LLMpediaThe first transparent, open encyclopedia generated by LLMs

Integer factorization

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: subset sum problem Hop 4
Expansion Funnel Raw 84 → Dedup 9 → NER 7 → Enqueued 5
1. Extracted84
2. After dedup9 (None)
3. After NER7 (None)
Rejected: 2 (not NE: 2)
4. Enqueued5 (None)
Similarity rejected: 1
Integer factorization
NameInteger factorization
FieldNumber theory
IntroducedAntiquity
NotableCarl Friedrich Gauss; Pierre de Fermat; Édouard Lucas; John Pollard; Peter Shor; Daniel J. Bernstein; Andrew Wiles

Integer factorization Integer factorization is the problem of expressing a composite integer as a product of smaller integers greater than one; it is a central problem in Number theory and a cornerstone of modern cryptographic practice such as RSA (cryptosystem), Diffie–Hellman key exchange implementations and protocols used by institutions like National Institute of Standards and Technology and corporations such as IBM and Google. The task connects to deep results in Algebraic number theory and computational complexity studies at organizations like MIT and Bell Labs, and it motivated algorithmic research by figures including Carl Friedrich Gauss, Pierre de Fermat, Édouard Lucas, and contemporary researchers such as John Pollard and Peter Shor.

Definition and mathematical significance

Integer factorization asks, for a given integer N>1, to find integers p and q with 1Euclid and Sophie Germain. This problem is fundamental in Arithmetic geometry and relates to structures in Ring theory and Galois theory employed by mathematicians such as Évariste Galois and Richard Dedekind. Primality, contrastingly, was settled algorithmically by the Agrawal–Kayal–Saxena result and advanced by contributors at institutions including Princeton University and University of Waterloo. The mathematics of factorization informs results in Modular arithmetic used by implementations at RSA Security and standards bodies like Internet Engineering Task Force.

Algorithms

Classical approaches include trial division taught since the era of Euclid and the method of factoring by difference of squares developed by Pierre de Fermat, while more advanced algorithms were introduced by Édouard Lucas and later researchers at Cambridge University and University of Birmingham. Notable algorithms are the Fermat factorization method, the Pollard's rho algorithm by John Pollard, the Elliptic curve factorization method by H. W. Lenstra Jr., and the Quadratic sieve developed by teams at CWI and AT&T Bell Laboratories. The most powerful classical general-purpose method is the General number field sieve, a collaborative achievement by researchers at University of Georgia, NEC, and IBM. Special-purpose algorithms such as the Pollard's p−1 method and sieving techniques were refined by groups at École Normale Supérieure and NAGRA. Quantum algorithms including Shor's algorithm by Peter Shor—developed at AT&T Bell Laboratories and later analyzed at MIT Lincoln Laboratory—promise polynomial-time factorization on fault-tolerant quantum hardware pursued by Google Quantum AI, IBM Quantum, and academic labs at University of California, Berkeley.

Complexity and computational hardness

The complexity classification of factorization ties to open problems studied in seminars at Carnegie Mellon University and Stanford University. Factorization is in both NP and co-NP under assumptions linked to Primality testing work by Miller–Rabin and Adleman–Pomerance–Rumely, and it belongs to BQP if quantum models built by John Preskill and Seth Lloyd scale. The problem's presumed hardness underpins security arguments by researchers at Harvard University and Yale University for widely used cryptosystems such as RSA (cryptosystem); cryptanalytic breakthroughs by teams at Bell Labs or ENISA would have major impact. Average-case and worst-case analyses have been advanced by theoreticians like Oded Goldreich and Shafi Goldwasser and by complexity theorists at Max Planck Institute for Informatics and CNRS.

Applications

Practical applications center on public-key cryptography as standardized by RSA Security, IETF, and NIST; factorization hardness secures digital signatures used in Secure Sockets Layer deployments by companies including Microsoft and Apple. Integer factorization informs integer relation problems used by researchers at ETH Zurich and University of Cambridge in computational algebra systems such as those from Wolfram Research and SageMath development teams. Cryptographic protocols for e‑commerce adopted by Visa and Mastercard rely on keys whose security assumes factorization difficulty, while post‑quantum cryptography initiatives at NIST and laboratories at Duke University explore alternatives in light of quantum algorithm advances by groups at Google and IBM.

Historical development and notable results

Factorization dates to antiquity with methods implicit in works of Euclid and later systematic treatments by Pierre de Fermat and Leonhard Euler. In the 19th century, developments by Carl Friedrich Gauss, Adrien-Marie Legendre, and Joseph Liouville laid theoretical foundations, while 20th-century computational milestones involved Édouard Lucas and algorithmic progress at AT&T Bell Laboratories, CWI, and IBM. Landmark achievements include the quadratic sieve and general number field sieve milestones engineered by collaborations among researchers at University of Wisconsin–Madison, RSA Laboratories, École Polytechnique, and Max Planck Institute; record factorizations have been announced by teams coordinated through Cado-NFS and projects involving University of Bonn and Université de Lorraine. Quantum factorization demonstrations by groups at University of Maryland and Google Quantum AI validated small instances of Shor's algorithm, while cryptanalytic efforts by academics at University of Texas at Austin and industry researchers continue to push limits on key sizes and algorithmic techniques.

Category:Number theory