this paper, we studied many correct solutions which formed the convergences of that had not been explored previously. The results shown in this paper are quite important as we explored the relationship between the convergence of and its relationship to , which is used in Hart’s one line factorization algorithm. Our significant contribution is that after about one third of the way through the convergences, solutions for were found and all convergences after that resulted in valid solutions for . Further, there is a scarcity of research exploring the attributes of , and this paper provides a better understanding of its attributes.
Further, our practical implementation along with our findings motivated us to extend the study using the difference of squares. The theory on the difference of squares provides the relationship to the proposed approach and future extensions to our algorithm, motivating other researchers to consider such extensions to the existing work. We believe the observations and limitations of this will open future investigations as forms of ongoing research.
In
Section 4, we showed that the convergence that provides a value for
can be bound to a search field of composites with reduced complexity to about 1/3 of the number attempting to be factorized whilst acknowledging that this is now a search in a composite field rather than a search in a prime field. In
Section 6, the attributes of
were further defined, thereby constraining the suitable composite candidates for
.
Our findings are unique in that only one other paper has been published regarding Hart’s one line factoring algorithm since its publication in 2012.
It is hoped that the wider research community might find our results interesting and that further investigations into Hart’s work might be encouraged.