{"id":"https://openalex.org/W3212531655","doi":"https://doi.org/10.3390/jcp1040033","title":"New Semi-Prime Factorization and Application in Large RSA Key Attacks","display_name":"New Semi-Prime Factorization and Application in Large RSA Key Attacks","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3212531655","doi":"https://doi.org/10.3390/jcp1040033","mag":"3212531655"},"language":"en","primary_location":{"id":"doi:10.3390/jcp1040033","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040033","pdf_url":"https://www.mdpi.com/2624-800X/1/4/33/pdf?version=1636713805","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/1/4/33/pdf?version=1636713805","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075768664","display_name":"Anthony Overmars","orcid":"https://orcid.org/0000-0001-7021-4774"},"institutions":[{"id":"https://openalex.org/I4403386716","display_name":"Melbourne Polytechnic","ror":"https://ror.org/04cq7wg91","country_code":null,"type":"education","lineage":["https://openalex.org/I4403386716"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Anthony Overmars","raw_affiliation_strings":["Department of Information Technology, Melbourne Polytechnic, 77 St. Georges Rd., Preston, VIC 3072, Australia"],"raw_orcid":"https://orcid.org/0000-0001-7021-4774","affiliations":[{"raw_affiliation_string":"Department of Information Technology, Melbourne Polytechnic, 77 St. Georges Rd., Preston, VIC 3072, Australia","institution_ids":["https://openalex.org/I4403386716"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072259792","display_name":"Sitalakshmi Venkatraman","orcid":"https://orcid.org/0000-0002-2772-133X"},"institutions":[{"id":"https://openalex.org/I4403386716","display_name":"Melbourne Polytechnic","ror":"https://ror.org/04cq7wg91","country_code":null,"type":"education","lineage":["https://openalex.org/I4403386716"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Sitalakshmi Venkatraman","raw_affiliation_strings":["Department of Information Technology, Melbourne Polytechnic, 77 St. Georges Rd., Preston, VIC 3072, Australia"],"raw_orcid":"https://orcid.org/0000-0002-2772-133X","affiliations":[{"raw_affiliation_string":"Department of Information Technology, Melbourne Polytechnic, 77 St. Georges Rd., Preston, VIC 3072, Australia","institution_ids":["https://openalex.org/I4403386716"]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072259792"],"corresponding_institution_ids":["https://openalex.org/I4403386716"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":0.61,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.67991403,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"1","issue":"4","first_page":"660","last_page":"674"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/prime-factor","display_name":"Prime factor","score":0.7355618476867676},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.7290244102478027},{"id":"https://openalex.org/keywords/factorization","display_name":"Factorization","score":0.7052528262138367},{"id":"https://openalex.org/keywords/pythagorean-triple","display_name":"Pythagorean triple","score":0.6948040127754211},{"id":"https://openalex.org/keywords/fibonacci-number","display_name":"Fibonacci number","score":0.6190444827079773},{"id":"https://openalex.org/keywords/integer-factorization","display_name":"Integer factorization","score":0.602556586265564},{"id":"https://openalex.org/keywords/fermats-last-theorem","display_name":"Fermat's Last Theorem","score":0.5635013580322266},{"id":"https://openalex.org/keywords/prime","display_name":"Prime (order theory)","score":0.5553542375564575},{"id":"https://openalex.org/keywords/pythagorean-theorem","display_name":"Pythagorean theorem","score":0.5441000461578369},{"id":"https://openalex.org/keywords/prime-number","display_name":"Prime number","score":0.4956437349319458},{"id":"https://openalex.org/keywords/fermats-little-theorem","display_name":"Fermat's little theorem","score":0.4808312654495239},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.4747477173805237},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4669894576072693},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.4638637900352478},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42203304171562195},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.3806791305541992},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2976844310760498},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2590258717536926},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.24713349342346191},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2106597125530243},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.1339893937110901}],"concepts":[{"id":"https://openalex.org/C30860621","wikidata":"https://www.wikidata.org/wiki/Q49008","display_name":"Prime factor","level":3,"score":0.7355618476867676},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.7290244102478027},{"id":"https://openalex.org/C187834632","wikidata":"https://www.wikidata.org/wiki/Q188804","display_name":"Factorization","level":2,"score":0.7052528262138367},{"id":"https://openalex.org/C80918210","wikidata":"https://www.wikidata.org/wiki/Q208225","display_name":"Pythagorean triple","level":3,"score":0.6948040127754211},{"id":"https://openalex.org/C173734053","wikidata":"https://www.wikidata.org/wiki/Q47577","display_name":"Fibonacci number","level":2,"score":0.6190444827079773},{"id":"https://openalex.org/C119677069","wikidata":"https://www.wikidata.org/wiki/Q4846249","display_name":"Integer factorization","level":4,"score":0.602556586265564},{"id":"https://openalex.org/C87670640","wikidata":"https://www.wikidata.org/wiki/Q132469","display_name":"Fermat's Last Theorem","level":2,"score":0.5635013580322266},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.5553542375564575},{"id":"https://openalex.org/C100461760","wikidata":"https://www.wikidata.org/wiki/Q11518","display_name":"Pythagorean theorem","level":2,"score":0.5441000461578369},{"id":"https://openalex.org/C113429393","wikidata":"https://www.wikidata.org/wiki/Q49008","display_name":"Prime number","level":2,"score":0.4956437349319458},{"id":"https://openalex.org/C54014305","wikidata":"https://www.wikidata.org/wiki/Q188295","display_name":"Fermat's little theorem","level":5,"score":0.4808312654495239},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.4747477173805237},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4669894576072693},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4638637900352478},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42203304171562195},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.3806791305541992},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2976844310760498},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2590258717536926},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.24713349342346191},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2106597125530243},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.1339893937110901},{"id":"https://openalex.org/C45962547","wikidata":"https://www.wikidata.org/wiki/Q1422068","display_name":"Fixed-point theorem","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C48540410","wikidata":"https://www.wikidata.org/wiki/Q5221089","display_name":"Danskin's theorem","level":4,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C146147875","wikidata":"https://www.wikidata.org/wiki/Q1144897","display_name":"Brouwer fixed-point theorem","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp1040033","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040033","pdf_url":"https://www.mdpi.com/2624-800X/1/4/33/pdf?version=1636713805","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f2a3635dcb11429dbc21550541bd6d0e","is_oa":true,"landing_page_url":"https://doaj.org/article/f2a3635dcb11429dbc21550541bd6d0e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 1, Iss 4, Pp 660-674 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp1040033","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040033","pdf_url":"https://www.mdpi.com/2624-800X/1/4/33/pdf?version=1636713805","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3212531655.pdf","grobid_xml":"https://content.openalex.org/works/W3212531655.grobid-xml"},"referenced_works_count":70,"referenced_works":["https://openalex.org/W632101912","https://openalex.org/W1497375467","https://openalex.org/W1553510179","https://openalex.org/W1558077212","https://openalex.org/W1568671078","https://openalex.org/W1968546374","https://openalex.org/W1993840452","https://openalex.org/W2009155740","https://openalex.org/W2015796533","https://openalex.org/W2026499134","https://openalex.org/W2042923641","https://openalex.org/W2061422880","https://openalex.org/W2065238739","https://openalex.org/W2071593615","https://openalex.org/W2095985205","https://openalex.org/W2104899073","https://openalex.org/W2129272955","https://openalex.org/W2134101189","https://openalex.org/W2143772938","https://openalex.org/W2145964906","https://openalex.org/W2166780626","https://openalex.org/W2205573708","https://openalex.org/W2214131438","https://openalex.org/W2521117904","https://openalex.org/W2584560272","https://openalex.org/W2614151058","https://openalex.org/W2731184805","https://openalex.org/W2766724343","https://openalex.org/W2797147313","https://openalex.org/W2801189002","https://openalex.org/W2891145243","https://openalex.org/W2900781512","https://openalex.org/W2901392419","https://openalex.org/W2902650983","https://openalex.org/W2903404091","https://openalex.org/W2905143760","https://openalex.org/W2919782006","https://openalex.org/W2921647478","https://openalex.org/W2952508120","https://openalex.org/W2962879303","https://openalex.org/W2962972839","https://openalex.org/W2963114451","https://openalex.org/W2967823908","https://openalex.org/W2968487223","https://openalex.org/W2983494186","https://openalex.org/W3040428622","https://openalex.org/W3046134968","https://openalex.org/W3083053830","https://openalex.org/W3087799106","https://openalex.org/W3101291997","https://openalex.org/W3119277422","https://openalex.org/W3134925859","https://openalex.org/W4206504405","https://openalex.org/W4232836212","https://openalex.org/W4245046265","https://openalex.org/W4245603972","https://openalex.org/W4246140522","https://openalex.org/W4252263778","https://openalex.org/W4252703028","https://openalex.org/W4295103079","https://openalex.org/W6630648322","https://openalex.org/W6633270832","https://openalex.org/W6633485244","https://openalex.org/W6648935411","https://openalex.org/W6726776808","https://openalex.org/W6733070173","https://openalex.org/W6787995931","https://openalex.org/W6826199686","https://openalex.org/W6827892285","https://openalex.org/W6834759638"],"related_works":["https://openalex.org/W3038906685","https://openalex.org/W2392975301","https://openalex.org/W2259363500","https://openalex.org/W2387543012","https://openalex.org/W2064823537","https://openalex.org/W275792417","https://openalex.org/W3209855679","https://openalex.org/W2561763748","https://openalex.org/W4387321508","https://openalex.org/W3212531655"],"abstract_inverted_index":{"Semi-prime":[0],"factorization":[1,41,87,120,220,261],"is":[2,11,68,100,114,121,201],"an":[3],"increasingly":[4],"important":[5],"number":[6,265],"theoretic":[7],"problem,":[8],"since":[9],"it":[10,200],"computationally":[12],"intractable.":[13],"Further,":[14,269],"this":[15,91],"property":[16,72],"has":[17,237],"been":[18,52],"applied":[19],"in":[20],"public-key":[21],"cryptography,":[22],"such":[23,130,259],"as":[24,144,161,260,283],"the":[25,39,60,71,74,83,112,124,141,145,182,187,190,214,229,238,241,263,270,274,278],"Rivest\u2013Shamir\u2013Adleman":[26],"(RSA)":[27],"encryption":[28],"systems":[29],"for":[30,85,256,285],"secure":[31],"digital":[32],"communications.":[33],"Hence,":[34],"alternate":[35],"approaches":[36],"to":[37,48,54,123,135,150,173,196,248],"solve":[38],"semi-prime":[40,86,113,119,219,245],"problem":[42,117,125],"are":[43,158,186,246,267,281],"proposed.":[44],"Recently,":[45],"Pythagorean":[46,98,109,163,171,175,208],"tuples":[47],"factor":[49,197],"semi-primes":[50],"have":[51],"explored":[53],"consider":[55],"Fermat\u2019s":[56,233],"Christmas":[57],"theorem,":[58],"with":[59,232],"two":[61,78,174],"squares":[62,79,106,134,149],"having":[63],"opposite":[64],"parity.":[65],"This":[66],"paper":[67],"motivated":[69],"by":[70,88],"that":[73,95,195,203],"integer":[75],"separating":[76],"these":[77,169,207],"being":[80],"odd":[81],"reduces":[82,168],"search":[84],"half.":[89],"In":[90],"paper,":[92],"we":[93],"prove":[94,194],"if":[96],"a":[97,108,137,198,244],"quadruple":[99],"known":[101],"and":[102,225,277],"one":[103,129,205],"of":[104,118,126,132,147,154,181,189,206,216,228,243,253,262],"its":[105,223],"represents":[107],"triple,":[110],"then":[111,159,193],"factorized.":[115],"The":[116,165,177],"reduced":[122],"finding":[127],"only":[128,204],"sum":[131,146],"three":[133,155],"factorize":[136],"semi-prime.":[138,191],"We":[139,192,212],"modify":[140],"Lebesgue":[142],"identity":[143,167],"four":[148,152,162,170],"obtain":[151],"sums":[153],"squares.":[156],"These":[157],"expressed":[160],"quadruples.":[164],"Brahmagupta\u2013Fibonacci":[166],"quadruples":[172,209],"triples.":[176],"greatest":[178],"common":[179],"divisors":[180],"sides":[183],"contained":[184],"therein":[185],"factors":[188,242],"semi-prime,":[199],"sufficient":[202],"be":[210],"known.":[211],"provide":[213],"algorithm":[215,236],"our":[217,254],"proposed":[218],"method,":[221],"highlighting":[222],"complexity":[224],"comparative":[226],"advantage":[227,239],"solution":[230],"space":[231],"method.":[234],"Our":[235],"when":[240],"congruent":[247],"1":[249],"modulus":[250],"4.":[251],"Illustrations":[252],"method":[255],"real-world":[257],"applications,":[258],"768-bit":[264],"RSA-768,":[266],"established.":[268],"computational":[271],"viabilities,":[272],"despite":[273],"mathematical":[275],"constraints":[276],"unexplored":[279],"properties,":[280],"suggested":[282],"opportunities":[284],"future":[286],"research.":[287]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2021-11-22T00:00:00"}
