2019
DOI: 10.1109/access.2019.2953755
|View full text |Cite
|
Sign up to set email alerts
|

The Integer Factorization Algorithm With Pisano Period

Abstract: Large integer factorization is one of the basic issues in number theory and is the subject of this paper. Our research shows that the Pisano period of the product of two prime numbers (or an integer multiple of it) can be derived from the two prime numbers themselves and their product, and we can therefore decompose the two prime numbers by means of the Pisano period of their product. We reduce the computational complexity of modulo operation through the ''fast Fibonacci modulo algorithm'' and design a stochas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Moreover, if 𝑘 = 1 and 𝑏 = −1, then 𝑡 𝑛 is a Mersenne number 𝑀 𝑛 . 22 This test is considered a deterministic primality test for Mersenne numbers. It is based on the recursive Lucas sequence in the special case {𝑃, 𝑄} = {4,1}.…”
Section: Remarkmentioning
confidence: 99%
“…Moreover, if 𝑘 = 1 and 𝑏 = −1, then 𝑡 𝑛 is a Mersenne number 𝑀 𝑛 . 22 This test is considered a deterministic primality test for Mersenne numbers. It is based on the recursive Lucas sequence in the special case {𝑃, 𝑄} = {4,1}.…”
Section: Remarkmentioning
confidence: 99%
“…A recent experimental study employed the representation of primes in the form p = 6 • x ± 1 and applied the theory to the RSA factorization problem [73]. Another work shows the decomposition of the two prime numbers with the Pisano period factorization method, which has been proven to be a subexponential complexity method [74]. Several integer factorization methods have also suggested direct application to cryptanalysis of RSA by applying different genetic algorithms [75].…”
Section: Application Example 1 Let Us Consider Case Example 2 With N = 377mentioning
confidence: 99%
“…To give access to the S1 robot, we modified the classical El Gamal algorithm with a split private key [ 34 ]. The description of this algorithm is further presented.…”
Section: Proposed Solutionmentioning
confidence: 99%