Professional Documents
Culture Documents
METHODS
*Correspondence:
Richard Omollo,
richard.otieno@gmail.com
Arnold Okoth,
arnolaeustein9790@gmail.com
RSA’s strong cryptosystem works on the principle that there are no trivial solutions to integer factorization.
Furthermore, factorization of very large semi primes cannot be done in polynomial time when it comes to the
processing power of classical computers. In this paper, we present the analysis of Fermat’s Last Theorem and
Arnold’s Theorem. Also highlighted include new techniques such as Arnold’s Digitized Summation Technique
(A.D.S.T.) and a top-to-bottom, bottom-to-top approach search for the prime factors. These drastically reduce
the time taken to factorize large semi primes as for the case in RSA Cryptosystem.
Keywords: Arnold’s theorem, Fermat last theorem, RSA Cryptosystem, semi primes, factorization limit, Fermat
method, RSA numbers.
1. Introduction for a 2.2 GHz Opteron computer to factorize a 232 digit RSA
number (5).
In year 1978, Ronald Rivest, Adi Shamir and Leonard Recently, there have been advancements in the field of
quantum cryptography which might lead to the possibility of
Adleman released one of the first public-key cryptosystem
factorizing these large semi primes in just a few days if not
(1) known as RSA Cryptosystem. It has been over 40 years
hours (6). The Shor Algorithm is one of the most commonly
down the line and it still one of the strongest cryptosystems used algorithms in quantum computing developed by Peter
in the world. It takes one of the greatest problems in Shor. Though quantum cryptography seems promising, they
Number Theory (integer factorization) to be one of the most are still not yet widely applicable (7). This might remain
suitable solutions to computer security. There are still no the case for the next few years to come. In comparison,
trivial solutions to the factorization of semi primes. The classical computers still cannot factorize very large semi
RSA Cryptosystem works on the basis of multiplying two primes in polynomial time (8, 9). At least not until there are
relatively large prime numbers k and l of at least 50 digits significant technical developments in the processing power
each (2, 3). The semi prime (y) obtained can be as big as of the classical computers or a breakthrough is found for
integer factorization. If a trivial solution is found for integer
100 to 600 digits (500 to 2048 bits). Attempts have been
factorization then the RSA Cryptosystem would be rendered
made to crack these RSA numbers with modern factorization
useless (10).
methods such as the Elliptic Curve Method, Quadratic Field We are going to analyze a version of Fermat’s Last
Sieve and the Number Field Sieve (4). Still, the factorization Theorem and Arnold’s Theorem for right angled triangles.
of these large semi primes might take several months even From the Fermat’s Last Theorem, we obtain the shortened
for a supercomputer. It takes an estimated 2000 years’ work Diophantine equation
1
2 Omollo and Okoth
We have seen that x + z = k and x − z = l. From the Given the semi prime 55, one finds the two prime numbers
two equations we get that z can be expressed as z = k − x given that the prime difference is 6?
and z = x − l. Combining the two equations we get Solution
k − x = x − l and k + l = 2x. Dividing both Since z = d2
sides by 2, one gets that x = k+l 2 . Replacing the x in the 6
equation z = k − z we getz = k + k+l 2 . This can be factored
z = = 3
2
into the equation z = k−l2 .
Replacing the x and z in the equation x2 − z2 = y with We also know that x2 − z2 = y and we have the value for z
x = k+l k−l and y. After replacing these values, we get the equation x2 −
2 and z = 2 .
We get 32 = 55 which is x2 = 55+9 = 64. Therefore, x will be 8.
We also saw that x + z = k and x − z = l where k and l are
k+l 2 k−l 2 the two prime numbers.
( ) −( ) = y.
2 2 So 8 + 3 = k and 8 − 3 = l
The two prime numbers will be k = 11 and l = 5.
2
The equation ( k+l
2 ) is expanded to k, l, x, y, z, d ∈ N
k2 +2kl+l2 2 Theorem 3.2
4 And the equation ( k−l
2 ) is expanded to
Arnold’s Theorem for right angled triangle states
k2 − 2kl + l2 that a2 = b+c. If a is the smallest side of a right-angled
. triangle where ab and a = b thenc-b = 1
4
Proof
Therefore, The Pythagorean equation a2 + b2 = c2 can also be
2 2
( k+l k−l
2 ) −( 2 ) = y becomes written as a2 = c2 − b2 . This can be expanded to the
equation a2 = (c + b)(c − b). So if c − b = 1 it leaves
k2 + 2kl + l2 k2 − 2kl + l2 us with the equation
− = y.
4 4
a2 = b+c
Solving the equation, we get,
Therefore, the two equations which form Arnold’s Theorem
k2 + 2kl + l2 k2 − 2kl + l2 for right angled triangles are
−
4 4
2 2 2 +2kl−l2 a2 = b+c
= k +2kl+l −k
4 = 4kl
4 = kl.
and
Hence;
c−b = 1
y = kl
Using the two equations we can formulate the simultaneous
We have observed that z can be expressed as the equation
equation z = k−l 2 and k-l = d. So by replacing k − l
c + b = a2 (a)
with d in the first equation, we get that z = d2 . This can also
be written as
d = 2z c−b = 1 (b)
also since (x + z)(x − z) = y and d = (x + z) − (x − z). So when a right angled triangle satisfies both equation and
This gives us d = x + z − x = z which can be solved back we are only given the value of a, we can easily obtain the
tod = 2z. The value of d and z are directly proportional, so two other sides. This is possible through the simultaneous
if the prime difference is big then the z is also be big. Also, equation above. This brings us back to the equation x2 −
we know that x > z, so during computation it takes a longer z2 = y in theorem 3.1. In this case, we replace a2 withy.
time to find the value of x if d is very large. This is because So when you are only given the semi prime y, one solves it
using the Fermat method for factorizing semi primes; we first using the simultaneous equation
start by the searching for the value of x.
From the equations above we can tell that just by having
the semi prime and the prime difference we obtain the two x+z = y (a)
other prime numbers k and l. This is majorly due to the
fact that d = 2z.
Problem x−z = 1 (b)
4 Omollo and Okoth
x−z = 2 (b)
3.1. RSA cryptosystem
Solving for the semi prime 55 we will get
RSA Cryptosystem relies on the fact that finding the prime
difference of two large prime numbers of at least 50 digits 2x + 2z = 55 (a)
10.54646/bijscit.2021.11 5
which one keeps adding till he is left with only one digit,
so if one gets 10 one adds 1 + 0 = 1. The process of
adding is what is referred to as A.D.S.T. The resultant digit 1
becomes the Digitized Number Form (D.N.F.) of the number
1234. Since RSA Cryptosystem is based on using very large
numbers even up to 600 digits, we are going to utilize A.D.S.T
to look at some properties of such numbers which would
otherwise be hard to observe. The Python code below is
supposed to sum down a 1000 digits number into a single
digit in just a few seconds.
Considering that we are only given the semi prime (y),
we first need to find the digitized number form through
A.D.S.T. In other words, we need to add the digits of
that semi prime until we are left with only one single
digit. Since the semi primes in the case of RSA numbers
have over 100 digits, the Python code above is of great
FIGURE 2 | The graph shows the plotted values for the different help since it can find the D.N.F. of a-thousand-digit semi
values of x − z in x2 − z2 = 55. prime in just a second. If the Digitized Number Form
(D.N.F.) is 2, 5 or 8, it means that the semi prime is of
the form 6n − 1. If it is 1, 4 or 7, it means that the semi
prime is of the form 6n + 1. A semi prime cannot have
x−z = 2 (b)
a D.N.F. of 3, 6 or 9. This is because such numbers are
We multiply equation Eqn.(b) by 2 and add the two equations all multiples of 3. This holds true if the semi prime is an
which give us x = 14.75. Substituting the x in equation odd number, which is true for almost all cases apart from
b we get that z = 14.75 − 2. Therefore, x = 14.75 when another prime number is multiplied by 2 which is
and z = 12.75. also a prime number.
From the Table 1 above we observe that only when x − z is Examples
1, 5 and 11 is when the values of x, y and z are whole numbers. 55 = 5 + 5 = 10,10 = 1 + 0 = 1 D.N.F. of 55 is 1 and
That isx, y, z ∈ Z. We also observe that the integers of x − z is of the form (6n + 1)
are the same when x −z = l and x +z = kwhich in our case 65 = 6 + 5 = 11, 11 = 1 + 1 = 2 D.N.F. of 65 is 2 and
is 5 and 11. But for x-z = 11 the 3 in z is negative. The real is of the form (6n − 1)
value for x − z is actually 6 but in our case, it gives us different 99 = 9 + 9 = 18, 18 = 1 + 8 = 9 D.N.F. of 99 is 9 and
values for x and z. However, when we use 6 as the prime it will be a multiple of 3
difference in Fermat’s Last Theorem equation x2 − z2 = y For even numbers, if a number has a D.N.F. of 1, 4 or 7,
we obtained the values for x and z to be 8 and 3, respectively. then it is of the form 3n + 1 where n is an odd number. If a
Furthermore, one also notice that for (x − z) = 6 which is number has a D.N.F. of 2, 5 or 8, then it is of the form 3n − 1.
the actual prime difference between the two prime numbers If it has a D.N.F. of 3, 6 or 9 it still remains to be a multiple of
the value of z are less than one. That is z < 1. 3. So how does A.D.S.T. come in to the actual equation used
The y-axis represents x2 while the x- axis represents z2 . in the factorization process?
The use of such curves is used in another complex method
of factorizing numbers known as the Elliptic Curve Method
which is not discussed in depth in this paper. 3.3. Arnold’s digitized summation
technique and the x2 −z2 = y equation
3.2. Arnold’s digitized summation When we look at the D.N.F. of numbers forming the
technique (A.D.S.T.) equation x2 − z2 = y, we notice something very interesting.
Below, we have highlighted two tables which form the basic
We are now going to bring in Arnold’s Digitized Summation identities for semi primes having either a D.N.F. of 1, 4 and
Technique which simply involves adding the digits of a 7 or 2, 5 and 8.
number until one is left with only one digit. When one adds From Table 2 we notice that all the values of x2 have a
the digit of a number like 1234 one gets 1 + 2 + 3 + 4 = 10, D.N.F. of 9 and from Table 3, we notice that all the values
6 Omollo and Okoth
FIGURE 3 | Python code showing how you can obtain the A.D.S.T. of a number.
of z2 have a D.N.F. of 9. This means that those values Now we are look at examples of real values x2 − z2 = y
are actually multiples of 9. This property is seen with the and their D.N.F. This time the values of Tables 8, 10 are
multiples of 9 shown below. obtained from Arnold’s Theorem for right angled triangles
Example as shown in theorem 3.2.
9 = 9 D.N.F. is 9 It is important to note that the values for the semi prime
18 = 1 + 8 = 9 D.N.F. is 9 y are the same for Tables 4, 8. The same is seen with
27 = 2 + 7 = 9 D.N.F. is 9 Tables 6, 10 which have the same values for y. But as we
36 = 3 + 6 = 9 D.N.F. is 9 saw earlier, the two theorems give different values for x and z.
45 = 4 + 5 = 9 D.N.F. is 9
54 = 5 + 4 = 9 D.N.F. is 9
TABLE 2 | D.N.F. of the values of x and z when the D.N.F. of the semi
63 = 6 + 3 = 9 D.N.F. is 9 primes are 2, 5 and 8.
72 = 7 + 2 = 9 D.N.F. is 9
x2 − z2 = y
81 = 8 + 1 = 9 D.N.F. is 9
90 = 9 + 0 = 9 D.N.F. is 9 9 − 7 = 2
Examples of real values of x2 − z2 = y and their 9 − 4 = 5
D.N.F. are shown on the tables below. The values of 9 − 1 = 8
Tables 4, 6 are obtained from Fermat Last Theorem as
shown in theorem 3.1.
TABLE 3 | D.N.F. of the values of x and z when the D.N.F. of the semi
primes are 1, 4 and 7.
TABLE 1 | The values of x − z from 1 to 11 for the semi prime 55.
x2 − z2 = y
x-z x2 −z2 = y
1 − 9 = 1
1 282 − 272 = 55 4 − 9 = 4
2 14.752 − 12.752 = 55 7 − 9 = 7
3 10.666672 − 7.666672 = 55
4 8.8752 − 4.8752 = 55
5 8 2 − 32 = 55 TABLE 4 | Real values of x, y and z when the D.N.F. of the semi
6 7.583332 − 1.583332 = 55 primes are 2, 5 and 8.
7 7.428572 − 0.428572 = 55
x2 − z2 = y
8 7.43752 − (−0.5625)2 = 55
9 7.555562 − (−1.44444)2 = 55 81 − 16 = 65
10 7.752 − (−2.55)2 = 55 81 − 4 = 77
11 82 − (−3)2 = 55 36 − 1 = 35
10.54646/bijscit.2021.11 7
However, the D.N.F. identity actually remains the same when TABLE 11 | D.N.F of x, y and z for the values in Table 10.
we use either of the two theorems.
x2 − z2 = y
1 − 9 = 1
TABLE 5 | D.N.F. of x, y and z for the values in Table 4.
4 − 9 = 4
x2 − z2 = y 7 − 9 = 7
9 − 7 = 2
9 − 4 = 5
From Tables 4, 6, 8, 10 we also notice that if x2 or z2 is an
9 − 1 = 8
even number in x2 − z2 = y (Fermat’s Last Theorem) then it
also be an even number in x2 − z2 = y (Arnold’s Theorem)
TABLE 6 | Real values of x,y and z when the D.N.F. of the semi
primes are 1, 4 and 7.
3.4. Arnold’s digitized summation
x2 − z2 = y technique and they = 1 operation
64 − 9 = 55
Here we look at the final step in an attempt to factorize
256 − 9 = 247
large semi primes in polynomial time. We have a total of 4
196 − 81 = 115
scenarios for the y = 1 operation.
i. If y+1 is divisible by 4 and y has a D.N.F. of 2, 5 or 8, then
x2 is divisible by 36.
TABLE 7 | D.N.F of x, y and z for the values in Table 6.
ii. If y-1 is divisible by 4 and y has a D.N.F. of 2, 5 or 8, then
x2 − z2 = y z2 is divisible by 4.
iii. If y+1 is divisible by 4 and y has a D.N.F. of 1, 4 or 7,
1 − 9 = 1 then x2 is divisible by 4.
4 − 9 = 4 iv. If y-1 is divisible by 4 and y has a D.N.F. of 1, 4 or 7,
7 − 9 = 7 then z2 is divisible by 36.
We obtained these properties of the semi primes while
trying to find the trivial solution for integer factorization.
TABLE 8 | Real values of x, y and z when the D.N.F. of the semi Eventually, we did not get any trivial solution after the
primes are 2, 5 and 8. analysis of several semi primes and composite numbers in
x2 − z2 = y
general. However, by studying the sequence of semi primes
containing the same D.N.F., we were able to come up with the
1089 − 1024 = 65 four definite scenarios shown above. They are incorporated
1521 − 1444 = 77 into the programs which were running simultaneously in
324 − 289 = 35 search for the value of x2 and z2 . They are able to drastically
reduce the time taken to factor large semi primes once
combined with the top-to-bottom, bottom-to-top approach.
TABLE 9 | D.N.F of x, y and z for the values in Table 8. We are still carrying out further research in search for a trivial
solution for integer factorization.
x2 − z2 = y
9 − 7 = 2
9 − 4 = 5 4. Conclusion
9 − 1 = 8
We can be able to conclude that it is technically possible
to factorize relatively large semi primes in polynomial time
using the processing power of the average classical computer.
TABLE 10 | Real values of x, y and z when the D.N.F. of the semi
primes are 1, 4 and 7. Using techniques such as Arnold’s Digitized Summation
Technique (A.D.S.T.) and the top-to-bottom, bottom-to-
x2 − z2 = y top approach, the time taken to factorize large semi primes
784 − 729 = 55
will be drastically reduced. This, we find that has greater
15376 − 15129 = 247
implications on RSA which is about large prime numbers.
3364 − 3249 = 115
Our paper provides an insight into reviewing RSA and
excites further research interests in co-primes and primes,
8 Omollo and Okoth
as a breakthrough to improving cryptographic chances in 11. Barakat M, Eder C, Hanke T. An introduction to cryptography. (2018).
computer and network security in regards to data. 145 p. Available online at: https://www.mathematik.uni-kl.de/~{}ederc/
download/Cryptography.pdf
12. Crandall R, Pomerance C. Prime numbers: a computational perspective.
New York: Springer-Verlag (2005). 597 p.
References 13. Borevich ZI, Shafarevich IR. Number theory. Cambridge, MA: Academic
Press (1996). 435 p.
1. Smart N. Cryptography: an introduction. New York: McGraw-Hill 14. Janacek GJ, Close ML. Mathematics for computer scientists. Norwalk, CT:
College (2004). 433 p. Ventus Publishing (2011). 153 p.
2. Katz J, Lindell Y. Introduction to modern cryptography. Washington, DC: 15. Stallings W. Cryptography and network security: principles and practice.
CRC Press (2007). 248 p. Prentice Hall, NJ: Prentice Hall (2011). 900 p.
3. Finotti L. A gentle introduction to number theory and cryptography. 16. Barnett JH. Generating pythagorean triples: a gnomonic exploration.
(2009). 60 p. Available online at: https://www.math.utk.edu/~{}finotti/ (2017). Available online at: https://digitalcommons.ursinus.edu/cgi/
papers/grad.pdf viewcontent.cgi?article=1008&context=triumphs_number
4. Bhatt M, Aneja A, Tripathi S. Classical cryptography v/s quantum 17. Stein W. Elementary number theory: primes, congruence and secrets.
cryptography: a comparative study. Int J Electr Comput Sci Eng. (1956) (2017). 172 p. Available online at: https://wstein.org/ent/ent.pdf
1:121–9. 18. Lehman E, Leighton FT, Meyer AR. Mathematics for computer science.
5. Barak B. An intensive introduction to cryptography. (2018). 366 (2017). 988 p. Available online at: https://courses.csail.mit.edu/6.042/
p. Available online at: https://files.boazbarak.org/crypto/lnotes_book. spring17/mcs.pdf
pdf 19. Saul A, Mario C. Hidden structures in the randomness of prime number
6. Hayward M. Quantum computing and shor’s algorithm. (2015). sequence? (2005). Available online at: https://arxiv.org/abs/cond-mat/
59 p. Available online at: https://pdfs.semanticscholar.org/8072/ 0310148
dc7247460849b18abbb463429a09cfb2e3e6.pdf 20. Tao T. Structure and randomness in the prime numbers. (2007).
7. Duplij SA, Shapoval II. Quantum computations: fundamentals and Available online at: https://www.math.ucla.edu/~{}tao/preprints/Slides/
algorithms. Problems Atomic Sci Technol. (2007) 2007:230–5. primes.pdf
8. Devlin K. The millennium problems: the seven greatest unsolved 21. Michele E. Mathematics and culture III. Berlin Heidelberg: Springer-
mathematical puzzles of our time. Basic Books (2002) 2002:288. Verlag (2012). 208 p.
9. Budd S. The distribution of prime numbers and its applications. 22. Baibekov S, Altynbek S. Development of New Methods for Generating
(2015). Available online at: https://www.lakeheadu.ca/sites/default/files/ Prime Numbers. Nat Sci Sci Res Publis. (2015) 7:416–23.
uploads/77/images/Budd%20Samuel.pdf 23. Okoth A, Okelo B. Arnold’s digitized summation technique and the
10. Schneier B. Applied cryptography: protocols, algorithms, and source code generalized notion of the collatz conjecture. Int J Mod Comput Inform
in C. New York: John Wiley & Sons (1996). 784 p. Commun Technol. (2019) 2:36–42.