Recent from talks
Nothing was collected or created yet.
RSA numbers
View on WikipediaIn mathematics, the RSA numbers are a set of large semiprimes (numbers with exactly two prime factors) that were part of the RSA Factoring Challenge. The challenge was to find the prime factors of each number. It was created by RSA Laboratories in March 1991 to encourage research into computational number theory and the practical difficulty of factoring large integers. The challenge was ended in 2007.[1]
RSA Laboratories (which is an initialism of the creators of the technique; Rivest, Shamir and Adleman) published a number of semiprimes with 100 to 617 decimal digits. Cash prizes of varying size, up to US$200,000 (and prizes up to $20,000 awarded), were offered for factorization of some of them. The smallest RSA number was factored in a few days. Most of the numbers have still not been factored and many of them are expected to remain unfactored for many years to come. As of February 2020[update], the smallest 23 of the 54 listed numbers have been factored.
While the RSA challenge officially ended in 2007, people are still attempting to find the factorizations. According to RSA Laboratories, "Now that the industry has a considerably more advanced understanding of the cryptanalytic strength of common symmetric-key and public-key algorithms, these challenges are no longer active."[2] Some of the smaller prizes had been awarded at the time. The remaining prizes were retracted.
The first RSA numbers generated, from RSA-100 to RSA-500, were labeled according to their number of decimal digits. Later, beginning with RSA-576, binary digits are counted instead. An exception to this is RSA-617, which was created before the change in the numbering scheme. The numbers are listed in increasing order below.
Note: until work on this article is finished, please check both the table and the list, since they include different values and different information.
| name | dec digits | first solver | |||
|---|---|---|---|---|---|
| date | algorithm | compute power | calendar time | ||
| RSA-100 | 1991-04-01 | ppmpqs by Mark Manasse and Arjen K. Lenstra | approx. 7 MIP-Years | ||
| RSA-110 | 1992-04-14 | ppmpqs by Arjen K. Lenstra | one month on 5/8 of a 16K MasPar | ||
| RSA-120 | 1993-06-09 | ppmpqs | 835 mips years run by Arjen K. Lenstra (45.503%), Bruce Dodson (30.271%), Thomas Denny (22.516%), Mark Manasse (1.658%), and Walter Lioen and Herman te Riele (0.049%) | ||
| RSA-129 | 129 | 1994-04-26 | ppmpqs | approximately 5000 mips years run by Derek Atkins, Michael Graff, Arjen K. Lenstra, Paul Leyland, and more than 600 volunteers | |
| RSA-130 | 1996-04-10 | General Number Field Sieve with lattice sieving implementations by Bellcore, CWI, and Saarbruecken; and blocked Lanczos and square root by Peter L. Montgomery | sieving: estimated 500 mips years, run by Bruce Dodson (28.37%), Peter L. Montgomery and Marije Elkenbracht-Huizing (27.77%), Arjen K. Lenstra (19.11%), WWW contributors (17.17% ), Matt Fante (4.36%), Paul Leyland (1.66%), Damian Weber and Joerg Zayer (1.56%)
matrix (67.5 hours on the Cray-C90 at SARA, Amsterdam) and square root (48 hours per dependency on an SGI Challenge processor) run by Peter L. Montgomery and Marije Elkenbracht-Huizing |
||
| RSA-140 | 1999-02-02 | GNFS with line (by CWI; 45%) and lattice (by Arjen K. Lenstra; 55%) sieving, and a polynomial selection method by Brian Murphy and Peter L. Montgomery; and blocked Lanczos and square root by Peter L. Montgomery | polynomial selection: 2000 CPU hours on four 250 MHZ SGI Origin 2000 processors at CWI
sieving: 8.9 CPU-years on about 125 SGI and Sun workstations running at 175 MHZ on average, and on about 60 PCs running at 300 MHZ on average; approximately equivalent to 1500 mips years; run by Peter L. Montgomery, Stefania Cavallar, Herman J.J. te Riele, and Walter M. Lioen (36.8%), Paul Leyland (28.8%), Bruce Dodson (26.6%), Paul Zimmermann (5.4%), and Arjen K. Lenstra (2.5%). matrix: 100 hours on the Cray-C916 at SARA, Amsterdam square root: four different dependencies were run in parallel on four 250 MHZ SGI Origin 2000 processors at CWI; three of them found the factors of RSA-140 after 14.2, 19.0 and 19.0 CPU-hours |
eleven weeks (including four weeks for polynomial selection, one month for sieving, one week for data filtering and matrix construction, five days for the matrix, and 14.2 hours to find the factors using the square root) | |
| RSA-155 | 1999-08-22 | GNFS with line (29%) and lattice (71%) sieving, and a polynomial selection method written by Brian Murphy and Peter L. Montgomery, ported by Arjen Lenstra to use his multiple precision arithmetic code (LIP); and blocked Lanczos and square root by Peter L. Montgomery | polynomial selection run by Brian Murphy, Peter Montgomery, Arjen Lenstra and Bruce Dodson; Dodson found the one that was used
sieving: 35.7 CPU-years in total, on about one hundred and sixty 175-400 MHz SGI and Sun workstations, eight 250 MHz SGI Origin 2000 processors, one hundred and twenty 300-450 MHz Pentium II PCs, and four 500 MHz Digital/Compaq boxes; approximately equivalent to 8000 mips years; run by Alec Muffett (20.1% of relations, 3057 CPU days), Paul Leyland (17.5%, 2092 CPU days), Peter L. Montgomery and Stefania Cavallar (14.6%, 1819 CPU days), Bruce Dodson (13.6%, 2222 CPU days), Francois Morain and Gerard Guillerm (13.0%, 1801 CPU days), Joel Marchand (6.4%, 576 CPU days), Arjen K. Lenstra (5.0%, 737 CPU days), Paul Zimmermann (4.5%, 252 CPU days), Jeff Gilchrist (4.0%, 366 CPU days), Karen Aardal (0.65%, 62 CPU days), and Chris and Craig Putnam (0.56%, 47 CPU days) matrix: 224 hours on one CPU of the Cray-C916 at SARA, Amsterdam square root: four 300 MHz R12000 processors of a 24-processor SGI Origin 2000 at CWI; the successful one took 39.4 CPU-hours and the others took 38.3, 41.9, and 61.6 CPU-hours |
9 weeks for polynomial selection, plus 5.2 months for the rest (including 3.7 months for sieving, about 1 month for data filtering and matrix construction, and 10 days for the matrix) | |
| Contents | |||||
|---|---|---|---|---|---|
| See also Notes References External links | |||||
RSA-100
[edit]RSA-100 has 100 decimal digits (330 bits). Its factorization was announced on April 1, 1991, by Arjen K. Lenstra.[3][4] Reportedly, the factorization took a few days using the multiple-polynomial quadratic sieve algorithm on a MasPar parallel computer.[5]
The value and factorization of RSA-100 are as follows:
RSA-100 = 1522605027922533360535618378132637429718068114961380688657908494580122963258952897654000350692006139
RSA-100 = 37975227936943673922808872755445627854565536638199
× 40094690950920881030683735292761468389214899724061
It takes four hours to repeat this factorization using the program Msieve on a 2200 MHz Athlon 64 processor.
The number can be factorized in 72 minutes on overclocked to 3.5 GHz Intel Core2 Quad q9300, using GGNFS and Msieve binaries running by distributed version of the factmsieve Perl script.[6]
RSA-110
[edit]RSA-110 has 110 decimal digits (364 bits), and was factored in April 1992 by Arjen K. Lenstra and Mark S. Manasse in approximately one month.[4][5]
The number can be factorized in less than four hours on overclocked to 3.5 GHz Intel Core2 Quad q9300, using GGNFS and Msieve binaries running by distributed version of the factmsieve Perl script.[6]
The value and factorization are as follows:
RSA-110 = 35794234179725868774991807832568455403003778024228226193532908190484670252364677411513516111204504060317568667
RSA-110 = 6122421090493547576937037317561418841225758554253106999
× 5846418214406154678836553182979162384198610505601062333
RSA-120
[edit]RSA-120 has 120 decimal digits (397 bits), and was factored in June 1993 by Thomas Denny, Bruce Dodson, Arjen K. Lenstra, and Mark S. Manasse.[7] The computation took under three months of actual computer time.
The value and factorization are as follows:
RSA-120 = 227010481295437363334259960947493668895875336466084780038173258247009162675779735389791151574049166747880487470296548479
RSA-120 = 327414555693498015751146303749141488063642403240171463406883
× 693342667110830181197325401899700641361965863127336680673013
RSA-129
[edit]RSA-129, having 129 decimal digits (426 bits), was not part of the 1991 RSA Factoring Challenge, but rather related to Martin Gardner's Mathematical Games column in the August 1977 issue of Scientific American.[3]
RSA-129 was factored in April 1994 by a team led by Derek Atkins, Michael Graff, Arjen K. Lenstra and Paul Leyland, using approximately 1600 computers[8] from around 600 volunteers connected over the Internet.[9] A US$100 token prize was awarded by RSA Security for the factorization, which was donated to the Free Software Foundation.
The value and factorization are as follows:
RSA-129 = 114381625757888867669235779976146612010218296721242362562561842935706935245733897830597123563958705058989075147599290026879543541
RSA-129 = 3490529510847650949147849619903898133417764638493387843990820577
× 32769132993266709549961988190834461413177642967992942539798288533
The factorization was found using the Multiple Polynomial Quadratic Sieve algorithm.
The factoring challenge included a message encrypted with RSA-129. When decrypted using the factorization the message was revealed to be "The Magic Words are Squeamish Ossifrage".
In 2015, RSA-129 was factored in about one day, with the CADO-NFS open source implementation of number field sieve, using a commercial cloud computing service for about $30.[10]
RSA-130
[edit]RSA-130 has 130 decimal digits (430 bits), and was factored on April 10, 1996, by a team led by Arjen K. Lenstra and composed of Jim Cowie, Marije Elkenbracht-Huizing, Wojtek Furmanski, Peter L. Montgomery, Damian Weber and Joerg Zayer.[11]
The factorization was found in the third trial.[3]
The value and factorization are as follows:
RSA-130 = 1807082088687404805951656164405905566278102516769401349170127021450056662540244048387341127590812303371781887966563182013214880557
RSA-130 = 39685999459597454290161126162883786067576449112810064832555157243
× 45534498646735972188403686897274408864356301263205069600999044599
The factorization was found using the Number Field Sieve algorithm and the polynomial
5748302248738405200 x5 + 9882261917482286102 x4 - 13392499389128176685 x3 + 16875252458877684989 x2 + 3759900174855208738 x1 - 46769930553931905995
which has a root of 12574411168418005980468 modulo RSA-130.
RSA-140
[edit]RSA-140 has 140 decimal digits (463 bits), and was factored on February 2, 1999, by a team led by Herman te Riele and composed of Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Paul Leyland, Walter Lioen, Peter L. Montgomery, Brian Murphy and Paul Zimmermann.[12][13]
The value and factorization are as follows:
RSA-140 = 21290246318258757547497882016271517497806703963277216278233383215381949984056495911366573853021918316783107387995317230889569230873441936471
RSA-140 = 3398717423028438554530123627613875835633986495969597423490929302771479
× 6264200187401285096151654948264442219302037178623509019111660653946049
The factorization was found using the Number Field Sieve algorithm and an estimated 2000 MIPS-years of computing time.
The matrix had 4671181 rows and 4704451 columns and weight 151141999 (32.36 nonzeros per row)[3]
RSA-150
[edit]RSA-150 has 150 decimal digits (496 bits), and was withdrawn from the challenge by RSA Security. RSA-150 was eventually factored into two 75-digit primes by Aoki et al. in 2004 using the general number field sieve (GNFS), years after bigger RSA numbers that were still part of the challenge had been solved.
The value and factorization are as follows:
RSA-150 = 155089812478348440509606754370011861770654545830995430655466945774312632703463465954363335027577729025391453996787414027003501631772186840890795964683
RSA-150 = 348009867102283695483970451047593424831012817350385456889559637548278410717
× 445647744903640741533241125787086176005442536297766153493419724532460296199
RSA-155
[edit]RSA-155 has 155 decimal digits (512 bits), and was factored on August 22, 1999, in a span of six months, by a team led by Herman te Riele and composed of Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Walter Lioen, Peter L. Montgomery, Brian Murphy, Karen Aardal, Jeff Gilchrist, Gerard Guillerm, Paul Leyland, Joel Marchand, François Morain, Alec Muffett, Craig Putnam, Chris Putnam and Paul Zimmermann.[14][15]
The value and factorization are as follows:
RSA-155 = 10941738641570527421809707322040357612003732945449205990913842131476349984288934784717997257891267332497625752899781833797076537244027146743531593354333897
RSA-155 = 1026395928297411057720541965739916759007165678080380668033419335217907113077
79
× 1066034883801684548209272203600128786792079585759892915222706082371930628086
43
The factorization was found using the general number field sieve algorithm and an estimated 8000 MIPS-years of computing time.
The polynomials were 119377138320*x^5 - 80168937284997582*y*x^4 - 66269852234118574445*y^2*x^3 + 11816848430079521880356852*y^3*x^2 + 7459661580071786443919743056*y^4*x - 40679843542362159361913708405064*y^5 and x - 39123079721168000771313449081*y (this pair has a yield of relations approximately 13.5 times that of a random polynomial selection); 124722179 relations were collected in the sieving stage; the matrix had 6699191 rows and 6711336 columns and weight 417132631 (62.27 nonzeros per row).[3]
RSA-160
[edit]RSA-160 has 160 decimal digits (530 bits), and was factored on April 1, 2003, by a team from the University of Bonn and the German Federal Office for Information Security (BSI). The team contained J. Franke, F. Bahr, T. Kleinjung, M. Lochter, and M. Böhm.[16][17]
The value and factorization are as follows:
RSA-160 = 2152741102718889701896015201312825429257773588845675980170497676778133145218859135673011059773491059602497907111585214302079314665202840140619946994927570407753
RSA-160 = 4542789285848139407168619064973883165613714577846979325095998470925000415733
5359
× 4738809060383201619663383230378895197326892292104095794474135464881202849390
9367
The factorization was found using the general number field sieve algorithm.
RSA-170
[edit]RSA-170 has 170 decimal digits (563 bits) and was first factored on December 29, 2009, by D. Bonenberger and M. Krone from Fachhochschule Braunschweig/Wolfenbüttel.[18] An independent factorization was completed by S. A. Danilov and I. A. Popovyan two days later.[19]
The value and factorization are as follows:
RSA-170 = 26062623684139844921529879266674432197085925380486406416164785191859999628542069361450283931914514618683512198164805919882053057222974116478065095809832377336510711545759
RSA-170 = 3586420730428501486799804587268520423291459681059978161140231860633948450858
040593963
× 7267029064107019078863797763923946264136137803856996670313708936002281582249
587494493
The factorization was found using the general number field sieve algorithm.
RSA-576
[edit]RSA-576 has 174 decimal digits (576 bits), and was factored on December 3, 2003, by J. Franke and T. Kleinjung from the University of Bonn.[20][21][22] A cash prize of $10,000 was offered by RSA Security for a successful factorization.
The value and factorization are as follows:
RSA-576 = 188198812920607963838697239461650439807163563379417382700763356422988859715234665485319060606504743045317388011303396716199692321205734031879550656996221305168759307650257059
RSA-576 = 3980750864240649373971255005503864911990643623425267084063851895759463889572
61768583317
× 4727721461074353025362230719730482246329146953020971164598521711305207112563
63590397527
The factorization was found using the general number field sieve algorithm.
RSA-180
[edit]RSA-180 has 180 decimal digits (596 bits), and was factored on May 8, 2010, by S. A. Danilov and I. A. Popovyan from Moscow State University, Russia.[23]
RSA-180 = 1911479277189866096892294666314546498129862462766673548641885036388072607034
3679905877620136513516127813425829612810920004670291298456875280033022177775
2773957404540495707851421041
RSA-180 = 4007800823297508779525813391041005725268293178158071765648821789984975727719
50624613470377
× 4769396887386118369955354773570708579399020760277882320319897758246062255957
73435668861833
The factorization was found using the general number field sieve algorithm implementation running on three Intel Core i7 PCs.
RSA-190
[edit]RSA-190 has 190 decimal digits (629 bits), and was factored on November 8, 2010, by I. A. Popovyan from Moscow State University, Russia, and A. Timofeev from CWI, Netherlands.[24]
RSA-190 = 1907556405060696491061450432646028861081179759533184460647975622318915025587
1841757540549761551215932934922604641526300932385092466032074171247261215808
58185985938946945490481721756401423481
RSA-190 = 3171195257690152709485171289740475929805147316029450327784761927832793642798
1256542415724309619
× 6015260020444561641587641685526676183243543359471811072599763828083615704046
0481625355619404899
RSA-640
[edit]RSA-640 has 193 decimal digits (640 bits). A cash prize of US$20,000 was offered by RSA Security for a successful factorization. On November 2, 2005, F. Bahr, M. Boehm, J. Franke and T. Kleinjung of the German Federal Office for Information Security announced that they had factorized the number using GNFS as follows:[25][26][27]
RSA-640 = 3107418240490043721350750035888567930037346022842727545720161948823206440518
0815045563468296717232867824379162728380334154710731085019195485290073377248
22783525742386454014691736602477652346609
RSA-640 = 1634733645809253848443133883865090859841783670033092312181110852389333100104
508151212118167511579
× 1900871281664822113126851573935413975471896789968515493666638539088027103802
104498957191261465571
The computation took five months on 80 2.2 GHz AMD Opteron CPUs.
The slightly larger RSA-200 was factored in May 2005 by the same team.
RSA-200
[edit]RSA-200 has 200 decimal digits (663 bits), and factors into the two 100-digit primes given below.
On May 9, 2005, F. Bahr, M. Boehm, J. Franke, and T. Kleinjung announced[28][29] that they had factorized the number using GNFS as follows:
RSA-200 = 2799783391122132787082946763872260162107044678695542853756000992932612840010
7609345671052955360856061822351910951365788637105954482006576775098580557613
579098734950144178863178946295187237869221823983
RSA-200 = 3532461934402770121272604978198464368671197400197625023649303468776121253679
423200058547956528088349
× 7925869954478333033347085841480059687737975857364219960734330341455767872818
152135381409304740185467
The CPU time spent on finding these factors by a collection of parallel computers amounted – very approximately – to the equivalent of 75 years work for a single 2.2 GHz Opteron-based computer.[28] Note that while this approximation serves to suggest the scale of the effort, it leaves out many complicating factors; the announcement states it more precisely.
RSA-210
[edit]RSA-210 has 210 decimal digits (696 bits) and was factored in September 2013 by Ryan Propper:[30]
RSA-210 = 2452466449002782119765176635730880184670267876783327597434144517150616008300
3858721695220839933207154910362682719167986407977672324300560059203563124656
1218465817904100131859299619933817012149335034875870551067
RSA-210 = 4359585683259407917999519653872144063854709102652201963187054821445240853452
75999740244625255428455944579
× 5625457617268841037562770073044474817438769440075105451049468510945483965774
79473472146228550799322939273
RSA-704
[edit]RSA-704 has 212 decimal digits (704 bits), and was factored by Shi Bai, Emmanuel Thomé and Paul Zimmermann.[31] The factorization was announced July 2, 2012.[32] A cash prize of US$30,000 was previously offered for a successful factorization.
RSA-704 = 7403756347956171282804679609742957314259318888923128908493623263897276503402
8266276891996419625117843995894330502127585370118968098286733173273108930900
552505116877063299072396380786710086096962537934650563796359
RSA-704 = 9091213529597818878440658302600437485892608310328358720428512168960411528640
933367824950788367956756806141
× 8143859259110045265727809126284429335877899002167627883200914172429324360133
004116702003240828777970252499
RSA-220
[edit]RSA-220 has 220 decimal digits (729 bits), and was factored by S. Bai, P. Gaudry, A. Kruppa, E. Thomé and P. Zimmermann. The factorization was announced on May 13, 2016.[33]
RSA-220 = 2260138526203405784941654048610197513508038915719776718321197768109445641817
9666766085931213065825772506315628866769704480700018111497118630021124879281
99487482066070131066586646083327982803560379205391980139946496955261
RSA-220 = 6863656412267566274382371499288437800130842239979164844621244993321541061441
4642667938213644208420192054999687
× 3292907439486349812049301549212935291916455196536233952462686051169290349309
4652463337824866390738191765712603
RSA-230
[edit]RSA-230 has 230 decimal digits (762 bits), and was factored by Samuel S. Gross on August 15, 2018.[34]
RSA-230 = 1796949159794106673291612844957324615636756180801260007088891883553172646034
1490933493372247868650755230855864199929221814436684722874052065257937495694
3483892631711525225256544109808191706117425097024407180103648316382885188526
89
RSA-230 = 4528450358010492026612439739120166758911246047493700040073956759261590397250
033699357694507193523000343088601688589
× 3968132623150957588532394439049887341769533966621957829426966084093049516953
598120833228447171744337427374763106901
RSA-232
[edit]RSA-232 has 232 decimal digits (768 bits), and was factored on February 17, 2020, by N. L. Zamarashkin, D. A. Zheltkov and S. A. Matveev.[35][36][37]
RSA-232 = 1009881397871923546909564894309468582818233821955573955141120516205831021338
5285453743661097571543636649133800849170651699217015247332943892702802343809
6090980497644054071120196541074755382494867277137407501157718230539834060616
2079
RSA-232 = 2966909333208360660361779924242630634742946262521852394401857157419437019472
3262390744910112571804274494074452751891
× 3403816175197563438006609498491521420547121760734723172735163413276050706174
8526506443144325148088881115083863017669
RSA-768
[edit]RSA-768 has 232 decimal digits (768 bits), and was factored on December 12, 2009, over the span of two years, by Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Pierrick Gaudry, Alexander Kruppa, Peter Montgomery, Joppe W. Bos, Dag Arne Osvik, Herman te Riele, Andrey Timofeev, and Paul Zimmermann.[38]
RSA-768 = 1230186684530117755130494958384962720772853569595334792197322452151726400507
2636575187452021997864693899564749427740638459251925573263034537315482685079
1702612214291346167042921431160222124047927473779408066535141959745985690214
3413
RSA-768 = 3347807169895689878604416984821269081770479498371376856891243138898288379387
8002287614711652531743087737814467999489
× 3674604366679959042824463379962795263227915816434308764267603228381573966651
1279233373417143396810270092798736308917
The CPU time spent on finding these factors by a collection of parallel computers amounted approximately to the equivalent of almost 2000 years of computing on a single-core 2.2 GHz AMD Opteron-based computer.[38]
RSA-240
[edit]RSA-240 has 240 decimal digits (795 bits), and was factored in November 2019 by Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé and Paul Zimmermann.[39]
RSA-240 = 1246203667817187840658350446081065904348203746516788057548187888832896668011
8821085503603957027250874750986476843845862105486553797025393057189121768431
8286362846948405301614416430468066875699415246993185704183030512549594371372
159029236099
RSA-240 = 5094359522858399145550510235808437141326483820241114731866602965218212064697
46700620316443478873837606252372049619334517
× 2446242088383181505678131390240028966538020925789314014520412213365584770951
78155258218897735030590669041302045908071447
The CPU time spent on finding these factors amounted to approximately 900 core-years on a 2.1 GHz Intel Xeon Gold 6130 CPU. Compared to the factorization of RSA-768, the authors estimate that better algorithms sped their calculations by a factor of 3–4 and faster computers sped their calculation by a factor of 1.25–1.67.
RSA-250
[edit]RSA-250 has 250 decimal digits (829 bits), and was factored in February 2020 by Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, and Paul Zimmermann. The announcement of the factorization occurred on February 28, 2020.
RSA-250 = 2140324650240744961264423072839333563008614715144755017797754920881418023447
1401366433455190958046796109928518724709145876873962619215573630474547705208
0511905649310668769159001975940569345745223058932597669747168173806936489469
9871578494975937497937
RSA-250 = 6413528947707158027879019017057738908482501474294344720811685963202453234463
0238623598752668347708737661925585694639798853367
× 3337202759497815655622601060535511422794076034476755466678452098702384172921
0037080257448673296881877565718986258036932062711
The factorisation of RSA-250 utilised approximately 2700 CPU core-years, using a 2.1 GHz Intel Xeon Gold 6130 CPU as a reference. The computation was performed with the Number Field Sieve algorithm, using the open source CADO-NFS software.
The team dedicated the computation to Peter Montgomery, an American mathematician known for his contributions to computational number theory and cryptography who died on February 18, 2020, and had contributed to factoring RSA-768.[40]
RSA-260
[edit]RSA-260 has 260 decimal digits (862 bits), and has not been factored so far.
RSA-260 = 2211282552952966643528108525502623092761208950247001539441374831912882294140
2001986512729726569746599085900330031400051170742204560859276357953757185954
2988389587092292384910067030341246205457845664136645406842143612930176940208
46391065875914794251435144458199
RSA-270
[edit]RSA-270 has 270 decimal digits (895 bits), and has not been factored so far.
RSA-270 = 2331085303444075445276376569106805241456198124803054490429486119684959182451
3578286788836931857711641821391926857265831491306067262691135402760979316634
1626693946596196427744273886601876896313468704059066746903123910748277606548
649151920812699309766587514735456594993207
RSA-896
[edit]RSA-896 has 270 decimal digits (896 bits), and has not been factored so far. A cash prize of $75,000 was previously offered for a successful factorization.
RSA-896 = 4120234369866595438555313653325759481798116998443279828454556264338764455652
4842619809887042316184187926142024718886949256093177637503342113098239748515
0944909106910269861031862704114880866970564902903653658867433731720813104105
190864254793282601391257624033946373269391
RSA-280
[edit]RSA-280 has 280 decimal digits (928 bits), and has not been factored so far.
RSA-280 = 1790707753365795418841729699379193276395981524363782327873718589639655966058
5783742549640396449103593468573113599487089842785784500698716853446786525536
5503525160280656363736307175332772875499505341538927978510751699922197178159
7724733184279534477239566789173532366357270583106789
RSA-290
[edit]RSA-290 has 290 decimal digits (962 bits), and has not been factored so far.
RSA-290 = 3050235186294003157769199519894966400298217959748768348671526618673316087694
3419156362946151249328917515864630224371171221716993844781534383325603218163
2549201100649908073932858897185243836002511996505765970769029474322210394327
60575157628357292075495937664206199565578681309135044121854119
RSA-300
[edit]RSA-300 has 300 decimal digits (995 bits), and has not been factored so far.
RSA-300 = 2769315567803442139028689061647233092237608363983953254005036722809375824714
9473946190060218756255124317186573105075074546238828817121274630072161346956
4396741836389979086904304472476001839015983033451909174663464663867829125664
459895575157178816900228792711267471958357574416714366499722090015674047
RSA-309
[edit]RSA-309 has 309 decimal digits (1,024 bits), and has not been factored so far.
RSA-309 = 1332943998825757583801437794588036586217112243226684602854588261917276276670
5425540467426933349195015527349334314071822840746357352800368666521274057591
1870128339157499072351179666739658503429931021985160714113146720277365006623
6927218079163559142755190653347914002967258537889160429597714204365647842739
10949
RSA-1024
[edit]RSA-1024 has 309 decimal digits (1,024 bits), and has not been factored so far. $100,000 was previously offered for factorization.
RSA-1024 = 135066410865995223349603216278805969938881475605667027524485143851526510604
859533833940287150571909441798207282164471551373680419703964191743046496589
274256239341020864383202110372958725762358509643110564073501508187510676594
629205563685529475213500852879416377328533906109750544334999811150056977236
890927563
RSA-310
[edit]RSA-310 has 310 decimal digits (1,028 bits), and has not been factored so far.
RSA-310 = 1848210397825850670380148517702559371400899745254512521925707445580334710601
4125276757082979328578439013881047668984294331264191394626965245834649837246
5163148188847336415136873623631778358751846501708714541673402642461569061162
0116380982484120857688483676576094865930188367141388795454378671343386258291
687641
RSA-320
[edit]RSA-320 has 320 decimal digits (1,061 bits), and has not been factored so far.
RSA-320 = 2136810696410071796012087414500377295863767938372793352315068620363196552357
8837094085435000951700943373838321997220564166302488321590128061531285010636
8571638978998117122840139210685346167726847173232244364004850978371121744321
8270343654835754061017503137136489303437996367224915212044704472299799616089
2591129924218437
RSA-330
[edit]RSA-330 has 330 decimal digits (1,094 bits), and has not been factored so far.
RSA-330 = 1218708633106058693138173980143325249157710686226055220408666600017481383238
1352456802425903555880722805261111079089882303717632638856140900933377863089
0634828167900405006112727432172179976427017137792606951424995281839383708354
6364684839261149319768449396541020909665209789862312609604983709923779304217
01862444655244698696759267
RSA-340
[edit]RSA-340 has 340 decimal digits (1,128 bits), and has not been factored so far.
RSA-340 = 2690987062294695111996484658008361875931308730357496490239672429933215694995
2758588771223263308836649715112756731997946779608413232406934433532048898585
9176676580752231563884394807622076177586625973975236127522811136600110415063
0004691128152106812042872285697735145105026966830649540003659922618399694276
990464815739966698956947129133275233
RSA-350
[edit]RSA-350 has 350 decimal digits (1,161 bits), and has not been factored so far.
RSA-350 = 2650719995173539473449812097373681101529786464211583162467454548229344585504
3495841191504413349124560193160478146528433707807716865391982823061751419151
6068496555750496764686447379170711424873128631468168019548127029171231892127
2886825928263239383444398948209649800021987837742009498347263667908976501360
3382322972552204068806061829535529820731640151
RSA-360
[edit]RSA-360 has 360 decimal digits (1,194 bits), and has not been factored so far.
RSA-360 = 2186820202343172631466406372285792654649158564828384065217121866374227745448
7764963889680817334211643637752157994969516984539482486678141304751672197524
0052350576247238785129338002757406892629970748212734663781952170745916609168
9358372359962787832802257421757011302526265184263565623426823456522539874717
61591019113926725623095606566457918240614767013806590649
RSA-370
[edit]RSA-370 has 370 decimal digits (1,227 bits), and has not been factored so far.
RSA-370 = 1888287707234383972842703127997127272470910519387718062380985523004987076701
7212819937261952549039800018961122586712624661442288502745681454363170484690
7379449525034797494321694352146271320296579623726631094822493455672541491544
2700993152879235272779266578292207161032746297546080025793864030543617862620
878802244305286292772467355603044265985905970622730682658082529621
RSA-380
[edit]RSA-380 has 380 decimal digits (1,261 bits), and has not been factored so far.
RSA-380 = 3013500443120211600356586024101276992492167997795839203528363236610578565791
8270750937407901898070219843622821090980641477056850056514799336625349678549
2187941807116344787358312651772858878058620717489800725333606564197363165358
2237779263423501952646847579678711825720733732734169866406145425286581665755
6977260763553328252421574633011335112031733393397168350585519524478541747311
RSA-390
[edit]RSA-390 has 390 decimal digits (1,294 bits), and has not been factored so far.
RSA-390 = 2680401941182388454501037079346656065366941749082852678729822424397709178250
4623002472848967604282562331676313645413672467684996118812899734451228212989
1630084759485063423604911639099585186833094019957687550377834977803400653628
6955344904367437281870253414058414063152368812498486005056223028285341898040
0795447435865033046248751475297412398697088084321037176392288312785544402209
1083492089
RSA-400
[edit]RSA-400 has 400 decimal digits (1,327 bits), and has not been factored so far.
RSA-400 = 2014096878945207511726700485783442547915321782072704356103039129009966793396
1419850865094551022604032086955587930913903404388675137661234189428453016032
6191193056768564862615321256630010268346471747836597131398943140685464051631
7519403149294308737302321684840956395183222117468443578509847947119995373645
3607109795994713287610750434646825511120586422993705980787028106033008907158
74500584758146849481
RSA-410
[edit]RSA-410 has 410 decimal digits (1,360 bits), and has not been factored so far.
RSA-410 = 1965360147993876141423945274178745707926269294439880746827971120992517421770
1079138139324539033381077755540830342989643633394137538983355218902490897764
4412968474332754608531823550599154905901691559098706892516477785203855688127
0635069372091564594333528156501293924133186705141485137856845741766150159437
6063244163040088180887087028771717321932252992567756075264441680858665410918
431223215368025334985424358839
RSA-420
[edit]RSA-420 has 420 decimal digits (1,393 bits), and has not been factored so far.
RSA-420 = 2091366302476510731652556423163330737009653626605245054798522959941292730258
1898373570076188752609749648953525484925466394800509169219344906273145413634
2427186266197097846022969248579454916155633686388106962365337549155747268356
4666583846809964354191550136023170105917441056517493690125545320242581503730
3405952887826925813912683942756431114820292313193705352716165790132673270514
3817744164107601735413785886836578207979
RSA-430
[edit]RSA-430 has 430 decimal digits (1,427 bits), and has not been factored so far.
RSA-430 = 3534635645620271361541209209607897224734887106182307093292005188843884213420
6950355315163258889704268733101305820000124678051064321160104990089741386777
2424190744453885127173046498565488221441242210687945185565975582458031351338
2070785777831859308900851761495284515874808406228585310317964648830289141496
3289966226854692560410075067278840383808716608668377947047236323168904650235
70092246473915442026549955865931709542468648109541
RSA-440
[edit]RSA-440 has 440 decimal digits (1,460 bits), and has not been factored so far.
RSA-440 = 2601428211955602590070788487371320550539810804595235289423508589663391270837
4310252674800592426746319007978890065337573160541942868114065643853327229484
5029942332226171123926606357523257736893667452341192247905168387893684524818
0307729497304959710847337973805145673263119916483529703607405432752966630781
2234597766390750441445314408171802070904072739275930410299359006059619305590
701939627725296116299946059898442103959412221518213407370491
RSA-450
[edit]RSA-450 has 450 decimal digits (1,493 bits), and has not been factored so far.
RSA-450 = 1984634237142836623497230721861131427789462869258862089878538009871598692569
0078791591684242367262529704652673686711493985446003494265587358393155378115
8032447061155145160770580926824366573211993981662614635734812647448360573856
3132247491715526997278115514905618953253443957435881503593414842367096046182
7643434794849824315251510662855699269624207451365738384255497823390996283918
3287667419172988072221996532403300258906083211160744508191024837057033
RSA-460
[edit]RSA-460 has 460 decimal digits (1,526 bits), and has not been factored so far.
RSA-460 = 1786856020404004433262103789212844585886400086993882955081051578507634807524
1464078819812169681394445771476334608488687746254318292828603396149562623036
3564554675355258128655971003201417831521222464468666642766044146641933788836
8932452217321354860484353296131403821175862890998598653858373835628654351880
4806362231643082386848731052350115776715521149453708868428108303016983133390
0416365515466857004900847501644808076825638918266848964153626486460448430073
4909
RSA-1536
[edit]RSA-1536 has 463 decimal digits (1,536 bits), and has not been factored so far. $150,000 was previously offered for successful factorization.
RSA-1536 = 184769970321174147430683562020016440301854933866341017147178577491065169671
116124985933768430543574458561606154457179405222971773252466096064694607124
962372044202226975675668737842756238950876467844093328515749657884341508847
552829818672645133986336493190808467199043187438128336350279547028265329780
293491615581188104984490831954500984839377522725705257859194499387007369575
568843693381277961308923039256969525326162082367649031603655137144791393234
7169566988069
RSA-470
[edit]RSA-470 has 470 decimal digits (1,559 bits), and has not been factored so far.
RSA-470 = 1705147378468118520908159923888702802518325585214915968358891836980967539803
6897711442383602526314519192366612270595815510311970886116763177669964411814
0957486602388713064698304619191359016382379244440741228665455229545368837485
5874455212895044521809620818878887632439504936237680657994105330538621759598
4047709603954312447692725276887594590658792939924609261264788572032212334726
8553025718835659126454325220771380103576695555550710440908570895393205649635
76770285413369
RSA-480
[edit]RSA-480 has 480 decimal digits (1,593 bits), and has not been factored so far.
RSA-480 = 3026570752950908697397302503155918035891122835769398583955296326343059761445
7144169659817040125185215913853345598217234371231338324773210726853524776378
4105186549246199888070331088462855743520880671299302895546822695492968577380
7067958428022008294111984222973260208233693152589211629901686973933487362360
8129660418514569063995282978176790149760521395548532814196534676974259747930
6858645849268328985687423881853632604706175564461719396117318298679820785491
875674946700413680932103
RSA-490
[edit]RSA-490 has 490 decimal digits (1,626 bits), and has not been factored so far.
RSA-490 = 1860239127076846517198369354026076875269515930592839150201028353837031025971
3738522164743327949206433999068225531855072554606782138800841162866037393324
6578171804201717222449954030315293547871401362961501065002486552688663415745
9758925793594165651020789220067311416926076949777767604906107061937873540601
5942747316176193775374190713071154900658503269465516496828568654377183190586
9537640698044932638893492457914750855858980849190488385315076922453755527481
1376719096144119390052199027715691
RSA-500
[edit]RSA-500 has 500 decimal digits (1,659 bits) and has not been factored so far.
RSA-500 = 1897194133748626656330534743317202527237183591953428303184581123062450458870
7687605943212347625766427494554764419515427586743205659317254669946604982419
7301601038125215285400688031516401611623963128370629793265939405081077581694
4786041721411024641038040278701109808664214800025560454687625137745393418221
5494821277335671735153472656328448001134940926442438440198910908603252678814
7850601132077287172819942445113232019492229554237898606631074891074722425617
39680319169243814676235712934292299974411361
RSA-617
[edit]RSA-617 has 617 decimal digits (2,048 bits) and has not been factored so far.
RSA-617 = 2270180129378501419358040512020458674106123596276658390709402187921517148311
9139894870133091111044901683400949483846818299518041763507948922590774925466
0881718792594659210265970467004498198990968620394600177430944738110569912941
2854289188085536270740767072259373777266697344097736124333639730805176309150
6836310795312607239520365290032105848839507981452307299417185715796297454995
0235053160409198591937180233074148804462179228008317660409386563445710347785
5345712108053073639453592393265186603051504106096643731332367283153932350006
7937107541955437362433248361242525945868802353916766181532375855504886901432
221349733
RSA-2048
[edit]RSA-2048 has 617 decimal digits (2,048 bits). It is the largest of the RSA numbers and carried the largest cash prize for its factorization, $200,000.
RSA-2048 = 2519590847565789349402718324004839857142928212620403202777713783604366202070
7595556264018525880784406918290641249515082189298559149176184502808489120072
8449926873928072877767359714183472702618963750149718246911650776133798590957
0009733045974880842840179742910064245869181719511874612151517265463228221686
9987549182422433637259085141865462043576798423387184774447920739934236584823
8242811981638150106748104516603773060562016196762561338441436038339044149526
3443219011465754445417842402092461651572335077870774981712577246796292638635
6373289912154831438167899885040445364023527381951378636564391212010397122822
120720357
See also
[edit]- Integer factorization records
- RSA Factoring Challenge (includes table with size and status of all numbers)
- RSA Secret-Key Challenge
Notes
[edit]- ^ RSA Laboratories. "RSA Factoring Challenge". Archived from the original on September 21, 2013. Retrieved August 5, 2008.
- ^ RSA Laboratories. "The RSA Factoring Challenge FAQ". Archived from the original on September 21, 2013. Retrieved August 5, 2008.
- ^ a b c d e RSA Factoring Challenge Administrator (challenge-administrator@majordomo.rsasecurity.com) (January 30, 2002) [March 5, 1999]. "RSA Honor Roll". challenge-rsa-honor-roll@rsa.com (Mailing list). Archived from the original on September 9, 2023 – via Ray Ontko.
- ^ a b "Archive for the 'RSA' Category". Cryptography Watch. July 9, 1993. p. 2. Archived from the original on January 8, 2009.
- ^ a b Dixon, Brandon; Lenstra, Arjen K. (1994). "Factoring Integers Using SIMD Sieves". In Helleseth, Tor (ed.). Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. Berlin, Heidelberg: Springer (published July 13, 2001). pp. 28–39. doi:10.1007/3-540-48285-7_3. ISBN 978-3-540-48285-7. S2CID 21157010 – via SpringerLink.
- ^ a b chris2be8 (March 27, 2012). "Distributed polynomial selection". mersenneforum.org. Archived from the original on July 2, 2023. Retrieved June 8, 2015.
{{cite web}}: CS1 maint: numeric names: authors list (link) - ^ Denny, T.; Dodson, B.; Lenstra, A. K.; Manasse, M. S. (1994). "On the factorization of RSA-120". In Stinson, Douglas R. (ed.). Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. Berlin, Heidelberg: Springer (published July 13, 2001). pp. 166–174. doi:10.1007/3-540-48329-2_15. ISBN 978-3-540-48329-8 – via SpringerLink.
- ^ Atkins, Derek; Graff, Michael; Lenstra, Arjen K.; Leyland, Paul C. "The Magic Words Are Squeamish Ossifrage". Derek Atkins (PostScript document). Archived from the original on September 9, 2023. Retrieved November 24, 2009 – via Massachusetts Institute of Technology.
- ^ Janeba, Mark (1994) [links and formatting updated September 24, 2002]. "Factoring Challenge Conquered - With a Little Help From Willamette". Prof. Mark Janeba's Framed Home Page. Archived from the original on September 2, 2023. Retrieved March 10, 2008 – via Willamette University.
- ^ McHugh, Nathaniel (March 26, 2015). "The Magic Words are Squeamish Ossifrage - factoring RSA-129 using CADO-NFS". Nat McHugh: Transient Random-Noise Bursts with Announcements. Sheffield, South Yorkshire, UK. Archived from the original on September 2, 2023. Retrieved May 25, 2016 – via Blogger.
- ^ Lenstra, Arjen K.; Cowie, Jim; Elkenbracht-Huizing, Marije; Furmanski, Wojtek; Montgomery, Peter L.; Weber, Damian; Zayer, Joerg (April 12, 1996) [April 11, 1996]. Caldwell, Chris (ed.). "Factorization of RSA-130". NMBRTHRY (Mailing list). PrimePages: prime number research records and results. Archived from the original on September 2, 2023. Retrieved March 10, 2008 – via Notes, Proofs and other Comments.
- ^ Riele, Herman te; Cavallar, Stefania; Dodson, Bruce; Lenstra, Arjen; Leyland, Paul; Lioen, Walter; Montgomery, Peter; Murphy, Brian; Zimmermann, Paul (February 4, 1999) [February 3, 1999]. "Factorization of RSA-140 using the Number Field Sieve". Number Theory List <NMBRTHRY@LISTSERV.NODAK.EDU> (Mailing list). North Dakota University System. Archived from the original on December 8, 2004. Retrieved March 10, 2008.
- ^ "RSA-140 is factored!". Other Activities: Cryptographic Challenges: The RSA Factoring Challenge. RSA Laboratories. RSA Security. Archived from the original on December 30, 2006. Retrieved March 10, 2008.
- ^ Riele, Herman te (August 26, 1999). "New factorization record: Factorization of a 512-bits RSA key using the Number Field Sieve". Number Theory List <NMBRTHRY@LISTSERV.NODAK.EDU> (Mailing list). North Dakota University System. Archived from the original on December 31, 2004. Retrieved March 10, 2008.
On August 22, 1999, we found that the 512-bits number RSA-155 ...
- ^ "RSA-155 is factored!". Other Activities: Cryptographic Challenges: The RSA Factoring Challenge. RSA Laboratories. RSA Security. Archived from the original on December 30, 2006. Retrieved March 10, 2008.
- ^ Bahr, F.; Franke, J.; Kleinjung, T.; Lochter, M.; Böhm, M. (April 1, 2003). Franke, Jens (ed.). "RSA-160". Paul Zimmermann, Laboratoire Lorrain de Recherche en Informatique et ses Applications. Archived from the original on September 2, 2023. Retrieved March 10, 2008.
We have factored RSA160 by gnfs.
- ^ RSA Laboratories, RSA-160 is factored! Archived 2006-12-30 at the Wayback Machine. Retrieved on 2008-03-10.
- ^ D. Bonenberger and M. Krone, RSA-170 Archived 2011-07-19 at the Wayback Machine Retrieved on 2010-03-08.
- ^ Danilov, S. A.; Popovyan, I. A. (May 9, 2010). "Factorization of RSA-180" (PDF). Cryptology ePrint Archive.
- ^ Jens Franke (2003-12-03), RSA576 (repost of announcement of the factorization). Retrieved on 2008-03-10.
- ^ Eric W. Weisstein (2005-12-05), RSA-576 Factored at MathWorld. Retrieved on 2008-03-10.
- ^ RSA Laboratories, RSA-576 is factored! Archived 2006-12-24 at the Wayback Machine. Retrieved on 2008-03-10.
- ^ Danilov, S. A.; Popovyan, I. A. (2010). "Factorization of RSA-180". Cryptology ePrint Archive. Retrieved May 12, 2010.
- ^ I. Popovyan, A. Timofeev (November 8, 2010). "RSA-190 factored". mersenneforum.org. Retrieved November 10, 2010.
- ^ RSA Laboratories, RSA-640 is factored! Archived 2007-01-04 at the Wayback Machine. Retrieved on 2008-03-10.
- ^ Jens Franke (2005-11-04), We have factored RSA640 by GNFS Archived 2008-06-16 at the Wayback Machine. Retrieved on 2008-03-10.
- ^ Eric W. Weisstein (2005-11-08), RSA-640 Factored at MathWorld. Retrieved on 2008-03-10.
- ^ a b Thorsten Kleinjung (2005-05-09), We have factored RSA200 by GNFS Archived 2008-03-22 at the Wayback Machine. Retrieved on 2008-03-10.
- ^ RSA Laboratories, RSA-200 is factored!. Retrieved on 2017-01-25.
- ^ "mersenneforum.org - View Single Post - RSA-210 factored". www.mersenneforum.org. Retrieved February 10, 2024.
- ^ Factorisation of RSA-704 with CADO-NFS Archived 2012-07-02 at the Wayback Machine.
- ^ Bai, Shi (July 2, 2012). "Factorization of RSA704". NMBRTHRY (Mailing list). Retrieved July 3, 2012.
- ^ Zimmermann, Paul (May 13, 2016). "Factorisation of RSA-220 with CADO-NFS". Cado-nfs-discuss (Mailing list). Archived from the original on July 21, 2021. Retrieved May 13, 2016.
- ^ Gross, Samuel. "The Factorization of RSA-230". cado-nfs-discuss. Archived from the original on August 23, 2018. Retrieved August 17, 2018.
- ^ "RSA-232 number has been factored – ИВМ РАН". February 17, 2020. Retrieved February 10, 2024.
- ^ Zheltkov, Dmitry; Zamarashkin, Nikolai; Matveev, Sergey (2023). "How to Make Lanczos-Montgomery Fast on Modern Supercomputers?". In Voevodin, Vladimir; Sobolev, Sergey; Yakobovskiy, Mikhail; Shagaliev, Rashit (eds.). Supercomputing. Lecture Notes in Computer Science. Cham: Springer Nature Switzerland. pp. 114–128. doi:10.1007/978-3-031-49432-1_9. ISBN 978-3-031-49432-1.
- ^ Zheltkov, Dmitry; Zamarashkin, Nikolai; Matveev, Sergey (2023), Voevodin, Vladimir; Sobolev, Sergey; Yakobovskiy, Mikhail; Shagaliev, Rashit (eds.), "How to Make Lanczos-Montgomery Fast on Modern Supercomputers?", Supercomputing, vol. 14388, Cham: Springer Nature Switzerland, pp. 114–128, doi:10.1007/978-3-031-49432-1_9, ISBN 978-3-031-49431-4, retrieved February 10, 2024
- ^ a b Kleinjung, Thorsten; Aoki, Kazumaro; Franke, Jens; Lenstra, Arjen; Thomé, Emmanuel; Bos, Joppe; Gaudry, Pierrick; Kruppa, Alexander; Montgomery, Peter (2010), Factorization of a 768-bit RSA modulus, retrieved February 10, 2024
- ^ "[Cado-NFS-discuss] 795-bit factoring and discrete logarithms". Archived from the original on December 3, 2019. Retrieved December 2, 2019.
- ^ "[Cado-NFS-discuss] Factorization of RSA-250". Archived from the original on February 28, 2020. Retrieved February 28, 2020.
References
[edit]- RSA Factoring Challenge Administrator (1997-10-12), RSA Challenge List
- RSA Laboratories, The RSA Challenge Numbers (archived by the Internet Archive in 2006, before the RSA challenge ended)
- RSA Laboratories, "Challenge numbers in text format". Archived from the original on May 21, 2013.
- Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda, GNFS Factoring Statistics of RSA-100, 110, ..., 150, Cryptology ePrint Archive, Report 2004/095, 2004
External links
[edit]- Steven Levy (March 1996), Wisecrackers in Wired News. coverage on RSA-129
RSA numbers
View on GrokipediaIntroduction
Definition and Properties
RSA numbers constitute a collection of 54 specific semiprimes, each defined as the product of exactly two distinct large prime numbers and published by RSA Laboratories for cryptographic evaluation purposes. These numbers are denoted as RSA-, where for smaller numbers approximates the number of decimal digits (ranging from 100 to 250), and for larger numbers indicates the approximate bit length (from 512 to 2048 bits, corresponding to roughly 155 to 617 decimal digits), in increments designed to test escalating computational challenges; for instance, RSA-100 possesses precisely 100 decimal digits. Unlike arbitrary semiprimes, which may arise from primes of disparate magnitudes, RSA numbers were deliberately selected to embody challenging instances tailored for assessing factorization algorithms. Each RSA number satisfies the equation , where and are distinct primes chosen to be of roughly equal bit length, approximately bits each, thereby balancing the factors to heighten resistance against factorization. This construction ensures for the decimal-labeled numbers, aligning the label with the decimal magnitude of . Such balanced semiprimes optimize difficulty for the general number field sieve (GNFS), the predominant algorithm for factoring large composites, as the complexity scales subexponentially with the size of and is exacerbated when the prime factors are comparably sized. The curation of these semiprimes distinguishes them from general semiprimes by prioritizing maximal factorization hardness over randomness, focusing on configurations that mirror the moduli used in practical RSA cryptosystems.Purpose and Significance
The RSA Factoring Challenge, through its selection of specially constructed semiprime numbers known as RSA numbers, served to benchmark advancements in computational number theory by inviting global researchers to attempt their factorization, thereby underscoring the computational infeasibility of breaking large semiprimes that underpin the security of RSA encryption for practical key sizes.[6] This public contest, initiated by RSA Laboratories, not only stimulated collaborative efforts in algorithm development but also provided empirical evidence that factoring numbers with hundreds of digits remains prohibitively expensive with classical computing resources, reinforcing the viability of RSA for secure communications.[7] The significance of these challenges is evident in the measured progress of factoring capabilities over time, which has directly informed recommendations for RSA key lengths in cryptographic standards. For instance, the 100-digit RSA-100 was factored in mere days using early methods in 1991, whereas the 250-digit RSA-250 required approximately 2700 core-years of computation on modern hardware and was only solved in 2020, illustrating exponential growth in difficulty that supports the continued security of 2048-bit RSA keys against classical attacks as of 2025.[7][8] As of 2025, 23 of the 54 RSA challenge numbers have been factored using classical methods, with no new records achieved since RSA-250, highlighting the plateau in classical factoring efficiency for larger instances. Beyond benchmarking, the challenge profoundly impacted the evolution of factoring algorithms, particularly driving refinements to the General Number Field Sieve (GNFS), the state-of-the-art method for large-integer factorization, through iterative improvements tested on these targets. This progress influenced cryptographic guidelines, such as those from NIST, which continue to endorse 2048-bit RSA moduli for applications requiring security through at least 2030, while also spurring post-challenge research into hybrid classical-quantum threats. The enduring legacy of the RSA numbers persists in ongoing efforts to assess encryption resilience, even amid advancing quantum computing capabilities that pose long-term risks to RSA's foundational hardness assumption.[9]History of the RSA Factoring Challenge
Origins in 1977
In 1977, Ronald Rivest, Adi Shamir, and Leonard Adleman, working at MIT, developed the RSA public-key cryptosystem and sought to illustrate its security against factoring attacks by creating a practical challenge. They generated a 129-digit semiprime modulus, later designated RSA-129, by multiplying two large primes using computational resources available on early computers such as the PDP-10. To publicize the challenge, they encrypted the plaintext message "The magic words are Squeamish Ossifrage" with this modulus and provided the ciphertext along with the public exponent in Martin Gardner's "Mathematical Games" column in the August 1977 issue of Scientific American. This publication served as the debut of the RSA method to a broader audience and posed the problem of factoring RSA-129 to decrypt the message, estimating that it would require millions of years with 1977-era technology.[10] The challenge was part of the trio's effort to demonstrate the one-way nature of the RSA algorithm, where encryption is straightforward but decryption without the private key—derived from factoring the semiprime—remains computationally infeasible for sufficiently large numbers. Rivest, Shamir, and Adleman had formalized their approach in an internal MIT memorandum dated April 4, 1977, which they shared with Gardner, leading to the Scientific American feature. Although they generated RSA-129 specifically for this demonstration, it marked the origin of what would become a series of factoring challenges, with only this 129-digit example publicized at the time to emphasize the cryptosystem's robustness.[11] RSA-129 withstood attempts at factorization for 17 years, underscoring the initial security claims, until a breakthrough in April 1994. A distributed team including Derek Atkins, Arjen Lenstra, and others employed the multiple polynomial quadratic sieve algorithm across roughly 1,600 workstations connected via the early Internet, completing the factorization after about eight months of coordinated effort. This achievement not only revealed the hidden message but also highlighted the evolving capabilities of collaborative computing in number theory research.[12]Launch and Evolution (1991–2007)
The RSA Factoring Challenge was formally launched on March 18, 1991, by RSA Laboratories to encourage research into computational number theory and assess the security implications of integer factorization for public-key cryptography. The initial setup published a list of 42 semiprime numbers, designated RSA-100, RSA-110, ..., RSA-500, along with RSA-617, where the labels indicated the approximate number of decimal digits, and cash prizes were offered to incentivize solutions.[1] The challenge evolved over the subsequent years to incorporate larger numbers as factoring techniques and computational resources advanced, ensuring it remained a relevant benchmark for cryptographic strength. In 1997, additional landmark numbers such as RSA-160 were added to the list, followed by expansions including RSA-576 and progressing to RSA-1024 by the early 2000s. Prizes were structured to scale with the difficulty, offering $100 for factoring RSA-100 and escalating to $200,000 for the 1024-bit RSA-1024.[13][14][15] Operational rules required that proposed factors be submitted to [email protected] for verification by RSA Laboratories, with successful solutions confirmed through independent checks to ensure validity. Quantum-based factoring methods were not initially considered viable, given their theoretical stage and lack of practical implementation during this period. By 2007, the challenge had expanded to encompass 54 numbers in total, incorporating non-consecutive sizes such as RSA-768 to better align with evolving key length standards in cryptography.[16][17]Discontinuation and Legacy
In April 2007, RSA Security discontinued the formal RSA Factoring Challenge, citing the industry's considerably more advanced understanding of the cryptanalytic threats to RSA encryption as rendering the contest obsolete, alongside a strategic shift toward commercial priorities. While no new prizes were offered thereafter, the organization continued to accept and verify submitted factorizations for the purpose of maintaining records on computational number theory progress.[18] The challenge's legacy endures in its profound influence on cryptographic research, particularly through advancements in the General Number Field Sieve (GNFS) algorithm, which became the gold standard for factoring large semiprimes during and after the contest's active phase. These developments, driven by competitive efforts to solve the posted numbers, provided critical benchmarks for assessing the practical security of RSA-based systems and informed the broader transition to quantum-resistant cryptography. For instance, the demonstrated progress in classical factoring underscored the vulnerability of RSA to future quantum algorithms like Shor's, accelerating initiatives such as the NIST Post-Quantum Cryptography standardization project, which finalized initial standards in 2024 to replace factoring-dependent schemes.[19][20] Even after discontinuation, the RSA numbers inspired continued private and collaborative factorization attempts, with two notable post-2007 successes: the 232-digit RSA-768, factored in December 2009 using an optimized GNFS implementation across distributed computing resources, and the 250-digit RSA-250, completed in February 2020 via the open-source CADO-NFS software on high-performance clusters. As of 2025, quantum computing claims—such as a 2024 report of factoring a general 2048-bit RSA modulus using D-Wave's quantum annealing hardware—remain unverified for specific challenge instances like RSA-2048, with experts emphasizing that no scalable, general-purpose quantum breakthrough has materialized. Community-driven efforts persist through dedicated platforms like the Mersenne Forum, where open-source tools such as msieve enable ongoing experimentation and collaboration on large-integer factorization.[19][21][22][23][24]Mathematical Background
Semiprimes in Cryptography
Semiprimes play a central role in the RSA cryptosystem, where the security hinges on the computational difficulty of factoring a large semiprime into its two prime factors and . The RSA algorithm, developed by Rivest, Shamir, and Adleman, is an asymmetric encryption scheme that uses a public key for encryption and a private key for decryption.[11] To generate the keys, two large primes and are selected such that , and the public exponent is chosen to be coprime to Euler's totient function . The private exponent is then computed as the modular inverse of modulo , satisfying . The encryption of a message is performed as , and decryption recovers , relying on the Chinese Remainder Theorem (or Euler's theorem when ), ensuring the congruence holds for . For semiprimes specifically, and are chosen to be large primes of approximately equal bit length to maximize the factoring difficulty; if one prime is significantly smaller, trial division could efficiently reveal it, while unequal sizes make Fermat's factorization method more effective by exploiting the difference . The totient is crucial for key computation but kept secret, as knowing it would allow solving for and via the quadratic equation derived from . The overall security of RSA rests on the hardness of factoring such balanced semiprimes, with the most efficient classical method being the general number field sieve (GNFS). The heuristic asymptotic complexity of GNFS for factoring an -bit semiprime is , where , making it infeasible for sufficiently large (e.g., 2048 bits or more) with current computational resources.[25]Generation of RSA Numbers
The RSA numbers for the factoring challenge were created by selecting two large prime numbers and of approximately equal bit length at random and computing their product to form a semiprime. This method ensures is a challenging instance for factorization algorithms, as the primes are balanced with kept relatively small compared to their magnitude.[1][13] In the early days of RSA development, such as for the 1977 example RSA-129, primes were generated using custom software with early probabilistic primality testing methods, such as the Solovay-Strassen test. By the time the formal RSA Factoring Challenge launched in 1991, generation relied on probabilistic primality tests, such as the Miller-Rabin algorithm, which provide high confidence (error probability less than ) in identifying primes efficiently for numbers up to hundreds of digits. These tests involve repeated witness checks to verify compositeness or probable primality without exhaustive division.[13] The 1991 challenge numbers, ranging from RSA-100 to RSA-500, were produced using RSA Data Security's RSA DSP product—a PC-compatible hardware board featuring a Motorola 56000 DSP chip for accelerated computations. This tool generated the primes randomly and verified their primality probabilistically, completing the entire set in just 30 minutes; the primes were specifically chosen congruent to 2 modulo 3 to support RSA encryption with public exponent 3. To maintain secrecy, the factors were discarded immediately after multiplication, with no records kept even by RSA Laboratories, ensuring the challenge's integrity. The numbers were designed as "hard" cases, avoiding special forms like Fermat numbers or those with small or smooth factors that could ease factorization.[15] Upon submission of purported factors for a solved RSA number, RSA Laboratories verified primality using rigorous probabilistic or deterministic methods before awarding prizes, confirming the product equaled the challenge number. The full list of challenge numbers was published in decimal form in 1991 to standardize the problems and facilitate global participation.[15][13]Factored RSA Numbers (100–250 Digits)
RSA-100
RSA-100 is the smallest number in the RSA Factoring Challenge, consisting of 100 decimal digits and equivalent to a 330-bit semiprime. Its full decimal value is:1522605027922533360535618378132637429718068114961380688657908494580122963258952897654000350692006139
1522605027922533360535618378132637429718068114961380688657908494580122963258952897654000350692006139
- p = 37975227936943673922808872755445627854565536638199
- q = 40094690950920881030683735292761468389214899724061
RSA-110
RSA-110 is a 110-digit semiprime number generated as part of the RSA Factoring Challenge to test the difficulty of integer factorization for cryptographic purposes. Its full decimal value is:35794234179725868774991807832568455403003778024228226193532908190484670252364677411513516111204504060317568667
35794234179725868774991807832568455403003778024228226193532908190484670252364677411513516111204504060317568667
- Smaller prime: 1642968817386096924230411099713335315203099899839921
- Larger prime: 2179836019895099689627535814410170495145499987151907
RSA-120
RSA-120 is a 120-digit semiprime constructed as the product of two roughly equal-sized primes for the RSA Factoring Challenge to test the difficulty of integer factorization.Its full decimal value is:
227010481295437363334259960947493668895875336466084780038173258247009162675779735389791151574049166747880487470296548479
227010481295437363334259960947493668895875336466084780038173258247009162675779735389791151574049166747880487470296548479
- Smaller factor: 327414555693498015751146303749141488063642403240171463406883 (60 digits)
- Larger factor: 693342667110830181197325401899700641361965863127336680673013 (60 digits)
RSA-129
RSA-129 is a 129-digit semiprime number that served as an early challenge in public-key cryptography, published in August 1977 by Martin Gardner in Scientific American to illustrate the RSA algorithm's security.[10] The number was generated by Rivest, Shamir, and Adleman as the product of two large primes and used to encrypt a short message, with the claim that factoring it would require an impractically long time using 1977-era technology—estimated at 40 quadrillion years.[10] The full decimal representation of RSA-129 is:114381625757888867669235779976146612010218296721242362562561842935706935245733897830597123563958705058989075147599290026879543541
114381625757888867669235779976146612010218296721242362562561842935706935245733897830597123563958705058989075147599290026879543541
p = 3490529510847650949147849619903898133417764638493387843990820577 (64 digits)
q = 32769132993266709549961988190834461413177642967992942539798288533 (65 digits)
p = 3490529510847650949147849619903898133417764638493387843990820577 (64 digits)
q = 32769132993266709549961988190834461413177642967992942539798288533 (65 digits)
RSA-130
RSA-130 is a 130-digit semiprime number generated as part of the RSA Factoring Challenge to test the limits of integer factorization algorithms.[31] The number is:1807082088687404805951656164405905566278102516769401349170127021450056662540244048387341127590812303371781887966563182013214880557
```[](https://t5k.org/notes/rsa130.html)
This [semiprime](/page/Semiprime) was factored on April 10, 1996, by a team led by Paul Leyland using the general number field sieve (GNFS).[](https://t5k.org/notes/rsa130.html) The prime factors are:
1807082088687404805951656164405905566278102516769401349170127021450056662540244048387341127590812303371781887966563182013214880557
```[](https://t5k.org/notes/rsa130.html)
This [semiprime](/page/Semiprime) was factored on April 10, 1996, by a team led by Paul Leyland using the general number field sieve (GNFS).[](https://t5k.org/notes/rsa130.html) The prime factors are:
and
and
The factorization effort required approximately three months of computation on 100 workstations, highlighting the growing feasibility of GNFS for large-scale [semiprime](/page/Semiprime)s at the time.[](https://t5k.org/notes/rsa130.html) This achievement marked an early maturation of the GNFS method for numbers of this size.[](https://t5k.org/notes/rsa130.html)
### RSA-140
RSA-140 is a 140-digit [semiprime](/page/Semiprime) number selected as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), published by RSA Laboratories in 1991 to demonstrate the difficulty of factoring large semiprimes in [public-key cryptography](/page/Public-key_cryptography). The number is given by:
The factorization effort required approximately three months of computation on 100 workstations, highlighting the growing feasibility of GNFS for large-scale [semiprime](/page/Semiprime)s at the time.[](https://t5k.org/notes/rsa130.html) This achievement marked an early maturation of the GNFS method for numbers of this size.[](https://t5k.org/notes/rsa130.html)
### RSA-140
RSA-140 is a 140-digit [semiprime](/page/Semiprime) number selected as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), published by RSA Laboratories in 1991 to demonstrate the difficulty of factoring large semiprimes in [public-key cryptography](/page/Public-key_cryptography). The number is given by:
This challenge number was fully factored on February 2, 1999, by an international team led by Herman te Riele at the Centrum Wiskunde & Informatica (CWI) in the Netherlands. The team consisted of Stefania Cavallar, Bruce Dodson, Arjen Lenstra, Paul Leyland, Walter Lioen, Peter L. Montgomery, Brian Murphy, and Paul Zimmermann. They employed the General Number Field Sieve (GNFS), the most advanced method available at the time for factoring large composite numbers without special form.[](https://ir.cwi.nl/pub/10352/10352D.pdf)
The prime factors of RSA-140 are:
- $ p = 3398717423028438554530123627613875835633986495969597423490929302771479 $
- $ q = 6264200187401285096151654948264442219302037178623509019111660653946049 $
These 70-digit primes were discovered after an extensive sieving phase and linear algebra [computation](/page/Computation), marking a new record for the largest general [integer](/page/Integer) factored using GNFS at that time. The effort required approximately 8.9 CPU-years on various workstations and PCs, equivalent to about 2000 MIPS-years of computational power, highlighting the escalating resources needed for factoring as RSA challenge sizes increased.[](https://ir.cwi.nl/pub/10352/10352D.pdf)
### RSA-150
RSA-150 is a 150-digit [semiprime](/page/Semiprime) composed of two distinct prime factors, generated by RSA Laboratories as part of their factoring challenge to test the difficulty of [integer factorization](/page/Integer_factorization) relevant to [public-key cryptography](/page/Public-key_cryptography). Its full decimal value is:
This challenge number was fully factored on February 2, 1999, by an international team led by Herman te Riele at the Centrum Wiskunde & Informatica (CWI) in the Netherlands. The team consisted of Stefania Cavallar, Bruce Dodson, Arjen Lenstra, Paul Leyland, Walter Lioen, Peter L. Montgomery, Brian Murphy, and Paul Zimmermann. They employed the General Number Field Sieve (GNFS), the most advanced method available at the time for factoring large composite numbers without special form.[](https://ir.cwi.nl/pub/10352/10352D.pdf)
The prime factors of RSA-140 are:
- $ p = 3398717423028438554530123627613875835633986495969597423490929302771479 $
- $ q = 6264200187401285096151654948264442219302037178623509019111660653946049 $
These 70-digit primes were discovered after an extensive sieving phase and linear algebra [computation](/page/Computation), marking a new record for the largest general [integer](/page/Integer) factored using GNFS at that time. The effort required approximately 8.9 CPU-years on various workstations and PCs, equivalent to about 2000 MIPS-years of computational power, highlighting the escalating resources needed for factoring as RSA challenge sizes increased.[](https://ir.cwi.nl/pub/10352/10352D.pdf)
### RSA-150
RSA-150 is a 150-digit [semiprime](/page/Semiprime) composed of two distinct prime factors, generated by RSA Laboratories as part of their factoring challenge to test the difficulty of [integer factorization](/page/Integer_factorization) relevant to [public-key cryptography](/page/Public-key_cryptography). Its full decimal value is:
This number was factored on April 16, [2004](/page/2004), by Kazumaro Aoki, Yasumasa Kida, and colleagues using the general number field sieve (GNFS) algorithm, specifically employing a lattice sieve for relation collection.[](https://eprint.iacr.org/2004/095.pdf) The computation utilized [Pentium 4](/page/Pentium_4) processors running at 2.53 GHz under [FreeBSD](/page/FreeBSD), with sieving efforts scaled to equivalent time on a single machine totaling approximately 20.6 million seconds (about 238 days or 7.8 months).[](https://eprint.iacr.org/2004/095.pdf) The linear algebra phase, performed with the Block Lanczos method on 16 such PCs, required an additional 101 hours and 31 minutes.[](https://eprint.iacr.org/2004/095.pdf)
The two 75-digit prime factors are:
- 348009867102283695483970451047593424831012817350385456889559637548278410717
- 445647744903640741533241125787086176005442536297766153493419724532460296199
Their product verifies as RSA-150.[](https://eprint.iacr.org/2004/095.pdf) This factorization, achieved years after larger RSA numbers like RSA-155, underscored the advancing practicality of GNFS for numbers around 500 bits while still requiring substantial but accessible computational effort.[](https://mathworld.wolfram.com/RSANumber.html)
### RSA-155
RSA-155 is a 155-digit [semiprime](/page/Semiprime) number selected as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the security of RSA [encryption](/page/Encryption) against [integer factorization](/page/Integer_factorization) attacks. The full decimal value of RSA-155 is:
10941738641570527421809707322040357612003732945449205990913842131476349984288934784717997257891267332497625752899781833797076537244027146743531593354333897
This number, equivalent to 512 bits in length, was designed to represent a challenging yet feasible target for contemporary factoring algorithms at the time of its publication.[](https://ir.cwi.nl/pub/10351/10351D.pdf)
The factorization of RSA-155 was completed on August 22, 1999, by a collaborative team associated with the Cunningham project, led by Herman te Riele at the Centrum Wiskunde & Informatica (CWI) in the [Netherlands](/page/Netherlands).[](https://ir.cwi.nl/pub/10351/10351D.pdf) The effort utilized the General Number Field Sieve (GNFS), the most advanced method available for factoring large semiprimes, involving polynomial selection, sieving for relations, linear algebra over finite fields, and square root computation.[](https://ir.cwi.nl/pub/10351/10351D.pdf) The team consisted of researchers including Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Walter Lioen, Peter L. Montgomery, Brian Murphy, and others from institutions across [Europe](/page/Europe) and [North America](/page/North_America).[](https://ir.cwi.nl/pub/10351/10351D.pdf) This distributed computation spanned approximately 5.5 calendar months, with sieving performed on around 300 workstations and PCs at 12 sites in six countries, highlighting the influence of coordinated volunteer and institutional [distributed computing](/page/Distributed_computing) projects on large-scale cryptographic challenges.[](https://ir.cwi.nl/pub/10351/10351D.pdf)
The complete factorization yielded two prime factors of roughly equal length:
$p = 102639592829741105772054196573991675900716567808038066803341933521790711307779$
$q = 106603488380168454820927220360012878679207958575989291522270608237193062808643$
Verification confirms that $p \times q$ equals RSA-155.[](https://ir.cwi.nl/pub/10351/10351D.pdf) The total computational effort required approximately 8400 MIPS-years, a measure reflecting the scale of processing power equivalent to thousands of MIPS (millions of [instructions per second](/page/Instructions_per_second)) machines running for a year, underscoring the significant resources needed even for this size in 1999.[](https://ir.cwi.nl/pub/10351/10351D.pdf) This achievement demonstrated the practical vulnerability of 512-bit RSA keys and influenced recommendations for increasing key sizes in cryptographic standards.[](https://ir.cwi.nl/pub/10351/10351D.pdf)
### RSA-160
RSA-160 is a 160-digit [semiprime](/page/Semiprime) generated by RSA Laboratories as part of their factoring challenge to test the difficulty of [integer factorization](/page/Integer_factorization) for cryptographic applications. Its full decimal value is 2152741102718889701896015201312825429257773588845675980170497676778133145218859135673011059773491059602497907111585214302079314665202840140619946994927570407753.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
This number was successfully factored on April 1, 2003, by a team consisting of Frank Bahr, Jens Franke, Thorsten Kleinjung, Michael Lochter, and Martin Böhme from the [University of Bonn](/page/University_of_Bonn) and the Bundesamt für Sicherheit in der Informationstechnik (BSI).[](https://members.loria.fr/pzimmermann/records/factor-previous.html) The factorization employed the general number field sieve (GNFS), the state-of-the-art algorithm for factoring large semiprimes at the time, involving extensive sieving on approximately 100 CPUs at BSI followed by linear algebra steps on a cluster of 25 processors at the [University of Bonn](/page/University_of_Bonn).[](https://members.loria.fr/pzimmermann/records/factor-previous.html)
The two prime factors are 45427892858481394071686190649738831656137145778469793250959984709250004157335359 and 47388090603832016196633832303788951973268922921040957944741354648812028493909367.[](https://www.cs.unibo.it/~babaoglu/courses/security/lucidi/pdf/critto-RSA.pdf) This achievement demonstrated continued [acceleration](/page/Acceleration) in factoring capabilities during the mid-2000s, building on prior successes like RSA-155 four years earlier.[](https://members.loria.fr/pzimmermann/records/factor-previous.html)
### RSA-170
RSA-170 is a 170-digit [semiprime](/page/Semiprime) composed of two distinct prime factors, originally published as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the limits of [integer factorization](/page/Integer_factorization) algorithms. The number is:
This number was factored on April 16, [2004](/page/2004), by Kazumaro Aoki, Yasumasa Kida, and colleagues using the general number field sieve (GNFS) algorithm, specifically employing a lattice sieve for relation collection.[](https://eprint.iacr.org/2004/095.pdf) The computation utilized [Pentium 4](/page/Pentium_4) processors running at 2.53 GHz under [FreeBSD](/page/FreeBSD), with sieving efforts scaled to equivalent time on a single machine totaling approximately 20.6 million seconds (about 238 days or 7.8 months).[](https://eprint.iacr.org/2004/095.pdf) The linear algebra phase, performed with the Block Lanczos method on 16 such PCs, required an additional 101 hours and 31 minutes.[](https://eprint.iacr.org/2004/095.pdf)
The two 75-digit prime factors are:
- 348009867102283695483970451047593424831012817350385456889559637548278410717
- 445647744903640741533241125787086176005442536297766153493419724532460296199
Their product verifies as RSA-150.[](https://eprint.iacr.org/2004/095.pdf) This factorization, achieved years after larger RSA numbers like RSA-155, underscored the advancing practicality of GNFS for numbers around 500 bits while still requiring substantial but accessible computational effort.[](https://mathworld.wolfram.com/RSANumber.html)
### RSA-155
RSA-155 is a 155-digit [semiprime](/page/Semiprime) number selected as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the security of RSA [encryption](/page/Encryption) against [integer factorization](/page/Integer_factorization) attacks. The full decimal value of RSA-155 is:
10941738641570527421809707322040357612003732945449205990913842131476349984288934784717997257891267332497625752899781833797076537244027146743531593354333897
This number, equivalent to 512 bits in length, was designed to represent a challenging yet feasible target for contemporary factoring algorithms at the time of its publication.[](https://ir.cwi.nl/pub/10351/10351D.pdf)
The factorization of RSA-155 was completed on August 22, 1999, by a collaborative team associated with the Cunningham project, led by Herman te Riele at the Centrum Wiskunde & Informatica (CWI) in the [Netherlands](/page/Netherlands).[](https://ir.cwi.nl/pub/10351/10351D.pdf) The effort utilized the General Number Field Sieve (GNFS), the most advanced method available for factoring large semiprimes, involving polynomial selection, sieving for relations, linear algebra over finite fields, and square root computation.[](https://ir.cwi.nl/pub/10351/10351D.pdf) The team consisted of researchers including Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Walter Lioen, Peter L. Montgomery, Brian Murphy, and others from institutions across [Europe](/page/Europe) and [North America](/page/North_America).[](https://ir.cwi.nl/pub/10351/10351D.pdf) This distributed computation spanned approximately 5.5 calendar months, with sieving performed on around 300 workstations and PCs at 12 sites in six countries, highlighting the influence of coordinated volunteer and institutional [distributed computing](/page/Distributed_computing) projects on large-scale cryptographic challenges.[](https://ir.cwi.nl/pub/10351/10351D.pdf)
The complete factorization yielded two prime factors of roughly equal length:
$p = 102639592829741105772054196573991675900716567808038066803341933521790711307779$
$q = 106603488380168454820927220360012878679207958575989291522270608237193062808643$
Verification confirms that $p \times q$ equals RSA-155.[](https://ir.cwi.nl/pub/10351/10351D.pdf) The total computational effort required approximately 8400 MIPS-years, a measure reflecting the scale of processing power equivalent to thousands of MIPS (millions of [instructions per second](/page/Instructions_per_second)) machines running for a year, underscoring the significant resources needed even for this size in 1999.[](https://ir.cwi.nl/pub/10351/10351D.pdf) This achievement demonstrated the practical vulnerability of 512-bit RSA keys and influenced recommendations for increasing key sizes in cryptographic standards.[](https://ir.cwi.nl/pub/10351/10351D.pdf)
### RSA-160
RSA-160 is a 160-digit [semiprime](/page/Semiprime) generated by RSA Laboratories as part of their factoring challenge to test the difficulty of [integer factorization](/page/Integer_factorization) for cryptographic applications. Its full decimal value is 2152741102718889701896015201312825429257773588845675980170497676778133145218859135673011059773491059602497907111585214302079314665202840140619946994927570407753.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
This number was successfully factored on April 1, 2003, by a team consisting of Frank Bahr, Jens Franke, Thorsten Kleinjung, Michael Lochter, and Martin Böhme from the [University of Bonn](/page/University_of_Bonn) and the Bundesamt für Sicherheit in der Informationstechnik (BSI).[](https://members.loria.fr/pzimmermann/records/factor-previous.html) The factorization employed the general number field sieve (GNFS), the state-of-the-art algorithm for factoring large semiprimes at the time, involving extensive sieving on approximately 100 CPUs at BSI followed by linear algebra steps on a cluster of 25 processors at the [University of Bonn](/page/University_of_Bonn).[](https://members.loria.fr/pzimmermann/records/factor-previous.html)
The two prime factors are 45427892858481394071686190649738831656137145778469793250959984709250004157335359 and 47388090603832016196633832303788951973268922921040957944741354648812028493909367.[](https://www.cs.unibo.it/~babaoglu/courses/security/lucidi/pdf/critto-RSA.pdf) This achievement demonstrated continued [acceleration](/page/Acceleration) in factoring capabilities during the mid-2000s, building on prior successes like RSA-155 four years earlier.[](https://members.loria.fr/pzimmermann/records/factor-previous.html)
### RSA-170
RSA-170 is a 170-digit [semiprime](/page/Semiprime) composed of two distinct prime factors, originally published as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the limits of [integer factorization](/page/Integer_factorization) algorithms. The number is:
This value was generated by RSA Laboratories in the early [1990s](/page/1990s), with a checksum of 463921 to verify [integrity](/page/Integrity) during transmission.[](https://gist.github.com/aburan28/d7a63343e76107e36bc66239b2e5169d)
The factorization of RSA-170 was completed on December 29, 2009, by researchers Dominik Bonenberger and Martin Krone at Ostfalia University of Applied Sciences (Fachhochschule [Braunschweig](/page/Braunschweig)/Wolfenbüttel) using the general number field sieve ([GNFS](/page/Algorithm)) algorithm.[](https://www.researchgate.net/publication/228392310_Factorization_of_RSA-170) The effort took approximately six weeks of computation, marking it as the smallest remaining unfactored challenge number from the original list at the time.[](https://www.researchgate.net/publication/228392310_Factorization_of_RSA-170) Polynomial selection—a critical and computationally intensive phase of GNFS—was uniquely performed entirely on a [graphics processing unit](/page/Graphics_processing_unit) ([GPU](/page/Hardware_acceleration)), demonstrating early integration of consumer-grade hardware acceleration in large-scale [factorization](/page/Factorization).[](https://www.researchgate.net/publication/228392310_Factorization_of_RSA-170)
RSA-170 factors into two primes, each with 85 decimal digits, as detailed in the original publication.[](https://www.researchgate.net/publication/228392310_Factorization_of_RSA-170)
This achievement underscored advances in accessible computing for cryptographic research, as the computation relied on standard PCs augmented with GPU support rather than specialized supercomputers.[](https://eprint.iacr.org/2010/270.pdf)
### RSA-180
RSA-180 is a 180-digit semiprime number published by RSA Laboratories as part of their factoring challenge to test the security of RSA encryption. Its full decimal value is:
This value was generated by RSA Laboratories in the early [1990s](/page/1990s), with a checksum of 463921 to verify [integrity](/page/Integrity) during transmission.[](https://gist.github.com/aburan28/d7a63343e76107e36bc66239b2e5169d)
The factorization of RSA-170 was completed on December 29, 2009, by researchers Dominik Bonenberger and Martin Krone at Ostfalia University of Applied Sciences (Fachhochschule [Braunschweig](/page/Braunschweig)/Wolfenbüttel) using the general number field sieve ([GNFS](/page/Algorithm)) algorithm.[](https://www.researchgate.net/publication/228392310_Factorization_of_RSA-170) The effort took approximately six weeks of computation, marking it as the smallest remaining unfactored challenge number from the original list at the time.[](https://www.researchgate.net/publication/228392310_Factorization_of_RSA-170) Polynomial selection—a critical and computationally intensive phase of GNFS—was uniquely performed entirely on a [graphics processing unit](/page/Graphics_processing_unit) ([GPU](/page/Hardware_acceleration)), demonstrating early integration of consumer-grade hardware acceleration in large-scale [factorization](/page/Factorization).[](https://www.researchgate.net/publication/228392310_Factorization_of_RSA-170)
RSA-170 factors into two primes, each with 85 decimal digits, as detailed in the original publication.[](https://www.researchgate.net/publication/228392310_Factorization_of_RSA-170)
This achievement underscored advances in accessible computing for cryptographic research, as the computation relied on standard PCs augmented with GPU support rather than specialized supercomputers.[](https://eprint.iacr.org/2010/270.pdf)
### RSA-180
RSA-180 is a 180-digit semiprime number published by RSA Laboratories as part of their factoring challenge to test the security of RSA encryption. Its full decimal value is:
This number was factored into its two prime components using the general number field sieve (GNFS) algorithm, the most efficient known method for factoring large semiprimes at the time. The factorization was completed on May 9, 2010, by Sergei A. Danilov and Igor A. Popovyan from [Moscow State University](/page/Moscow_State_University).[](https://eprint.iacr.org/2010/270)
The prime factors are:
- Smaller prime: 400780082329750877952581339104100572526829317815807176564882178998497572771950624613470377 (90 digits)
- Larger prime: 476939688738611836995535477357070857939902076027788232031989775824606225595773435668861833 (90 digits)
Verification confirms their product equals RSA-180.[](https://eprint.iacr.org/2010/270)
The computation relied on [open-source software](/page/Open-source_software), including the GGNFS suite for sieving and msieve for linear algebra and [square root](/page/Square_root) steps. It was performed across two platforms: 24 virtual processors on three [Intel Core](/page/Intel_Core) i7 4 GHz PCs (each with 6 GB RAM) and 100 virtual processors on the SKIF MSU "Chebyshev" supercomputer. The total effort spanned approximately three months, starting in [January](/page/January) 2010 following the factorization of RSA-170, with polynomial selection taking 12–13 days, sieving 26–63 days, linear algebra 24–33 days, and [square root](/page/Square_root) extraction 10–19 hours per platform. This demonstrated that mid-sized RSA challenges could be solved affordably using commodity hardware and free tools, at an estimated cost of around $3,000 for equivalent processing power.[](https://eprint.iacr.org/2010/270)
### RSA-190
RSA-190 is a 190-digit [semiprime](/page/Semiprime) number from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), designed to test the difficulty of [integer factorization](/page/Integer_factorization) for cryptographic purposes. The full [decimal](/page/Decimal) value is 1907556405060696491061450432646028861081179759533184460647975622318915025587184175754054976155121593293492260464152630093238509246603207417124726121580858185985938946945490481721756401423481.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
This number was factored on November 8, 2010, by Igor A. Popovyan from [Moscow State University](/page/Moscow_State_University), [Russia](/page/Russia), and Alexei Timofeev from the Centrum Wiskunde & Informatica (CWI), [Netherlands](/page/Netherlands), using the general number field sieve (GNFS) [algorithm](/page/Algorithm).[](https://mersenneforum.org/showthread.php?t=14177) The factorization effort took several months of [computation](/page/Computation) on a cluster of personal computers, marking an achievement in [distributed computing](/page/Distributed_computing) for large-scale [number theory](/page/Number_theory) problems during the early [2010s](/page/2010s).[](https://shi-bai.github.io/factor/rsa190.html)
The prime factors of RSA-190 are two large primes of approximately equal size: one with 314 bits (94 decimal digits) and the other with 315 bits (95 decimal digits), confirming its structure as a product suitable for RSA encryption challenges. This factorization contributed to advancing records in the early [2000s](/page/2000s) era of GNFS implementations, though subsequent efforts focused on even larger composites.[](https://crypto.stackexchange.com/questions/117954/are-most-rsa-integers-unbalanced)
### RSA-200
RSA-200 is a 200-decimal-digit [semiprime](/page/Semiprime) [integer](/page/Integer) constructed as the product of two 100-digit primes, published by RSA Laboratories in [1991](/page/1991) as part of their factoring challenge to advance research in [computational number theory](/page/Computational_number_theory). Its full decimal value is:
This number was factored into its two prime components using the general number field sieve (GNFS) algorithm, the most efficient known method for factoring large semiprimes at the time. The factorization was completed on May 9, 2010, by Sergei A. Danilov and Igor A. Popovyan from [Moscow State University](/page/Moscow_State_University).[](https://eprint.iacr.org/2010/270)
The prime factors are:
- Smaller prime: 400780082329750877952581339104100572526829317815807176564882178998497572771950624613470377 (90 digits)
- Larger prime: 476939688738611836995535477357070857939902076027788232031989775824606225595773435668861833 (90 digits)
Verification confirms their product equals RSA-180.[](https://eprint.iacr.org/2010/270)
The computation relied on [open-source software](/page/Open-source_software), including the GGNFS suite for sieving and msieve for linear algebra and [square root](/page/Square_root) steps. It was performed across two platforms: 24 virtual processors on three [Intel Core](/page/Intel_Core) i7 4 GHz PCs (each with 6 GB RAM) and 100 virtual processors on the SKIF MSU "Chebyshev" supercomputer. The total effort spanned approximately three months, starting in [January](/page/January) 2010 following the factorization of RSA-170, with polynomial selection taking 12–13 days, sieving 26–63 days, linear algebra 24–33 days, and [square root](/page/Square_root) extraction 10–19 hours per platform. This demonstrated that mid-sized RSA challenges could be solved affordably using commodity hardware and free tools, at an estimated cost of around $3,000 for equivalent processing power.[](https://eprint.iacr.org/2010/270)
### RSA-190
RSA-190 is a 190-digit [semiprime](/page/Semiprime) number from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), designed to test the difficulty of [integer factorization](/page/Integer_factorization) for cryptographic purposes. The full [decimal](/page/Decimal) value is 1907556405060696491061450432646028861081179759533184460647975622318915025587184175754054976155121593293492260464152630093238509246603207417124726121580858185985938946945490481721756401423481.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
This number was factored on November 8, 2010, by Igor A. Popovyan from [Moscow State University](/page/Moscow_State_University), [Russia](/page/Russia), and Alexei Timofeev from the Centrum Wiskunde & Informatica (CWI), [Netherlands](/page/Netherlands), using the general number field sieve (GNFS) [algorithm](/page/Algorithm).[](https://mersenneforum.org/showthread.php?t=14177) The factorization effort took several months of [computation](/page/Computation) on a cluster of personal computers, marking an achievement in [distributed computing](/page/Distributed_computing) for large-scale [number theory](/page/Number_theory) problems during the early [2010s](/page/2010s).[](https://shi-bai.github.io/factor/rsa190.html)
The prime factors of RSA-190 are two large primes of approximately equal size: one with 314 bits (94 decimal digits) and the other with 315 bits (95 decimal digits), confirming its structure as a product suitable for RSA encryption challenges. This factorization contributed to advancing records in the early [2000s](/page/2000s) era of GNFS implementations, though subsequent efforts focused on even larger composites.[](https://crypto.stackexchange.com/questions/117954/are-most-rsa-integers-unbalanced)
### RSA-200
RSA-200 is a 200-decimal-digit [semiprime](/page/Semiprime) [integer](/page/Integer) constructed as the product of two 100-digit primes, published by RSA Laboratories in [1991](/page/1991) as part of their factoring challenge to advance research in [computational number theory](/page/Computational_number_theory). Its full decimal value is:
[](https://mathworld.wolfram.com/news/2005-05-10/rsa-200/)
This number was factored on May 9, 2005, by a team led by Jens Franke from the [University of Bonn](/page/University_of_Bonn) and the Max Planck Institute for Computer Science, in collaboration with Friedrich Bahr and Martin Böhm from the German Federal Agency for Information Technology Security (BSI), Thorsten Kleinjung, and contributors Peter L. Montgomery and Herman te Riele from the Centrum Wiskunde & Informatica (CWI) in [Amsterdam](/page/Amsterdam). The factorization employed the general number field sieve (GNFS), the state-of-the-art algorithm for factoring large semiprimes at the time, involving phases of polynomial selection, sieving for relations, and linear algebra over finite fields.[](http://www.hyperelliptic.org/tanja/SHARCS/talks06/Jens_Franke.pdf)
The two prime factors are:
- $ p = 3532461934402770121272604978198464368671197400197625023649303468776121253679423200058547956528088349 $
- $ q = 7925869954478333033347085841480059687737975857364219960734330341455767872818152135381409304740185467 $
Verification confirms $ p \times q $ equals RSA-200. The effort demanded approximately 75 years of computation on a single 2.2 GHz [AMD](/page/AMD) [Opteron](/page/Opteron) CPU, with the sieving phase requiring an estimated 55 CPU-years using lattice and line sieving techniques across distributed resources, and the matrix-step linear [algebra](/page/Algebra) consuming 3 months on a dedicated cluster of 80 such processors. This marked a significant advancement in large-scale [integer factorization](/page/Integer_factorization), highlighting the scalability of GNFS through collaborative computing.[](https://mathworld.wolfram.com/news/2005-05-10/rsa-200/)[](http://www.hyperelliptic.org/tanja/SHARCS/talks06/Jens_Franke.pdf)
### RSA-210
RSA-210 is a [semiprime](/page/Semiprime) with exactly 210 [decimal](/page/Decimal) digits, constructed as the product of two large prime numbers as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) issued by RSA Laboratories to advance research in [integer factorization](/page/Integer_factorization). The full [decimal](/page/Decimal) value of RSA-210 is:
245246644900278211976517663573088018467026787678332759743414451715061600830038587216952208399332071549103626827191679864079776723243005600592035631246561218465817904100131859299619933817012149335034875870551067[](https://gitlab.inria.fr/cado-nfs/cado-nfs/-/raw/master/parameters/polynomials/rsa210.poly)
This number corresponds to 696 bits in length and was designed to test the limits of [factorization](/page/Factorization) algorithms at the time of its publication.
RSA-210 was successfully factored on September 26, 2013, by Ryan Propper, marking a significant achievement in the challenge. The [factorization](/page/Factorization) employed the general number field [sieve](/page/Sieve) (GNFS), the leading [algorithm](/page/Algorithm) for factoring large [semiprimes](/page/Semiprime), implemented using software such as msieve and ggnfs.
The effort required approximately [one year](/page/One_Year) of dedicated computation on institutional resources, highlighting the resource-intensive nature of GNFS for numbers of this size and the optimizations in polynomial selection and sieving that made it feasible.[](https://www.mersenneforum.org/showpost.php?p=354259) The prime factors, both approximately 105 digits long, were announced in Propper's report on the Mersenne forum, confirming the complete breakdown of the [semiprime](/page/Semiprime).[](https://www.mersenneforum.org/showpost.php?p=354259)
### RSA-220
RSA-220 is a 220-digit [semiprime](/page/Semiprime) number from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), designed to test the limits of [integer factorization](/page/Integer_factorization) algorithms. It consists of the product of two distinct prime numbers, each approximately 110 digits long, and was published by RSA Laboratories in [1991](/page/1991) as part of their effort to advance [computational number theory](/page/Computational_number_theory). The full [decimal representation](/page/Decimal_representation) of RSA-220 is:
[](https://mathworld.wolfram.com/news/2005-05-10/rsa-200/)
This number was factored on May 9, 2005, by a team led by Jens Franke from the [University of Bonn](/page/University_of_Bonn) and the Max Planck Institute for Computer Science, in collaboration with Friedrich Bahr and Martin Böhm from the German Federal Agency for Information Technology Security (BSI), Thorsten Kleinjung, and contributors Peter L. Montgomery and Herman te Riele from the Centrum Wiskunde & Informatica (CWI) in [Amsterdam](/page/Amsterdam). The factorization employed the general number field sieve (GNFS), the state-of-the-art algorithm for factoring large semiprimes at the time, involving phases of polynomial selection, sieving for relations, and linear algebra over finite fields.[](http://www.hyperelliptic.org/tanja/SHARCS/talks06/Jens_Franke.pdf)
The two prime factors are:
- $ p = 3532461934402770121272604978198464368671197400197625023649303468776121253679423200058547956528088349 $
- $ q = 7925869954478333033347085841480059687737975857364219960734330341455767872818152135381409304740185467 $
Verification confirms $ p \times q $ equals RSA-200. The effort demanded approximately 75 years of computation on a single 2.2 GHz [AMD](/page/AMD) [Opteron](/page/Opteron) CPU, with the sieving phase requiring an estimated 55 CPU-years using lattice and line sieving techniques across distributed resources, and the matrix-step linear [algebra](/page/Algebra) consuming 3 months on a dedicated cluster of 80 such processors. This marked a significant advancement in large-scale [integer factorization](/page/Integer_factorization), highlighting the scalability of GNFS through collaborative computing.[](https://mathworld.wolfram.com/news/2005-05-10/rsa-200/)[](http://www.hyperelliptic.org/tanja/SHARCS/talks06/Jens_Franke.pdf)
### RSA-210
RSA-210 is a [semiprime](/page/Semiprime) with exactly 210 [decimal](/page/Decimal) digits, constructed as the product of two large prime numbers as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) issued by RSA Laboratories to advance research in [integer factorization](/page/Integer_factorization). The full [decimal](/page/Decimal) value of RSA-210 is:
245246644900278211976517663573088018467026787678332759743414451715061600830038587216952208399332071549103626827191679864079776723243005600592035631246561218465817904100131859299619933817012149335034875870551067[](https://gitlab.inria.fr/cado-nfs/cado-nfs/-/raw/master/parameters/polynomials/rsa210.poly)
This number corresponds to 696 bits in length and was designed to test the limits of [factorization](/page/Factorization) algorithms at the time of its publication.
RSA-210 was successfully factored on September 26, 2013, by Ryan Propper, marking a significant achievement in the challenge. The [factorization](/page/Factorization) employed the general number field [sieve](/page/Sieve) (GNFS), the leading [algorithm](/page/Algorithm) for factoring large [semiprimes](/page/Semiprime), implemented using software such as msieve and ggnfs.
The effort required approximately [one year](/page/One_Year) of dedicated computation on institutional resources, highlighting the resource-intensive nature of GNFS for numbers of this size and the optimizations in polynomial selection and sieving that made it feasible.[](https://www.mersenneforum.org/showpost.php?p=354259) The prime factors, both approximately 105 digits long, were announced in Propper's report on the Mersenne forum, confirming the complete breakdown of the [semiprime](/page/Semiprime).[](https://www.mersenneforum.org/showpost.php?p=354259)
### RSA-220
RSA-220 is a 220-digit [semiprime](/page/Semiprime) number from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), designed to test the limits of [integer factorization](/page/Integer_factorization) algorithms. It consists of the product of two distinct prime numbers, each approximately 110 digits long, and was published by RSA Laboratories in [1991](/page/1991) as part of their effort to advance [computational number theory](/page/Computational_number_theory). The full [decimal representation](/page/Decimal_representation) of RSA-220 is:
The [factorization](/page/Factorization) of RSA-220 was announced on May 10, 2016, by a team including Shi Bai, Pierrick Gaudry, Alexander Kruppa, Emmanuel Thomé, and Paul Zimmermann, marking it as the third-largest integer factored using the general number field sieve (GNFS) at the time. They employed the CADO-NFS software suite, an open-source implementation of GNFS optimized for large-scale computations. The sieving phase alone required approximately 370 CPU-years on 2 GHz [Intel](/page/Intel) [Xeon](/page/Xeon) E5-2650 processors, highlighting the significant computational resources needed for such a task.
The prime factors are:
- $ p = 68636564122675662743823714992884378001308422399791648446212449933215410614414642667938213644208420192054999687 $
- $ q = 32929074394863498120493015492129352919164551965362339524626860511692903493094652333824866390738191765712603 $
These factors were verified to multiply to the original RSA-220 number, confirming the successful [factorization](/page/Factorization).
### RSA-230
RSA-230 is a 230-digit [semiprime](/page/Semiprime) from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), designed as the product of two distinct prime numbers each with 115 decimal digits. The number is:
The [factorization](/page/Factorization) of RSA-220 was announced on May 10, 2016, by a team including Shi Bai, Pierrick Gaudry, Alexander Kruppa, Emmanuel Thomé, and Paul Zimmermann, marking it as the third-largest integer factored using the general number field sieve (GNFS) at the time. They employed the CADO-NFS software suite, an open-source implementation of GNFS optimized for large-scale computations. The sieving phase alone required approximately 370 CPU-years on 2 GHz [Intel](/page/Intel) [Xeon](/page/Xeon) E5-2650 processors, highlighting the significant computational resources needed for such a task.
The prime factors are:
- $ p = 68636564122675662743823714992884378001308422399791648446212449933215410614414642667938213644208420192054999687 $
- $ q = 32929074394863498120493015492129352919164551965362339524626860511692903493094652333824866390738191765712603 $
These factors were verified to multiply to the original RSA-220 number, confirming the successful [factorization](/page/Factorization).
### RSA-230
RSA-230 is a 230-digit [semiprime](/page/Semiprime) from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), designed as the product of two distinct prime numbers each with 115 decimal digits. The number is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-04-en.pdf)
This challenge number was successfully factored on August 15, 2018, by Samuel S. Gross at [Noblis](/page/Noblis), Inc., employing the general number field sieve (GNFS) via the Cado-NFS software suite. The computation leveraged contributions from the Cado-NFS development team and was performed on hardware at Noblis facilities in [Reston, Virginia](/page/Reston,_Virginia).[](https://sympa.inria.fr/sympa/arc/cado-nfs/2018-08/msg00001.html)[](https://www.researchgate.net/publication/351881092_The_Factorization_of_RSA230)
The resulting prime factors are:
- Smaller factor: 3968132623150957588532439049887341769533966621957829426966084093049516953598120833228447171744337427374763106901
- Larger factor: 4528450358010492026612439739120166758911246047493700040073956759261590397250033699357694507193523000343088601688589
Verification confirms that their product equals the original RSA-230 number.[](https://sympa.inria.fr/sympa/arc/cado-nfs/2018-08/msg00001.html)
### RSA-232
RSA-232 is a 232-digit [semiprime](/page/Semiprime) number selected as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the difficulty of [integer factorization](/page/Integer_factorization), equivalent to a 768-bit RSA modulus.[](https://eprint.iacr.org/2010/006.pdf) The full decimal expansion of RSA-232 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-04-en.pdf)
This challenge number was successfully factored on August 15, 2018, by Samuel S. Gross at [Noblis](/page/Noblis), Inc., employing the general number field sieve (GNFS) via the Cado-NFS software suite. The computation leveraged contributions from the Cado-NFS development team and was performed on hardware at Noblis facilities in [Reston, Virginia](/page/Reston,_Virginia).[](https://sympa.inria.fr/sympa/arc/cado-nfs/2018-08/msg00001.html)[](https://www.researchgate.net/publication/351881092_The_Factorization_of_RSA230)
The resulting prime factors are:
- Smaller factor: 3968132623150957588532439049887341769533966621957829426966084093049516953598120833228447171744337427374763106901
- Larger factor: 4528450358010492026612439739120166758911246047493700040073956759261590397250033699357694507193523000343088601688589
Verification confirms that their product equals the original RSA-230 number.[](https://sympa.inria.fr/sympa/arc/cado-nfs/2018-08/msg00001.html)
### RSA-232
RSA-232 is a 232-digit [semiprime](/page/Semiprime) number selected as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the difficulty of [integer factorization](/page/Integer_factorization), equivalent to a 768-bit RSA modulus.[](https://eprint.iacr.org/2010/006.pdf) The full decimal expansion of RSA-232 is:
This number was generated as the product of two large prime numbers of approximately equal size, designed to resist efficient [factorization](/page/Factorization) and thereby highlight the [security](/page/Security) of RSA [encryption](/page/Encryption) based on the hardness of this problem.[](https://eprint.iacr.org/2010/006.pdf)
Although the official [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) had been discontinued in 2006, RSA-232 was successfully factored on December 12, 2009, using the general number field sieve (GNFS) algorithm by an international team including Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, and others.[](https://eprint.iacr.org/2010/006.pdf) The computation required the equivalent of approximately 2000 core-years on a single 2.2 GHz [AMD](/page/AMD) [Opteron](/page/Opteron) processor, distributed across hundreds of machines over two years, marking a significant computational achievement and establishing a record for factoring a general [integer](/page/Integer) of this size at the time.[](https://eprint.iacr.org/2010/006.pdf) The prime factors are two large primes of approximately 116 decimal digits each, as detailed in the factorization report.[](https://eprint.iacr.org/2010/006.pdf)
Due to the challenge's prior discontinuation, no monetary prize was awarded, but the team received honorary recognition for advancing [the state of the art](/page/The_State_of_the_Art) in [factorization](/page/Factorization) methods and providing insights into the practical limits of RSA key lengths.[](https://eprint.iacr.org/2010/006.pdf) This [factorization](/page/Factorization) demonstrated that 768-bit RSA moduli were vulnerable to determined academic efforts, influencing recommendations to migrate to at least 1024-bit keys for cryptographic security.[](https://eprint.iacr.org/2010/006.pdf)
### RSA-240
RSA-240 is a 240-decimal-digit [semiprime](/page/Semiprime) number from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), designed as the product of two distinct primes of roughly equal length to test the limits of [integer factorization](/page/Integer_factorization) algorithms.[](https://eprint.iacr.org/2020/697) Its full decimal value is:
This number was generated as the product of two large prime numbers of approximately equal size, designed to resist efficient [factorization](/page/Factorization) and thereby highlight the [security](/page/Security) of RSA [encryption](/page/Encryption) based on the hardness of this problem.[](https://eprint.iacr.org/2010/006.pdf)
Although the official [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) had been discontinued in 2006, RSA-232 was successfully factored on December 12, 2009, using the general number field sieve (GNFS) algorithm by an international team including Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, and others.[](https://eprint.iacr.org/2010/006.pdf) The computation required the equivalent of approximately 2000 core-years on a single 2.2 GHz [AMD](/page/AMD) [Opteron](/page/Opteron) processor, distributed across hundreds of machines over two years, marking a significant computational achievement and establishing a record for factoring a general [integer](/page/Integer) of this size at the time.[](https://eprint.iacr.org/2010/006.pdf) The prime factors are two large primes of approximately 116 decimal digits each, as detailed in the factorization report.[](https://eprint.iacr.org/2010/006.pdf)
Due to the challenge's prior discontinuation, no monetary prize was awarded, but the team received honorary recognition for advancing [the state of the art](/page/The_State_of_the_Art) in [factorization](/page/Factorization) methods and providing insights into the practical limits of RSA key lengths.[](https://eprint.iacr.org/2010/006.pdf) This [factorization](/page/Factorization) demonstrated that 768-bit RSA moduli were vulnerable to determined academic efforts, influencing recommendations to migrate to at least 1024-bit keys for cryptographic security.[](https://eprint.iacr.org/2010/006.pdf)
### RSA-240
RSA-240 is a 240-decimal-digit [semiprime](/page/Semiprime) number from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), designed as the product of two distinct primes of roughly equal length to test the limits of [integer factorization](/page/Integer_factorization) algorithms.[](https://eprint.iacr.org/2020/697) Its full decimal value is:
This number, equivalent to 795 bits in binary, served as a benchmark for the computational difficulty of factoring large semiprimes relevant to [public-key cryptography](/page/Public-key_cryptography).[](https://eprint.iacr.org/2020/697)
The factorization of RSA-240 was achieved in November 2019 by an international team consisting of Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, and Paul Zimmermann.[](https://eprint.iacr.org/2020/697) They employed the general number field sieve (GNFS), the state-of-the-art [algorithm](/page/Algorithm) for factoring large integers, marking it as a significant classical [computing](/page/Computing) record at the time.[](https://eprint.iacr.org/2020/697) The prime factors are:
- $ p = 509435952285839914555051023580843714132648382024111473186660296521821206469746700620316443478873837606252372049619334517 $
- $ q = 244624208838318150567813139024002896653802092578931401452041221336558477095178155258218897735030590669041302045908071447 $
Verification confirms that $ p \times q $ equals RSA-240.[](https://eprint.iacr.org/2020/697)
The effort required 900 core-years of computation on clusters of Intel Xeon Gold 6130 CPUs running at 2.1 GHz, with 794 core-years dedicated to collecting relations and 83 core-years to solving the linear algebra step using the block Wiedemann algorithm.[](https://eprint.iacr.org/2020/697) This workload utilized the CADO-NFS software suite and distributed sieving across multiple supercomputers, including those at INRIA and the University of Washington.[](https://eprint.iacr.org/2020/697)
### RSA-250
RSA-250 is a [semiprime](/page/Semiprime) [integer](/page/Integer) consisting of 250 [decimal](/page/Decimal) digits, constructed as the product of two large prime numbers for the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991. Its full [decimal](/page/Decimal) value is 214032465024074496126442307283933356300861471514475501779775492088141802344714013664334551909580467961099285187247091458768739626192155736304745477052085119056493106687691590019759405693457452230589325976697471681738069364894699871578494975937497937.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-07-en.pdf)
This 829-bit number was factored on February 28, 2020, by an international team including Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, and Paul Zimmermann, using the General Number Field Sieve (GNFS) algorithm implemented in the CADO-NFS software.[](https://caramba.loria.fr/rsa250.txt) The factorization yielded two prime factors, each with 125 decimal digits:
$p = 64135289477071580278790190170577389084825014742943447208116859632024532344630238623598752668347708737661925585694639798853367$
$q = 33372027594978156556226010605355114227940760344767554666784520987023841729210037080257448673296881877565718986258036932062711$.[](https://caramba.loria.fr/rsa250.txt)
The effort involved approximately 2700 core-years of computation, with 2450 core-years for sieving and 250 core-years for linear algebra, performed on clusters of Intel Xeon Gold 6130 processors at 2.1 GHz, utilizing resources from Grid'5000 and PRACE supercomputers.[](https://caramba.loria.fr/rsa250.txt) This achievement surpassed the prior record of factoring RSA-240 in 2019 and established a new benchmark for classical integer factorization of RSA challenge numbers.[](https://members.loria.fr/PZimmermann/records/factor.html)
As of November 2025, the [factorization](/page/Factorization) of RSA-250 remains the largest such record using classical algorithms.[](https://members.loria.fr/PZimmermann/records/factor.html)
## Unfactored RSA Numbers (260–500 Digits)
### RSA-260
RSA-260 is a [semiprime](/page/Semiprime) composed of two large prime factors, forming a [260](/page/2-6-0)-digit number from the original [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991. The number is given by:
This number, equivalent to 795 bits in binary, served as a benchmark for the computational difficulty of factoring large semiprimes relevant to [public-key cryptography](/page/Public-key_cryptography).[](https://eprint.iacr.org/2020/697)
The factorization of RSA-240 was achieved in November 2019 by an international team consisting of Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, and Paul Zimmermann.[](https://eprint.iacr.org/2020/697) They employed the general number field sieve (GNFS), the state-of-the-art [algorithm](/page/Algorithm) for factoring large integers, marking it as a significant classical [computing](/page/Computing) record at the time.[](https://eprint.iacr.org/2020/697) The prime factors are:
- $ p = 509435952285839914555051023580843714132648382024111473186660296521821206469746700620316443478873837606252372049619334517 $
- $ q = 244624208838318150567813139024002896653802092578931401452041221336558477095178155258218897735030590669041302045908071447 $
Verification confirms that $ p \times q $ equals RSA-240.[](https://eprint.iacr.org/2020/697)
The effort required 900 core-years of computation on clusters of Intel Xeon Gold 6130 CPUs running at 2.1 GHz, with 794 core-years dedicated to collecting relations and 83 core-years to solving the linear algebra step using the block Wiedemann algorithm.[](https://eprint.iacr.org/2020/697) This workload utilized the CADO-NFS software suite and distributed sieving across multiple supercomputers, including those at INRIA and the University of Washington.[](https://eprint.iacr.org/2020/697)
### RSA-250
RSA-250 is a [semiprime](/page/Semiprime) [integer](/page/Integer) consisting of 250 [decimal](/page/Decimal) digits, constructed as the product of two large prime numbers for the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991. Its full [decimal](/page/Decimal) value is 214032465024074496126442307283933356300861471514475501779775492088141802344714013664334551909580467961099285187247091458768739626192155736304745477052085119056493106687691590019759405693457452230589325976697471681738069364894699871578494975937497937.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-07-en.pdf)
This 829-bit number was factored on February 28, 2020, by an international team including Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, and Paul Zimmermann, using the General Number Field Sieve (GNFS) algorithm implemented in the CADO-NFS software.[](https://caramba.loria.fr/rsa250.txt) The factorization yielded two prime factors, each with 125 decimal digits:
$p = 64135289477071580278790190170577389084825014742943447208116859632024532344630238623598752668347708737661925585694639798853367$
$q = 33372027594978156556226010605355114227940760344767554666784520987023841729210037080257448673296881877565718986258036932062711$.[](https://caramba.loria.fr/rsa250.txt)
The effort involved approximately 2700 core-years of computation, with 2450 core-years for sieving and 250 core-years for linear algebra, performed on clusters of Intel Xeon Gold 6130 processors at 2.1 GHz, utilizing resources from Grid'5000 and PRACE supercomputers.[](https://caramba.loria.fr/rsa250.txt) This achievement surpassed the prior record of factoring RSA-240 in 2019 and established a new benchmark for classical integer factorization of RSA challenge numbers.[](https://members.loria.fr/PZimmermann/records/factor.html)
As of November 2025, the [factorization](/page/Factorization) of RSA-250 remains the largest such record using classical algorithms.[](https://members.loria.fr/PZimmermann/records/factor.html)
## Unfactored RSA Numbers (260–500 Digits)
### RSA-260
RSA-260 is a [semiprime](/page/Semiprime) composed of two large prime factors, forming a [260](/page/2-6-0)-digit number from the original [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991. The number is given by:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-08-en.pdf)
This challenge number, like others in the series, was designed to test the practical limits of [integer factorization](/page/Integer_factorization) algorithms and assess the security of RSA-based cryptosystems. RSA-260 equates to approximately 862 bits in [length](/page/Length), placing it beyond the current record for classical [factorization](/page/Factorization).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-08-en.pdf)
As of November 2025, RSA-260 remains unfactored, with no major public attempts reported since the successful [factorization](/page/Factorization) of the smaller RSA-250 in 2020. Following RSA-250, which required about 2,700 core-years of computation using the general number field sieve (GNFS), RSA-260 is estimated to demand over 10,000 core-years with state-of-the-art GNFS implementations due to its increased size.[](https://sympa.inria.fr/sympa/arc/cado-nfs/2020-02/msg00001.html)[](https://www.schneier.com/blog/archives/2020/04/rsa-250_factore.html)
### RSA-270
RSA-270 is a [semiprime](/page/Semiprime) integer consisting of exactly two distinct prime factors, constructed as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the limits of [integer factorization](/page/Integer_factorization) algorithms. Its value in decimal form is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-08-en.pdf)
This challenge number, like others in the series, was designed to test the practical limits of [integer factorization](/page/Integer_factorization) algorithms and assess the security of RSA-based cryptosystems. RSA-260 equates to approximately 862 bits in [length](/page/Length), placing it beyond the current record for classical [factorization](/page/Factorization).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-08-en.pdf)
As of November 2025, RSA-260 remains unfactored, with no major public attempts reported since the successful [factorization](/page/Factorization) of the smaller RSA-250 in 2020. Following RSA-250, which required about 2,700 core-years of computation using the general number field sieve (GNFS), RSA-260 is estimated to demand over 10,000 core-years with state-of-the-art GNFS implementations due to its increased size.[](https://sympa.inria.fr/sympa/arc/cado-nfs/2020-02/msg00001.html)[](https://www.schneier.com/blog/archives/2020/04/rsa-250_factore.html)
### RSA-270
RSA-270 is a [semiprime](/page/Semiprime) integer consisting of exactly two distinct prime factors, constructed as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the limits of [integer factorization](/page/Integer_factorization) algorithms. Its value in decimal form is:
This number spans 270 decimal digits and corresponds to approximately 893 bits in binary length.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-270 remains unfactored, with no publicly known decomposition into its prime components despite advances in the general number field sieve algorithm.[](https://members.loria.fr/PZimmermann/records/factor.html) Factoring it is projected to demand computational resources exceeding practical classical feasibility within current technological constraints, underscoring the escalating difficulty of semiprime factorization as key sizes increase.[](https://www.schneier.com/blog/archives/2020/04/rsa-250_factore.html)
The size of RSA-270 places it in a regime relevant to the security assessment of legacy [1024-bit](/page/1024) RSA keys, which typically involve moduli around 308 decimal digits ([1024](/page/1024) bits) and are now deprecated due to vulnerability to state-sponsored attacks. While smaller than [1024-bit](/page/1024) moduli, the unfactored status of RSA-270 illustrates persistent barriers in classical [computing](/page/Computing) for numbers approaching this scale, influencing transitions to [post-quantum cryptography](/page/Post-quantum_cryptography).
### RSA-280
RSA-280 is a [semiprime](/page/Semiprime) number consisting of 280 decimal digits, specifically the product of two large prime numbers, created by RSA Laboratories as part of their discontinued [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the limits of [integer factorization](/page/Integer_factorization) algorithms.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) This number serves as a mid-range challenge in the series of unfactored RSA numbers, highlighting the computational difficulty of factoring [semiprimes](/page/Semiprime) at this scale, which corresponds to approximately 928 bits and underscores ongoing [security](/page/Security) considerations for RSA-based cryptosystems using keys around 1000 bits.
The full decimal representation of RSA-280 is:
This number spans 270 decimal digits and corresponds to approximately 893 bits in binary length.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-270 remains unfactored, with no publicly known decomposition into its prime components despite advances in the general number field sieve algorithm.[](https://members.loria.fr/PZimmermann/records/factor.html) Factoring it is projected to demand computational resources exceeding practical classical feasibility within current technological constraints, underscoring the escalating difficulty of semiprime factorization as key sizes increase.[](https://www.schneier.com/blog/archives/2020/04/rsa-250_factore.html)
The size of RSA-270 places it in a regime relevant to the security assessment of legacy [1024-bit](/page/1024) RSA keys, which typically involve moduli around 308 decimal digits ([1024](/page/1024) bits) and are now deprecated due to vulnerability to state-sponsored attacks. While smaller than [1024-bit](/page/1024) moduli, the unfactored status of RSA-270 illustrates persistent barriers in classical [computing](/page/Computing) for numbers approaching this scale, influencing transitions to [post-quantum cryptography](/page/Post-quantum_cryptography).
### RSA-280
RSA-280 is a [semiprime](/page/Semiprime) number consisting of 280 decimal digits, specifically the product of two large prime numbers, created by RSA Laboratories as part of their discontinued [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the limits of [integer factorization](/page/Integer_factorization) algorithms.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) This number serves as a mid-range challenge in the series of unfactored RSA numbers, highlighting the computational difficulty of factoring [semiprimes](/page/Semiprime) at this scale, which corresponds to approximately 928 bits and underscores ongoing [security](/page/Security) considerations for RSA-based cryptosystems using keys around 1000 bits.
The full decimal representation of RSA-280 is:
[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of 2025, RSA-280 remains unfactored, with no verified progress toward its complete factorization reported in the literature or computational records. Its persistence as an open challenge illustrates the practical infeasibility of factoring such numbers using classical computing resources available today, though advances in algorithms like the general number field sieve continue to push boundaries for similar sizes.[](https://mysterytwister.org/challenges/level-3/rsa-factoring-challenge-rsa-280)
### RSA-290
RSA-290 is a [semiprime](/page/Semiprime) number consisting of the product of two large prime factors, specifically designed as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the limits of [integer factorization](/page/Integer_factorization) algorithms. Its complete decimal expansion, which spans exactly 290 digits, is as follows:
[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of 2025, RSA-280 remains unfactored, with no verified progress toward its complete factorization reported in the literature or computational records. Its persistence as an open challenge illustrates the practical infeasibility of factoring such numbers using classical computing resources available today, though advances in algorithms like the general number field sieve continue to push boundaries for similar sizes.[](https://mysterytwister.org/challenges/level-3/rsa-factoring-challenge-rsa-280)
### RSA-290
RSA-290 is a [semiprime](/page/Semiprime) number consisting of the product of two large prime factors, specifically designed as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the limits of [integer factorization](/page/Integer_factorization) algorithms. Its complete decimal expansion, which spans exactly 290 digits, is as follows:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-12-en.pdf)
This number equates to approximately 960 bits in binary length, providing a significant scale for assessing [factorization](/page/Factorization) difficulty.[](https://gist.github.com/aburan28/d7a63343e76107e36bc66239b2e5169d)
As of November 2025, RSA-290 remains unfactored, with no public record of its prime factors being discovered.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-12-en.pdf)[](https://gist.github.com/aburan28/d7a63343e76107e36bc66239b2e5169d)
Factoring RSA-290 using the General Number Field Sieve (GNFS), the most advanced classical [algorithm](/page/Algorithm) for such tasks, would require computational resources that grow exponentially with the digit length, far exceeding current global capabilities and estimated to demand thousands of core-years on high-performance hardware even with optimized implementations.[](https://personal.math.vt.edu/brown/doc/briggs_gnfs_thesis.pdf)
This enduring challenge underscores the foundational security assumptions of RSA [cryptography](/page/Cryptography) against classical attacks.
### RSA-300
RSA-300 is a 300-digit [semiprime](/page/Semiprime) number generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), consisting of the product of two large prime numbers of approximately equal length.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-13-en.pdf)
The full decimal representation of RSA-300 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-12-en.pdf)
This number equates to approximately 960 bits in binary length, providing a significant scale for assessing [factorization](/page/Factorization) difficulty.[](https://gist.github.com/aburan28/d7a63343e76107e36bc66239b2e5169d)
As of November 2025, RSA-290 remains unfactored, with no public record of its prime factors being discovered.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-12-en.pdf)[](https://gist.github.com/aburan28/d7a63343e76107e36bc66239b2e5169d)
Factoring RSA-290 using the General Number Field Sieve (GNFS), the most advanced classical [algorithm](/page/Algorithm) for such tasks, would require computational resources that grow exponentially with the digit length, far exceeding current global capabilities and estimated to demand thousands of core-years on high-performance hardware even with optimized implementations.[](https://personal.math.vt.edu/brown/doc/briggs_gnfs_thesis.pdf)
This enduring challenge underscores the foundational security assumptions of RSA [cryptography](/page/Cryptography) against classical attacks.
### RSA-300
RSA-300 is a 300-digit [semiprime](/page/Semiprime) number generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), consisting of the product of two large prime numbers of approximately equal length.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-13-en.pdf)
The full decimal representation of RSA-300 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-13-en.pdf)
This number equates to approximately 995 bits in binary length, symbolizing the [security](/page/Security) level of 1000-bit RSA keys in cryptographic contexts.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-13-en.pdf) As of November 2025, RSA-300 remains unfactored, with no public announcement of its prime factors despite advances in [factorization](/page/Factorization) algorithms.[](https://aiimpacts.org/progress-in-general-purpose-factoring/)
RSA-300 was included in the original set of challenges published by RSA Laboratories in [1991](/page/1991), with subsequent expansions of the challenge in [1997](/page/1997) and hosting by MysteryTwister in [2012](/page/2012) permitting continued pursuit of its [factorization](/page/Factorization).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-13-en.pdf)[](https://www.ontko.com/pub/rayo/primes/rsa_fact.html) Its unfactored status underscores the ongoing difficulty of factoring large semiprimes, serving as a benchmark for [computational number theory](/page/Computational_number_theory) research.[](https://aiimpacts.org/progress-in-general-purpose-factoring/)
### RSA-309
RSA-309 is a 309-digit [semiprime](/page/Semiprime) number created as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) by RSA Laboratories to test the limits of [integer factorization](/page/Integer_factorization) algorithms. It is the product of two large primes of roughly equal [bit length](/page/Bit-length), totaling approximately [1024](/page/1024) bits, and serves as a benchmark for [computational number theory](/page/Computational_number_theory) research. Unlike many challenge numbers with round digit counts, RSA-309's irregular 309-digit size highlights variations in the challenge set, making it unique among the listed RSA numbers.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-14-en.pdf)
This number remains unfactored, with no known complete [factorization](/page/Factorization) despite advances in methods like the general number field sieve. Its unfactored status underscores the practical difficulty of factoring large semiprimes, which underpins the security of RSA cryptosystems. The challenge for RSA-309 was hosted by MysteryTwister C3 after RSA withdrew the official prizes in 2007, but the number continues to stand as an [open problem](/page/Open_problem).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-14-en.pdf)
The full decimal representation of RSA-309 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-13-en.pdf)
This number equates to approximately 995 bits in binary length, symbolizing the [security](/page/Security) level of 1000-bit RSA keys in cryptographic contexts.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-13-en.pdf) As of November 2025, RSA-300 remains unfactored, with no public announcement of its prime factors despite advances in [factorization](/page/Factorization) algorithms.[](https://aiimpacts.org/progress-in-general-purpose-factoring/)
RSA-300 was included in the original set of challenges published by RSA Laboratories in [1991](/page/1991), with subsequent expansions of the challenge in [1997](/page/1997) and hosting by MysteryTwister in [2012](/page/2012) permitting continued pursuit of its [factorization](/page/Factorization).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-13-en.pdf)[](https://www.ontko.com/pub/rayo/primes/rsa_fact.html) Its unfactored status underscores the ongoing difficulty of factoring large semiprimes, serving as a benchmark for [computational number theory](/page/Computational_number_theory) research.[](https://aiimpacts.org/progress-in-general-purpose-factoring/)
### RSA-309
RSA-309 is a 309-digit [semiprime](/page/Semiprime) number created as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) by RSA Laboratories to test the limits of [integer factorization](/page/Integer_factorization) algorithms. It is the product of two large primes of roughly equal [bit length](/page/Bit-length), totaling approximately [1024](/page/1024) bits, and serves as a benchmark for [computational number theory](/page/Computational_number_theory) research. Unlike many challenge numbers with round digit counts, RSA-309's irregular 309-digit size highlights variations in the challenge set, making it unique among the listed RSA numbers.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-14-en.pdf)
This number remains unfactored, with no known complete [factorization](/page/Factorization) despite advances in methods like the general number field sieve. Its unfactored status underscores the practical difficulty of factoring large semiprimes, which underpins the security of RSA cryptosystems. The challenge for RSA-309 was hosted by MysteryTwister C3 after RSA withdrew the official prizes in 2007, but the number continues to stand as an [open problem](/page/Open_problem).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-14-en.pdf)
The full decimal representation of RSA-309 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-14-en.pdf)
### RSA-310
RSA-310 is a 310-digit [semiprime](/page/Semiprime) number generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) by RSA Laboratories to test the difficulty of [integer factorization](/page/Integer_factorization). It follows sequentially after RSA-309 in the series of unfactored RSA numbers within the 300-digit range.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
The full decimal value of RSA-310 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-14-en.pdf)
### RSA-310
RSA-310 is a 310-digit [semiprime](/page/Semiprime) number generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) by RSA Laboratories to test the difficulty of [integer factorization](/page/Integer_factorization). It follows sequentially after RSA-309 in the series of unfactored RSA numbers within the 300-digit range.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
The full decimal value of RSA-310 is:
This number was added to the challenge on February 7, 1997.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-310 remains unfactored, with no known prime factors despite ongoing cryptographic research efforts.[](https://mysterytwister.org/challenges/level-3/rsa-factoring-challenge-rsa-310)
### RSA-320
RSA-320 is a 320-digit [semiprime](/page/Semiprime) number, constructed as the product of two distinct prime factors each of roughly equal length, as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) launched by RSA Laboratories in 1991 to advance research in [integer factorization](/page/Integer_factorization). The complete decimal expansion of RSA-320 is:
This number was added to the challenge on February 7, 1997.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-310 remains unfactored, with no known prime factors despite ongoing cryptographic research efforts.[](https://mysterytwister.org/challenges/level-3/rsa-factoring-challenge-rsa-310)
### RSA-320
RSA-320 is a 320-digit [semiprime](/page/Semiprime) number, constructed as the product of two distinct prime factors each of roughly equal length, as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) launched by RSA Laboratories in 1991 to advance research in [integer factorization](/page/Integer_factorization). The complete decimal expansion of RSA-320 is:
[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
This number remains unfactored as of November 2025, with the largest factored [RSA challenge](/page/RSA_Factoring_Challenge) number being [RSA-250](/page/RSA_Factoring_Challenge) in 2020.[](https://members.loria.fr/PZimmermann/records/factor.html)
[RSA-320](/page/RSA_Factoring_Challenge) is equivalent to approximately 1060 bits in [length](/page/Length).[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
### [RSA-330](/page/RSA_Factoring_Challenge)
[RSA-330](/page/RSA_Factoring_Challenge) is a [semiprime](/page/Semiprime) consisting of the product of two large prime numbers, specifically designed as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the difficulty of [integer factorization](/page/Integer_factorization). It has exactly 330 [decimal](/page/Decimal) digits and corresponds to approximately 1,094 bits in [length](/page/Length).[](https://dev.mysterytwister.org/media/challenges/pdf/mtc3-rsa-18-en.pdf)
As of November 2025, RSA-330 remains unfactored, with no publicly announced complete prime factorization despite ongoing efforts in [computational number theory](/page/Computational_number_theory).
The full decimal value of RSA-330 is:
[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
This number remains unfactored as of November 2025, with the largest factored [RSA challenge](/page/RSA_Factoring_Challenge) number being [RSA-250](/page/RSA_Factoring_Challenge) in 2020.[](https://members.loria.fr/PZimmermann/records/factor.html)
[RSA-320](/page/RSA_Factoring_Challenge) is equivalent to approximately 1060 bits in [length](/page/Length).[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
### [RSA-330](/page/RSA_Factoring_Challenge)
[RSA-330](/page/RSA_Factoring_Challenge) is a [semiprime](/page/Semiprime) consisting of the product of two large prime numbers, specifically designed as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the difficulty of [integer factorization](/page/Integer_factorization). It has exactly 330 [decimal](/page/Decimal) digits and corresponds to approximately 1,094 bits in [length](/page/Length).[](https://dev.mysterytwister.org/media/challenges/pdf/mtc3-rsa-18-en.pdf)
As of November 2025, RSA-330 remains unfactored, with no publicly announced complete prime factorization despite ongoing efforts in [computational number theory](/page/Computational_number_theory).
The full decimal value of RSA-330 is:
[](https://dev.mysterytwister.org/media/challenges/pdf/mtc3-rsa-18-en.pdf)
### RSA-340
RSA-340 is a 340-decimal-digit [semiprime](/page/Semiprime) number created by RSA Laboratories as part of their [1991](/page/1991) Factoring Challenge to promote advances in [computational number theory](/page/Computational_number_theory) and [integer factorization](/page/Integer_factorization) algorithms.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-19-en.pdf) The challenge involved generating large composite numbers, each the product of two primes of roughly equal size, with RSA-340 specifically designed to test the limits of factoring techniques at the time, equivalent to approximately 1,128 bits in binary representation.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-19-en.pdf)
The exact value of RSA-340 is:
[](https://dev.mysterytwister.org/media/challenges/pdf/mtc3-rsa-18-en.pdf)
### RSA-340
RSA-340 is a 340-decimal-digit [semiprime](/page/Semiprime) number created by RSA Laboratories as part of their [1991](/page/1991) Factoring Challenge to promote advances in [computational number theory](/page/Computational_number_theory) and [integer factorization](/page/Integer_factorization) algorithms.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-19-en.pdf) The challenge involved generating large composite numbers, each the product of two primes of roughly equal size, with RSA-340 specifically designed to test the limits of factoring techniques at the time, equivalent to approximately 1,128 bits in binary representation.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-19-en.pdf)
The exact value of RSA-340 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-19-en.pdf)
As of the latest verified records, RSA-340 remains unfactored, making it one of the larger unsolved challenges from the original set of 54 numbers (ranging from 100 to 617 digits).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-19-en.pdf) Its persistence as an open problem underscores the ongoing difficulty of factoring large semiprimes, with implications for the security of RSA-based cryptosystems relying on such hardness assumptions. No successful factorization has been publicly reported, despite the challenge's prizes being discontinued in 2006 and the remaining unsolved instances hosted by authorized parties like MysteryTwister.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-19-en.pdf)
### RSA-350
RSA-350 is a [semiprime](/page/Semiprime) with exactly 350 [decimal](/page/Decimal) digits, generated by RSA Laboratories as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to advance research in [computational number theory](/page/Computational_number_theory) and [integer factorization](/page/Integer_factorization).
The complete decimal representation of RSA-350 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-19-en.pdf)
As of the latest verified records, RSA-340 remains unfactored, making it one of the larger unsolved challenges from the original set of 54 numbers (ranging from 100 to 617 digits).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-19-en.pdf) Its persistence as an open problem underscores the ongoing difficulty of factoring large semiprimes, with implications for the security of RSA-based cryptosystems relying on such hardness assumptions. No successful factorization has been publicly reported, despite the challenge's prizes being discontinued in 2006 and the remaining unsolved instances hosted by authorized parties like MysteryTwister.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-19-en.pdf)
### RSA-350
RSA-350 is a [semiprime](/page/Semiprime) with exactly 350 [decimal](/page/Decimal) digits, generated by RSA Laboratories as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to advance research in [computational number theory](/page/Computational_number_theory) and [integer factorization](/page/Integer_factorization).
The complete decimal representation of RSA-350 is:
[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
This number remains unfactored as of November 2025, exceeding the current record for factored [RSA challenge numbers](/page/RSA_Factoring_Challenge), which stands at RSA-250 (250 digits) achieved in 2020 using the general number field sieve algorithm.[](https://eprint.iacr.org/2020/697)
### RSA-360
RSA-360 is one of the [semiprime](/page/Semiprime) challenge numbers introduced as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) by RSA Laboratories to advance research in [integer factorization](/page/Integer_factorization). It consists of exactly 360 [decimal](/page/Decimal) digits and is the product of two distinct prime factors of comparable size, making it a significant benchmark for [computational number theory](/page/Computational_number_theory).[](https://dev.mysterytwister.org/media/challenges/pdf/mtc3-rsa-21-en.pdf)
The full decimal expansion of RSA-360 is:
[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
This number remains unfactored as of November 2025, exceeding the current record for factored [RSA challenge numbers](/page/RSA_Factoring_Challenge), which stands at RSA-250 (250 digits) achieved in 2020 using the general number field sieve algorithm.[](https://eprint.iacr.org/2020/697)
### RSA-360
RSA-360 is one of the [semiprime](/page/Semiprime) challenge numbers introduced as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) by RSA Laboratories to advance research in [integer factorization](/page/Integer_factorization). It consists of exactly 360 [decimal](/page/Decimal) digits and is the product of two distinct prime factors of comparable size, making it a significant benchmark for [computational number theory](/page/Computational_number_theory).[](https://dev.mysterytwister.org/media/challenges/pdf/mtc3-rsa-21-en.pdf)
The full decimal expansion of RSA-360 is:
This number, equivalent to approximately 1,194 bits in binary, has not been factored to date, with the largest successfully factored RSA challenge number being RSA-250 (250 digits) as of November 2025.[](https://dev.mysterytwister.org/media/challenges/pdf/mtc3-rsa-21-en.pdf)
### RSA-370
RSA-370 is a [semiprime](/page/Semiprime) [integer](/page/Integer) from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), consisting of exactly 370 decimal digits and formed as the product of two large, distinct prime factors, each roughly half the bit length of the composite. It was generated in [1997](/page/1997) as part of a series of challenge numbers to test the limits of [integer factorization](/page/Integer_factorization) algorithms, with the primes selected to be congruent to 2 [modulo](/page/Modulo) 3 for added difficulty in certain methods. The number's [checksum](/page/Checksum) is 660901, verifying its integrity.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
The complete decimal representation of RSA-370 is:
This number, equivalent to approximately 1,194 bits in binary, has not been factored to date, with the largest successfully factored RSA challenge number being RSA-250 (250 digits) as of November 2025.[](https://dev.mysterytwister.org/media/challenges/pdf/mtc3-rsa-21-en.pdf)
### RSA-370
RSA-370 is a [semiprime](/page/Semiprime) [integer](/page/Integer) from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), consisting of exactly 370 decimal digits and formed as the product of two large, distinct prime factors, each roughly half the bit length of the composite. It was generated in [1997](/page/1997) as part of a series of challenge numbers to test the limits of [integer factorization](/page/Integer_factorization) algorithms, with the primes selected to be congruent to 2 [modulo](/page/Modulo) 3 for added difficulty in certain methods. The number's [checksum](/page/Checksum) is 660901, verifying its integrity.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
The complete decimal representation of RSA-370 is:
This value corresponds to approximately 1,227 bits, making it significantly larger than previously factored challenge numbers like RSA-250 (250 digits, factored in [2020](/page/2020)).[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
RSA-370 remains unfactored as of 2025, consistent with the status of all RSA challenge numbers beyond 250 digits, where the largest solved is [RSA-250](/page/250) (250 digits). Its resistance to factorization underscores ongoing challenges in [computational number theory](/page/Computational_number_theory) and the security of RSA-based [cryptography](/page/Cryptography) for key sizes up to around 1,000 bits.
### RSA-380
RSA-380 is a semiprime consisting of the product of two distinct prime numbers, each of roughly equal size, and was generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991 to advance research in [computational number theory](/page/Computational_number_theory) and highlight the practical challenges of [integer factorization](/page/Integer_factorization) in [public-key cryptography](/page/Public-key_cryptography). The number has precisely 380 decimal digits and an approximate [bit length](/page/Bit-length) of 1,261, making it significantly larger than previously factored challenge numbers. Its full decimal value is:
This value corresponds to approximately 1,227 bits, making it significantly larger than previously factored challenge numbers like RSA-250 (250 digits, factored in [2020](/page/2020)).[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
RSA-370 remains unfactored as of 2025, consistent with the status of all RSA challenge numbers beyond 250 digits, where the largest solved is [RSA-250](/page/250) (250 digits). Its resistance to factorization underscores ongoing challenges in [computational number theory](/page/Computational_number_theory) and the security of RSA-based [cryptography](/page/Cryptography) for key sizes up to around 1,000 bits.
### RSA-380
RSA-380 is a semiprime consisting of the product of two distinct prime numbers, each of roughly equal size, and was generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991 to advance research in [computational number theory](/page/Computational_number_theory) and highlight the practical challenges of [integer factorization](/page/Integer_factorization) in [public-key cryptography](/page/Public-key_cryptography). The number has precisely 380 decimal digits and an approximate [bit length](/page/Bit-length) of 1,261, making it significantly larger than previously factored challenge numbers. Its full decimal value is:
This value was computed using specialized hardware from [RSA Data Security](/page/Data_security) and published in the official challenge list.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-380 remains unfactored, with no verified discovery of its prime factors despite advances in algorithms like the general number field sieve. The largest RSA challenge number factored to date is RSA-250, achieved in [2020](/page/2020) by an international team using extensive computational resources over several years, underscoring that numbers beyond 250 digits, such as RSA-380, continue to resist classical factoring methods.[](https://jacobsschool.ucsd.edu/news/release/2991) Its persistence as an [open problem](/page/Open_problem) emphasizes the security margins provided by larger key sizes in RSA cryptosystems, where factoring difficulty scales exponentially with digit length.
### RSA-390
RSA-390 is a 390-digit [semiprime](/page/Semiprime) number generated as the product of two distinct primes of roughly equal size, each contributing approximately 195 [decimal](/page/Decimal) digits to the total length. It was introduced by RSA Laboratories in 1991 as one of the challenge numbers in the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), intended to highlight the computational difficulty of [integer factorization](/page/Integer_factorization) for cryptographic purposes.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-24-en.pdf)
The exact value of RSA-390 is:
This value was computed using specialized hardware from [RSA Data Security](/page/Data_security) and published in the official challenge list.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-380 remains unfactored, with no verified discovery of its prime factors despite advances in algorithms like the general number field sieve. The largest RSA challenge number factored to date is RSA-250, achieved in [2020](/page/2020) by an international team using extensive computational resources over several years, underscoring that numbers beyond 250 digits, such as RSA-380, continue to resist classical factoring methods.[](https://jacobsschool.ucsd.edu/news/release/2991) Its persistence as an [open problem](/page/Open_problem) emphasizes the security margins provided by larger key sizes in RSA cryptosystems, where factoring difficulty scales exponentially with digit length.
### RSA-390
RSA-390 is a 390-digit [semiprime](/page/Semiprime) number generated as the product of two distinct primes of roughly equal size, each contributing approximately 195 [decimal](/page/Decimal) digits to the total length. It was introduced by RSA Laboratories in 1991 as one of the challenge numbers in the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), intended to highlight the computational difficulty of [integer factorization](/page/Integer_factorization) for cryptographic purposes.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-24-en.pdf)
The exact value of RSA-390 is:
This number corresponds to approximately 1294 bits in binary representation.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-24-en.pdf)
RSA-390 remains unfactored, with no known complete [factorization](/page/Factorization) reported as of November 2025; it is one of the 38 unsolved challenges from the original set hosted by the MysteryTwister C3 since [2012](/page/2012) with permission from RSA.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-24-en.pdf)
### RSA-400
RSA-400 is a 400-digit [semiprime](/page/Semiprime) number constructed as the product of two large prime numbers of approximately equal length, specifically designed as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the boundaries of [integer factorization](/page/Integer_factorization) algorithms.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) The full decimal representation of RSA-400 is:
This number corresponds to approximately 1294 bits in binary representation.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-24-en.pdf)
RSA-390 remains unfactored, with no known complete [factorization](/page/Factorization) reported as of November 2025; it is one of the 38 unsolved challenges from the original set hosted by the MysteryTwister C3 since [2012](/page/2012) with permission from RSA.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-24-en.pdf)
### RSA-400
RSA-400 is a 400-digit [semiprime](/page/Semiprime) number constructed as the product of two large prime numbers of approximately equal length, specifically designed as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the boundaries of [integer factorization](/page/Integer_factorization) algorithms.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) The full decimal representation of RSA-400 is:
This number equates to roughly 1,327 bits in binary, establishing it as a substantial computational challenge beyond the capabilities of classical factoring methods available at the time of its publication in 1994.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
RSA-400 remains unfactored as of 2025, with the largest successfully factored number in the RSA challenge series being RSA-250, achieved in [2020](/page/2020) using extensive [distributed computing](/page/Distributed_computing) resources equivalent to 2,700 core-years.[](https://jacobsschool.ucsd.edu/news/release/2991) Its unfactored status underscores the 400-digit threshold as a critical [milestone](/page/Milestone) in assessing the [security](/page/Security) of RSA-based cryptosystems, where [factorization](/page/Factorization) difficulty scales exponentially with digit length, deterring practical attacks on keys of this size or larger.
### RSA-410
RSA-410 is a [semiprime](/page/Semiprime) number consisting of exactly 410 [decimal](/page/Decimal) digits, generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the limits of [integer factorization](/page/Integer_factorization) algorithms in the context of [public-key cryptography](/page/Public-key_cryptography). The number is defined as the product of two large prime factors and was intended to demonstrate the computational infeasibility of factoring such large composites with classical methods at the time of its release. Its full [decimal](/page/Decimal) expansion is:
This number equates to roughly 1,327 bits in binary, establishing it as a substantial computational challenge beyond the capabilities of classical factoring methods available at the time of its publication in 1994.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
RSA-400 remains unfactored as of 2025, with the largest successfully factored number in the RSA challenge series being RSA-250, achieved in [2020](/page/2020) using extensive [distributed computing](/page/Distributed_computing) resources equivalent to 2,700 core-years.[](https://jacobsschool.ucsd.edu/news/release/2991) Its unfactored status underscores the 400-digit threshold as a critical [milestone](/page/Milestone) in assessing the [security](/page/Security) of RSA-based cryptosystems, where [factorization](/page/Factorization) difficulty scales exponentially with digit length, deterring practical attacks on keys of this size or larger.
### RSA-410
RSA-410 is a [semiprime](/page/Semiprime) number consisting of exactly 410 [decimal](/page/Decimal) digits, generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the limits of [integer factorization](/page/Integer_factorization) algorithms in the context of [public-key cryptography](/page/Public-key_cryptography). The number is defined as the product of two large prime factors and was intended to demonstrate the computational infeasibility of factoring such large composites with classical methods at the time of its release. Its full [decimal](/page/Decimal) expansion is:
This number corresponds to approximately 1360 bits in binary representation.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-410 remains unfactored, with no public announcement of its prime factors despite advances in [factorization](/page/Factorization) techniques since the challenge's inception in the [1990s](/page/1990s). The [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), which included RSA-410, was officially discontinued by RSA Laboratories in 2007, but the unsolved numbers like this one continue to serve as benchmarks for cryptographic security research.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
### RSA-420
RSA-420 is a [semiprime](/page/Semiprime) number with exactly 420 decimal digits, generated as the product of two distinct large prime factors by RSA Laboratories for their factoring challenge initiated in 1991.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-27-en.pdf) This challenge aimed to advance research in [computational number theory](/page/Computational_number_theory) by demonstrating the difficulty of factoring large integers, with RSA-420 serving as one of the more formidable entries due to its size, equivalent to approximately 1,393 bits.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
The complete decimal expansion of RSA-420 is:
This number corresponds to approximately 1360 bits in binary representation.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-410 remains unfactored, with no public announcement of its prime factors despite advances in [factorization](/page/Factorization) techniques since the challenge's inception in the [1990s](/page/1990s). The [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), which included RSA-410, was officially discontinued by RSA Laboratories in 2007, but the unsolved numbers like this one continue to serve as benchmarks for cryptographic security research.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
### RSA-420
RSA-420 is a [semiprime](/page/Semiprime) number with exactly 420 decimal digits, generated as the product of two distinct large prime factors by RSA Laboratories for their factoring challenge initiated in 1991.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-27-en.pdf) This challenge aimed to advance research in [computational number theory](/page/Computational_number_theory) by demonstrating the difficulty of factoring large integers, with RSA-420 serving as one of the more formidable entries due to its size, equivalent to approximately 1,393 bits.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
The complete decimal expansion of RSA-420 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-27-en.pdf)[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
RSA-420 remains unfactored as of 2025, with no publicly announced prime factors despite ongoing interest in integer factorization algorithms.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) Its persistence as an open challenge underscores the practical security of sufficiently large RSA moduli against classical computing methods.
### RSA-430
RSA-430 is a semiprime number with exactly 430 decimal digits, created by RSA Laboratories as part of the RSA Factoring Challenge to test the limits of integer factorization algorithms. It is the product of two large, distinct prime factors of roughly equal size, each contributing approximately 215 decimal digits, and was generated in the early 1990s using proprietary software from RSA Data Security, Inc. The factors were discarded after computation, leaving only the composite number publicly available for the challenge.[](https://gist.github.com/aburan28/d7a63343e76107e36bc66239b2e5169d)
The full decimal representation of RSA-430 is as follows:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-27-en.pdf)[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
RSA-420 remains unfactored as of 2025, with no publicly announced prime factors despite ongoing interest in integer factorization algorithms.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) Its persistence as an open challenge underscores the practical security of sufficiently large RSA moduli against classical computing methods.
### RSA-430
RSA-430 is a semiprime number with exactly 430 decimal digits, created by RSA Laboratories as part of the RSA Factoring Challenge to test the limits of integer factorization algorithms. It is the product of two large, distinct prime factors of roughly equal size, each contributing approximately 215 decimal digits, and was generated in the early 1990s using proprietary software from RSA Data Security, Inc. The factors were discarded after computation, leaving only the composite number publicly available for the challenge.[](https://gist.github.com/aburan28/d7a63343e76107e36bc66239b2e5169d)
The full decimal representation of RSA-430 is as follows:
This value corresponds to a bit length of approximately 1,427 bits.[](https://gist.github.com/aburan28/d7a63343e76107e36bc66239b2e5169d)
RSA-430 remains unfactored as of November 2025, with no public record of its prime factors being discovered despite ongoing research in [number theory](/page/Number_theory) and computational methods. For context, the largest successfully factored RSA challenge number is RSA-250 (829 bits), achieved in 2020 using extensive [distributed computing](/page/Distributed_computing) resources.[](https://articles.59.ca/doku.php?id=em:20482030) The immense size of RSA-430 places it far beyond current classical factoring capabilities, highlighting the continued security implications for RSA-based [cryptography](/page/Cryptography) with keys of similar or larger lengths.[](https://postquantum.com/post-quantum/breaking-rsa-quantum-hype/)
### RSA-440
RSA-440 is a 440-[decimal](/page/Decimal)-digit [semiprime](/page/Semiprime) number generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991 to promote research in [computational number theory](/page/Computational_number_theory) and the difficulty of factoring large integers.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) It consists of the product of two distinct prime numbers, each approximately 220 [decimal](/page/Decimal) digits in length, and serves as a benchmark for advanced factoring algorithms.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
The explicit decimal representation of RSA-440 is:
This value corresponds to a bit length of approximately 1,427 bits.[](https://gist.github.com/aburan28/d7a63343e76107e36bc66239b2e5169d)
RSA-430 remains unfactored as of November 2025, with no public record of its prime factors being discovered despite ongoing research in [number theory](/page/Number_theory) and computational methods. For context, the largest successfully factored RSA challenge number is RSA-250 (829 bits), achieved in 2020 using extensive [distributed computing](/page/Distributed_computing) resources.[](https://articles.59.ca/doku.php?id=em:20482030) The immense size of RSA-430 places it far beyond current classical factoring capabilities, highlighting the continued security implications for RSA-based [cryptography](/page/Cryptography) with keys of similar or larger lengths.[](https://postquantum.com/post-quantum/breaking-rsa-quantum-hype/)
### RSA-440
RSA-440 is a 440-[decimal](/page/Decimal)-digit [semiprime](/page/Semiprime) number generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991 to promote research in [computational number theory](/page/Computational_number_theory) and the difficulty of factoring large integers.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) It consists of the product of two distinct prime numbers, each approximately 220 [decimal](/page/Decimal) digits in length, and serves as a benchmark for advanced factoring algorithms.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
The explicit decimal representation of RSA-440 is:
This value corresponds to a 1,460-bit [integer](/page/Integer) in binary, highlighting its immense scale for classical [computing](/page/Computing) resources.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-440 remains unfactored, with no publicly known prime factors despite ongoing interest in its decomposition using methods like the general number field [sieve](/page/Sieve).[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) Its persistence as an unsolved challenge underscores the practical [security](/page/Security) implications for RSA cryptosystems employing keys of comparable or larger sizes.[](https://mysterytwister.org/challenges/level-3/rsa-factoring-challenge-rsa-440)
### RSA-450
RSA-450 is a [semiprime](/page/Semiprime) number consisting of exactly 450 decimal digits, designed by RSA Laboratories as part of their factoring challenge to demonstrate the computational difficulty of factoring large integers relevant to [public-key cryptography](/page/Public-key_cryptography). The number, which is the product of two distinct prime factors of roughly equal size (approximately 225 digits each), was publicly released in the early [1990s](/page/1990s) to spur advancements in [factorization](/page/Factorization) techniques such as the general number field sieve.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-30-en.pdf)
The full decimal representation of RSA-450 is:
This value corresponds to a 1,460-bit [integer](/page/Integer) in binary, highlighting its immense scale for classical [computing](/page/Computing) resources.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-440 remains unfactored, with no publicly known prime factors despite ongoing interest in its decomposition using methods like the general number field [sieve](/page/Sieve).[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) Its persistence as an unsolved challenge underscores the practical [security](/page/Security) implications for RSA cryptosystems employing keys of comparable or larger sizes.[](https://mysterytwister.org/challenges/level-3/rsa-factoring-challenge-rsa-440)
### RSA-450
RSA-450 is a [semiprime](/page/Semiprime) number consisting of exactly 450 decimal digits, designed by RSA Laboratories as part of their factoring challenge to demonstrate the computational difficulty of factoring large integers relevant to [public-key cryptography](/page/Public-key_cryptography). The number, which is the product of two distinct prime factors of roughly equal size (approximately 225 digits each), was publicly released in the early [1990s](/page/1990s) to spur advancements in [factorization](/page/Factorization) techniques such as the general number field sieve.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-30-en.pdf)
The full decimal representation of RSA-450 is:
This number corresponds to approximately 1,493 bits in binary, making it significantly more challenging to factor than smaller RSA challenge numbers like RSA-440 due to the exponential increase in computational resources required.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-30-en.pdf)
As of November 2025, RSA-450 remains unfactored, with no known prime factors published, underscoring the ongoing [security](/page/Security) implications for RSA-based [encryption](/page/Encryption) systems using moduli of comparable size.[](https://mysterytwister.org/challenges/level-3/rsa-factoring-challenge-rsa-450)
### RSA-460
RSA-460 is a [semiprime](/page/Semiprime) number consisting of exactly 460 decimal digits, constructed as the product of two large prime numbers of comparable size, as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991 to advance research in [integer factorization](/page/Integer_factorization).[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) The challenge aimed to test the limits of [computational number theory](/page/Computational_number_theory) by offering prizes for factoring such numbers, with RSA-460 representing a significant escalation in difficulty due to its length, equivalent to approximately 1,526 bits.[](https://mason.gmu.edu/~kgaj/ECE297/viewgraphs/lecture12_RSA_security_3.pdf)
The full decimal expansion of RSA-460 is:
This number corresponds to approximately 1,493 bits in binary, making it significantly more challenging to factor than smaller RSA challenge numbers like RSA-440 due to the exponential increase in computational resources required.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-30-en.pdf)
As of November 2025, RSA-450 remains unfactored, with no known prime factors published, underscoring the ongoing [security](/page/Security) implications for RSA-based [encryption](/page/Encryption) systems using moduli of comparable size.[](https://mysterytwister.org/challenges/level-3/rsa-factoring-challenge-rsa-450)
### RSA-460
RSA-460 is a [semiprime](/page/Semiprime) number consisting of exactly 460 decimal digits, constructed as the product of two large prime numbers of comparable size, as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991 to advance research in [integer factorization](/page/Integer_factorization).[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) The challenge aimed to test the limits of [computational number theory](/page/Computational_number_theory) by offering prizes for factoring such numbers, with RSA-460 representing a significant escalation in difficulty due to its length, equivalent to approximately 1,526 bits.[](https://mason.gmu.edu/~kgaj/ECE297/viewgraphs/lecture12_RSA_security_3.pdf)
The full decimal expansion of RSA-460 is:
This value was published in the official list of challenge numbers, with a [checksum](/page/Checksum) of 396,755 [modulo](/page/Modulo) 991,889 to verify integrity.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-460 remains unfactored, joining the majority of larger challenge numbers that have resisted all known classical factoring algorithms despite ongoing efforts in the field.[](https://www.pulsus.com/scholarly-articles/principles-of-prime-numbers--part-inew-definition-of-prime-numbers-with-modnt-number-system--induction.pdf) Its unfactored status underscores the practical [security](/page/Security) of RSA-based [encryption](/page/Encryption) systems using moduli of similar or greater size, as factoring it would require computational resources far beyond current capabilities.[](https://www.researchgate.net/publication/294548386_Square_roots_of_un-factored_RSA_Challenge_numbers)
### RSA-470
RSA-470 is a [semiprime](/page/Semiprime) number consisting of 470 decimal digits, generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test [computational number theory](/page/Computational_number_theory) algorithms.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
Its full decimal value is:
This value was published in the official list of challenge numbers, with a [checksum](/page/Checksum) of 396,755 [modulo](/page/Modulo) 991,889 to verify integrity.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-460 remains unfactored, joining the majority of larger challenge numbers that have resisted all known classical factoring algorithms despite ongoing efforts in the field.[](https://www.pulsus.com/scholarly-articles/principles-of-prime-numbers--part-inew-definition-of-prime-numbers-with-modnt-number-system--induction.pdf) Its unfactored status underscores the practical [security](/page/Security) of RSA-based [encryption](/page/Encryption) systems using moduli of similar or greater size, as factoring it would require computational resources far beyond current capabilities.[](https://www.researchgate.net/publication/294548386_Square_roots_of_un-factored_RSA_Challenge_numbers)
### RSA-470
RSA-470 is a [semiprime](/page/Semiprime) number consisting of 470 decimal digits, generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test [computational number theory](/page/Computational_number_theory) algorithms.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
Its full decimal value is:
[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-470 remains unfactored, with the largest successfully factored RSA challenge number being RSA-250 (250 digits) in 2020.[](https://members.loria.fr/PZimmermann/records/factor.html)
### RSA-480
RSA-480 is a 480-digit [semiprime](/page/Semiprime) number generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories to advance research in [computational number theory](/page/Computational_number_theory) and [integer factorization](/page/Integer_factorization).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-34-en.pdf) It consists of the product of two large prime numbers of approximately equal size, designed to test the limits of factoring algorithms at the time of its publication.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-34-en.pdf)
The exact decimal value of RSA-480 is:
[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of November 2025, RSA-470 remains unfactored, with the largest successfully factored RSA challenge number being RSA-250 (250 digits) in 2020.[](https://members.loria.fr/PZimmermann/records/factor.html)
### RSA-480
RSA-480 is a 480-digit [semiprime](/page/Semiprime) number generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories to advance research in [computational number theory](/page/Computational_number_theory) and [integer factorization](/page/Integer_factorization).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-34-en.pdf) It consists of the product of two large prime numbers of approximately equal size, designed to test the limits of factoring algorithms at the time of its publication.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-34-en.pdf)
The exact decimal value of RSA-480 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-34-en.pdf)
Despite advances in factoring techniques since the challenge's inception in [1991](/page/1991), RSA-480 remains unfactored as of [2025](/page/2025), underscoring the computational difficulty of factoring large [semiprime](/page/Semiprime)s and its relevance to the security of RSA cryptosystems.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-34-en.pdf)
### RSA-490
RSA-490 is a [semiprime](/page/Semiprime) number consisting of the product of two large prime factors, specifically designed as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in [1991](/page/1991) to promote advances in [integer factorization](/page/Integer_factorization) algorithms. This challenge number has exactly 490 [decimal](/page/Decimal) digits and corresponds to approximately 1,626 bits in binary representation, making it significantly larger than earlier challenge numbers like RSA-100 or RSA-200. The primes used to form RSA-490 were generated randomly using the RSA DSP (a [Motorola 56000](/page/Motorola_56000) DSP chip), selected to be congruent to 2 [modulo](/page/Modulo) 3, and verified via probabilistic primality testing; the factors were discarded after computation, ensuring they were unknown even to RSA personnel.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
The full decimal expansion of RSA-490 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-34-en.pdf)
Despite advances in factoring techniques since the challenge's inception in [1991](/page/1991), RSA-480 remains unfactored as of [2025](/page/2025), underscoring the computational difficulty of factoring large [semiprime](/page/Semiprime)s and its relevance to the security of RSA cryptosystems.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-34-en.pdf)
### RSA-490
RSA-490 is a [semiprime](/page/Semiprime) number consisting of the product of two large prime factors, specifically designed as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in [1991](/page/1991) to promote advances in [integer factorization](/page/Integer_factorization) algorithms. This challenge number has exactly 490 [decimal](/page/Decimal) digits and corresponds to approximately 1,626 bits in binary representation, making it significantly larger than earlier challenge numbers like RSA-100 or RSA-200. The primes used to form RSA-490 were generated randomly using the RSA DSP (a [Motorola 56000](/page/Motorola_56000) DSP chip), selected to be congruent to 2 [modulo](/page/Modulo) 3, and verified via probabilistic primality testing; the factors were discarded after computation, ensuring they were unknown even to RSA personnel.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
The full decimal expansion of RSA-490 is:
A checksum of 649001 was provided alongside the number to verify accuracy during transmission or transcription.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of 2025, RSA-490 remains unfactored, with no known complete prime factorization despite ongoing research in [computational number theory](/page/Computational_number_theory). The largest successfully factored RSA challenge number to date is RSA-250 (250 digits), achieved in 2020 using the general number field sieve, underscoring the immense computational resources required for numbers of RSA-490's scale.[](https://eprint.iacr.org/2020/697)
### RSA-500
RSA-500 is a 500-digit [semiprime](/page/Semiprime) number generated by RSA Laboratories as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), serving as the largest entry in the initial series of challenge numbers spaced at 10-digit intervals from RSA-100 to RSA-500.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-36-en.pdf) This number was created on May 19, 1994, by multiplying two large prime factors, with the primes discarded after computation to ensure the challenge's integrity.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) The full decimal representation of RSA-500 is:
A checksum of 649001 was provided alongside the number to verify accuracy during transmission or transcription.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html)
As of 2025, RSA-490 remains unfactored, with no known complete prime factorization despite ongoing research in [computational number theory](/page/Computational_number_theory). The largest successfully factored RSA challenge number to date is RSA-250 (250 digits), achieved in 2020 using the general number field sieve, underscoring the immense computational resources required for numbers of RSA-490's scale.[](https://eprint.iacr.org/2020/697)
### RSA-500
RSA-500 is a 500-digit [semiprime](/page/Semiprime) number generated by RSA Laboratories as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), serving as the largest entry in the initial series of challenge numbers spaced at 10-digit intervals from RSA-100 to RSA-500.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-36-en.pdf) This number was created on May 19, 1994, by multiplying two large prime factors, with the primes discarded after computation to ensure the challenge's integrity.[](http://www.ontko.com/pub/rayo/primes/rsa_fact.html) The full decimal representation of RSA-500 is:
The [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), initiated in 1991, aimed to advance research in [computational number theory](/page/Computational_number_theory) by offering prizes for factoring these semiprimes, with RSA-500 marking the upper limit of the early decimal-digit-labeled series before the challenge shifted to larger, specially selected numbers.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-36-en.pdf) As of [2012](/page/2012), RSA-500 remained among the 38 unsolved challenges out of the original 54, hosted by the MysteryTwister C3 team with permission from RSA Inc. after the official contest ended in 2007.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-36-en.pdf) It remains unfactored as of November 2025.[](https://mathworld.wolfram.com/RSANumber.html)
## Larger Challenge RSA Numbers
### RSA-576
RSA-576 is a 576-bit [semiprime](/page/Semiprime) number, equivalent to 174 decimal digits, selected as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the difficulty of [integer factorization](/page/Integer_factorization) for cryptographic purposes.[](https://mathworld.wolfram.com/news/2003-12-05/rsa/) The full decimal representation of RSA-576 is:
The [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), initiated in 1991, aimed to advance research in [computational number theory](/page/Computational_number_theory) by offering prizes for factoring these semiprimes, with RSA-500 marking the upper limit of the early decimal-digit-labeled series before the challenge shifted to larger, specially selected numbers.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-36-en.pdf) As of [2012](/page/2012), RSA-500 remained among the 38 unsolved challenges out of the original 54, hosted by the MysteryTwister C3 team with permission from RSA Inc. after the official contest ended in 2007.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-36-en.pdf) It remains unfactored as of November 2025.[](https://mathworld.wolfram.com/RSANumber.html)
## Larger Challenge RSA Numbers
### RSA-576
RSA-576 is a 576-bit [semiprime](/page/Semiprime) number, equivalent to 174 decimal digits, selected as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test the difficulty of [integer factorization](/page/Integer_factorization) for cryptographic purposes.[](https://mathworld.wolfram.com/news/2003-12-05/rsa/) The full decimal representation of RSA-576 is:
This number was designed to have exactly two distinct prime factors of equal length, making it particularly resistant to factorization attacks at the time of its publication. It served as the smallest in a series of larger binary-sized RSA challenge numbers, shifting from the earlier decimal-digit naming convention used for RSA-100 through RSA-500.[](https://mathworld.wolfram.com/RSANumber.html)
RSA-576 was successfully factored on December 3, 2003, by a team led by Jens Franke and including Thorsten Kleinjung from the [University of Bonn](/page/University_of_Bonn), along with collaborators such as Peter Montgomery, Herman te Riele, and others from institutions including CWI in the [Netherlands](/page/Netherlands).[](https://mathworld.wolfram.com/news/2003-12-05/rsa/)[](https://www.cwi.nl/en/news/cwi-contributes-to-crack-rsa-576/) The factorization employed the general number field [sieve](/page/Sieve) (GNFS), the most advanced method available for large semiprimes, involving extensive sieving, linear [algebra](/page/Algebra), and square root computations distributed across multiple [high-performance computing](/page/High-performance_computing) resources. The effort required the equivalent of approximately 2000 core-years on a single 2.2 GHz AMD [Opteron](/page/Opteron) processor, highlighting the scale of computation needed and the collaborative nature of modern cryptanalytic projects.[](https://eprint.iacr.org/2010/006.pdf) For this achievement, the team claimed the $10,000 prize offered by RSA Laboratories.[](https://mathworld.wolfram.com/RSANumber.html)
The two 87-decimal-digit prime factors are:
- $ p = 398075086424064937397125500550386491199064362342526708406385189575946388957261768583317 $
- $ q = 472772146107435302536223071973048224632914695302097116459852171130520711256363590397527 $
[](https://www.math.ucsd.edu/~crypto/Projects/ToniSmith/crypto.html) Their product yields the original RSA-576, demonstrating the vulnerability of 576-bit RSA moduli to sufficiently resourced GNFS attacks by the early 2000s. This factorization underscored the need for longer key lengths in RSA-based systems, influencing subsequent recommendations for at least [1024](/page/1024) bits or more.[](https://mathworld.wolfram.com/news/2003-12-05/rsa/)
### RSA-617
RSA-617 is a [semiprime](/page/Semiprime) number consisting of exactly 617 decimal digits, constructed as the product of two large prime factors for the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories. This challenge aimed to demonstrate the computational infeasibility of factoring such large composites, which underpin the security of RSA [encryption](/page/Encryption). Unlike many challenge numbers with round digit counts, RSA-617's irregular length of 617 digits was selected to highlight the progressive increase in factoring difficulty beyond standard milestones.
The full decimal representation of RSA-617 is:
This number was designed to have exactly two distinct prime factors of equal length, making it particularly resistant to factorization attacks at the time of its publication. It served as the smallest in a series of larger binary-sized RSA challenge numbers, shifting from the earlier decimal-digit naming convention used for RSA-100 through RSA-500.[](https://mathworld.wolfram.com/RSANumber.html)
RSA-576 was successfully factored on December 3, 2003, by a team led by Jens Franke and including Thorsten Kleinjung from the [University of Bonn](/page/University_of_Bonn), along with collaborators such as Peter Montgomery, Herman te Riele, and others from institutions including CWI in the [Netherlands](/page/Netherlands).[](https://mathworld.wolfram.com/news/2003-12-05/rsa/)[](https://www.cwi.nl/en/news/cwi-contributes-to-crack-rsa-576/) The factorization employed the general number field [sieve](/page/Sieve) (GNFS), the most advanced method available for large semiprimes, involving extensive sieving, linear [algebra](/page/Algebra), and square root computations distributed across multiple [high-performance computing](/page/High-performance_computing) resources. The effort required the equivalent of approximately 2000 core-years on a single 2.2 GHz AMD [Opteron](/page/Opteron) processor, highlighting the scale of computation needed and the collaborative nature of modern cryptanalytic projects.[](https://eprint.iacr.org/2010/006.pdf) For this achievement, the team claimed the $10,000 prize offered by RSA Laboratories.[](https://mathworld.wolfram.com/RSANumber.html)
The two 87-decimal-digit prime factors are:
- $ p = 398075086424064937397125500550386491199064362342526708406385189575946388957261768583317 $
- $ q = 472772146107435302536223071973048224632914695302097116459852171130520711256363590397527 $
[](https://www.math.ucsd.edu/~crypto/Projects/ToniSmith/crypto.html) Their product yields the original RSA-576, demonstrating the vulnerability of 576-bit RSA moduli to sufficiently resourced GNFS attacks by the early 2000s. This factorization underscored the need for longer key lengths in RSA-based systems, influencing subsequent recommendations for at least [1024](/page/1024) bits or more.[](https://mathworld.wolfram.com/news/2003-12-05/rsa/)
### RSA-617
RSA-617 is a [semiprime](/page/Semiprime) number consisting of exactly 617 decimal digits, constructed as the product of two large prime factors for the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories. This challenge aimed to demonstrate the computational infeasibility of factoring such large composites, which underpin the security of RSA [encryption](/page/Encryption). Unlike many challenge numbers with round digit counts, RSA-617's irregular length of 617 digits was selected to highlight the progressive increase in factoring difficulty beyond standard milestones.
The full decimal representation of RSA-617 is:
This value corresponds to approximately 2048 bits in binary length.
RSA-617 was introduced to the challenge list on February 7, 1997, as one of the earliest large-scale examples using decimal-digit labeling. As of November 2025, it remains unfactored, with no publicly verified prime factors discovered despite advances in factoring algorithms.
### RSA-640
RSA-640 is a semiprime consisting of the product of two large prime numbers, specifically designed for the RSA Factoring Challenge to test the limits of integer factorization algorithms. It measures 640 bits in length, equivalent to approximately 193 decimal digits, and was introduced by RSA Laboratories in 2001 as part of an expanded set of challenges emphasizing bit-length measurements over decimal digits for alignment with cryptographic key sizes.[](https://www.hpcwire.com/2004/04/30/mathematicians-collaborate-to-solve-rsa-factoring-challenge/)[](https://mathworld.wolfram.com/RSANumber.html)
The full decimal representation of RSA-640 is:
This value corresponds to approximately 2048 bits in binary length.
RSA-617 was introduced to the challenge list on February 7, 1997, as one of the earliest large-scale examples using decimal-digit labeling. As of November 2025, it remains unfactored, with no publicly verified prime factors discovered despite advances in factoring algorithms.
### RSA-640
RSA-640 is a semiprime consisting of the product of two large prime numbers, specifically designed for the RSA Factoring Challenge to test the limits of integer factorization algorithms. It measures 640 bits in length, equivalent to approximately 193 decimal digits, and was introduced by RSA Laboratories in 2001 as part of an expanded set of challenges emphasizing bit-length measurements over decimal digits for alignment with cryptographic key sizes.[](https://www.hpcwire.com/2004/04/30/mathematicians-collaborate-to-solve-rsa-factoring-challenge/)[](https://mathworld.wolfram.com/RSANumber.html)
The full decimal representation of RSA-640 is:
Although initially presented as unfactored with a $20,000 prize, RSA-640 was successfully factored in November 2005 using the general number field sieve by a team led by Jens Franke and Thorsten Kleinjung, in collaboration with researchers from the University of Bonn and other institutions; this marked a significant milestone in demonstrating the vulnerability of 640-bit RSA moduli at the time.[](https://listserv.nodak.edu/cgi-bin/wa.exe?A2=NMBRTHRY;3e3c5c3b.0511)[](https://mathworld.wolfram.com/news/2005-11-08/rsa-640/)
### RSA-704
RSA-704 is a [semiprime](/page/Semiprime) number with 704 bits, equivalent to 212 decimal digits, generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991 to advance research in [integer factorization](/page/Integer_factorization). The number was designed as the product of two large prime factors of roughly equal size to test the limits of contemporary factoring algorithms. Its full decimal representation is:
Although initially presented as unfactored with a $20,000 prize, RSA-640 was successfully factored in November 2005 using the general number field sieve by a team led by Jens Franke and Thorsten Kleinjung, in collaboration with researchers from the University of Bonn and other institutions; this marked a significant milestone in demonstrating the vulnerability of 640-bit RSA moduli at the time.[](https://listserv.nodak.edu/cgi-bin/wa.exe?A2=NMBRTHRY;3e3c5c3b.0511)[](https://mathworld.wolfram.com/news/2005-11-08/rsa-640/)
### RSA-704
RSA-704 is a [semiprime](/page/Semiprime) number with 704 bits, equivalent to 212 decimal digits, generated as part of the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) initiated by RSA Laboratories in 1991 to advance research in [integer factorization](/page/Integer_factorization). The number was designed as the product of two large prime factors of roughly equal size to test the limits of contemporary factoring algorithms. Its full decimal representation is:
RSA-704 was successfully factored on July 1, 2012, marking it as the second-largest integer factored using the general number field sieve (GNFS) at the time, following RSA-768. The factorization was achieved by Shi Bai, Emmanuel Thomé, and Paul Zimmermann using the open-source CADO-NFS implementation of GNFS. The effort involved extensive computational resources, including approximately 12 core-years for polynomial selection, 500 CPU-years for sieving on Intel Xeon processors, and 1,800 hours of wall-clock time for linear algebra on the Grid'5000 cluster.[](https://eprint.iacr.org/2012/369.pdf)[](https://inria.hal.science/hal-00760322v1/document)
The prime factors of RSA-704 are:
- $ p = 9091213529597818878440658302600437485892608310328358720428512168960411528640933367824950788367956756806141 $
- $ q = 8143859259110045265727809126284429335877899002167627883200914172429324360133004116702003240828777970252499 $
This breakthrough demonstrated the scalability of CADO-NFS for large-scale factorizations and contributed to improvements in the software for subsequent challenges.[](https://eprint.iacr.org/2012/369.pdf)
### RSA-768
RSA-768 is a 768-bit [semiprime](/page/Semiprime) number consisting of 232 decimal digits, selected as a representative modulus for the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test [computational number theory](/page/Computational_number_theory) advances.[](https://eprint.iacr.org/2010/006.pdf) Its full decimal value is:
RSA-704 was successfully factored on July 1, 2012, marking it as the second-largest integer factored using the general number field sieve (GNFS) at the time, following RSA-768. The factorization was achieved by Shi Bai, Emmanuel Thomé, and Paul Zimmermann using the open-source CADO-NFS implementation of GNFS. The effort involved extensive computational resources, including approximately 12 core-years for polynomial selection, 500 CPU-years for sieving on Intel Xeon processors, and 1,800 hours of wall-clock time for linear algebra on the Grid'5000 cluster.[](https://eprint.iacr.org/2012/369.pdf)[](https://inria.hal.science/hal-00760322v1/document)
The prime factors of RSA-704 are:
- $ p = 9091213529597818878440658302600437485892608310328358720428512168960411528640933367824950788367956756806141 $
- $ q = 8143859259110045265727809126284429335877899002167627883200914172429324360133004116702003240828777970252499 $
This breakthrough demonstrated the scalability of CADO-NFS for large-scale factorizations and contributed to improvements in the software for subsequent challenges.[](https://eprint.iacr.org/2012/369.pdf)
### RSA-768
RSA-768 is a 768-bit [semiprime](/page/Semiprime) number consisting of 232 decimal digits, selected as a representative modulus for the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) to test [computational number theory](/page/Computational_number_theory) advances.[](https://eprint.iacr.org/2010/006.pdf) Its full decimal value is:
This number served as a benchmark for 768-bit RSA key sizes, which were once considered secure for cryptographic applications but have since been deemed insufficient due to advances in factoring algorithms.[](https://eprint.iacr.org/2010/006.pdf)
On December 12, 2009, RSA-768 was factored by Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen Lenstra, Emmanuel Thomé, Joppe Bos, Pierrick Gaudry, Luke Brent, Jean-Luc Beuchat, Henry Cohn, Nadia Heninger, and the authors of the Cunningham tables, using the general number field sieve (GNFS).[](https://eprint.iacr.org/2010/006.pdf) The factorization revealed two prime factors, each approximately 384 bits long:
- $ p = 33478071698956898786044169848212690817704794983713768568912431388982883793878002287614711652531743087737814467999489 $
- $ q = 36746043666799590428244633799627952632279158164343087642676032283815739666511279233373417143396810270092798736308917 $
The sieving phase required approximately 1500 core-years of computation on a 2.2 GHz AMD Opteron processor, equivalent to about two years of wall-clock time across hundreds of machines, marking a significant milestone in the practical limits of integer factorization.[](https://eprint.iacr.org/2010/006.pdf)
### RSA-896
RSA-896 is a [semiprime](/page/Semiprime) number from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), published by RSA Laboratories in 1991 as part of a series of cryptographic challenges designed to test [integer factorization](/page/Integer_factorization) algorithms.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-10-en.pdf) It consists of two large prime factors and serves as an intermediate challenge between smaller factored numbers like RSA-768 and larger unfactored ones.
The number has a bit length of 896 bits, equivalent to approximately 270 decimal digits, making it significantly more computationally intensive to factor than predecessors using classical methods such as the general number field sieve.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-10-en.pdf) As of 2025, RSA-896 remains unfactored, with RSA-250 holding the record as the largest solved challenge from the series, factored in 2020 after extensive computation on distributed systems.
The full decimal representation of RSA-896 is:
This number served as a benchmark for 768-bit RSA key sizes, which were once considered secure for cryptographic applications but have since been deemed insufficient due to advances in factoring algorithms.[](https://eprint.iacr.org/2010/006.pdf)
On December 12, 2009, RSA-768 was factored by Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen Lenstra, Emmanuel Thomé, Joppe Bos, Pierrick Gaudry, Luke Brent, Jean-Luc Beuchat, Henry Cohn, Nadia Heninger, and the authors of the Cunningham tables, using the general number field sieve (GNFS).[](https://eprint.iacr.org/2010/006.pdf) The factorization revealed two prime factors, each approximately 384 bits long:
- $ p = 33478071698956898786044169848212690817704794983713768568912431388982883793878002287614711652531743087737814467999489 $
- $ q = 36746043666799590428244633799627952632279158164343087642676032283815739666511279233373417143396810270092798736308917 $
The sieving phase required approximately 1500 core-years of computation on a 2.2 GHz AMD Opteron processor, equivalent to about two years of wall-clock time across hundreds of machines, marking a significant milestone in the practical limits of integer factorization.[](https://eprint.iacr.org/2010/006.pdf)
### RSA-896
RSA-896 is a [semiprime](/page/Semiprime) number from the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge), published by RSA Laboratories in 1991 as part of a series of cryptographic challenges designed to test [integer factorization](/page/Integer_factorization) algorithms.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-10-en.pdf) It consists of two large prime factors and serves as an intermediate challenge between smaller factored numbers like RSA-768 and larger unfactored ones.
The number has a bit length of 896 bits, equivalent to approximately 270 decimal digits, making it significantly more computationally intensive to factor than predecessors using classical methods such as the general number field sieve.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-10-en.pdf) As of 2025, RSA-896 remains unfactored, with RSA-250 holding the record as the largest solved challenge from the series, factored in 2020 after extensive computation on distributed systems.
The full decimal representation of RSA-896 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-10-en.pdf) This value was generated to ensure balanced prime factors close in size, optimizing its resistance to [factorization](/page/Factorization) attacks typical of RSA [key generation](/page/Key_generation).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-10-en.pdf) The challenge, originally offering a $75,000 prize, was discontinued by RSA in 2007, with remaining unsolved instances like RSA-896 hosted by third-party platforms for academic interest.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-10-en.pdf)
### RSA-1024
RSA-1024 is a semiprime number consisting of the product of two distinct prime factors, each approximately 512 bits in length, published by RSA Laboratories as part of their factoring challenge to benchmark advances in computational number theory.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-15-en.pdf) The exact value of RSA-1024 in decimal form is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-10-en.pdf) This value was generated to ensure balanced prime factors close in size, optimizing its resistance to [factorization](/page/Factorization) attacks typical of RSA [key generation](/page/Key_generation).[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-10-en.pdf) The challenge, originally offering a $75,000 prize, was discontinued by RSA in 2007, with remaining unsolved instances like RSA-896 hosted by third-party platforms for academic interest.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-10-en.pdf)
### RSA-1024
RSA-1024 is a semiprime number consisting of the product of two distinct prime factors, each approximately 512 bits in length, published by RSA Laboratories as part of their factoring challenge to benchmark advances in computational number theory.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-15-en.pdf) The exact value of RSA-1024 in decimal form is:
This number comprises 309 decimal digits and corresponds to a 1024-bit modulus.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-15-en.pdf)
As of November 2025, RSA-1024 remains unfactored, with the largest publicly factored RSA challenge number being RSA-250 (829 bits) from 2020.[](https://www.theregister.com/2001/07/25/rsa_poses_200_000_crypto/) In the original RSA Factoring Challenge, launched in 1991 and expanded in 2001, a prize of $200,000 was offered for its complete factorization, making it the highest-value target at the time before the challenge was withdrawn in 2007.[](https://www.cnet.com/tech/tech-industry/rsa-launches-crypto-cracking-challenge/)
The 1024-bit size of RSA-1024 aligns with the modulus length that served as a de facto standard for RSA public-key [encryption](/page/Encryption) in protocols like TLS from the early 2000s until around 2013, when it began to be phased out in favor of longer keys due to advancing computational capabilities.[](https://www.encryptionconsulting.com/soon-to-be-deprecated-are-you-still-using-rsa-1024-bit-keys-for-windows/) Using the general number field sieve, the state-of-the-art classical algorithm for such factorizations, breaking RSA-1024 is estimated to require on the order of 500,000 core-years of computation on modern hardware.[](https://crypto.stackexchange.com/questions/109810/how-could-a-1024-bits-rsa-modulus-be-most-economically-factored-within-months-to)
### RSA-1536
RSA-1536 is a 1536-bit [semiprime](/page/Semiprime) constructed as the product of two distinct large prime numbers, introduced by RSA Laboratories as part of their factoring challenge to advance [research](/page/Research) in [computational number theory](/page/Computational_number_theory) and highlight the difficulty of factoring large integers.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-32-en.pdf) This number spans approximately 463 decimal digits, reflecting the immense scale required for contemporary cryptographic security.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-32-en.pdf)
The explicit decimal value of RSA-1536 is as follows:
This number comprises 309 decimal digits and corresponds to a 1024-bit modulus.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-15-en.pdf)
As of November 2025, RSA-1024 remains unfactored, with the largest publicly factored RSA challenge number being RSA-250 (829 bits) from 2020.[](https://www.theregister.com/2001/07/25/rsa_poses_200_000_crypto/) In the original RSA Factoring Challenge, launched in 1991 and expanded in 2001, a prize of $200,000 was offered for its complete factorization, making it the highest-value target at the time before the challenge was withdrawn in 2007.[](https://www.cnet.com/tech/tech-industry/rsa-launches-crypto-cracking-challenge/)
The 1024-bit size of RSA-1024 aligns with the modulus length that served as a de facto standard for RSA public-key [encryption](/page/Encryption) in protocols like TLS from the early 2000s until around 2013, when it began to be phased out in favor of longer keys due to advancing computational capabilities.[](https://www.encryptionconsulting.com/soon-to-be-deprecated-are-you-still-using-rsa-1024-bit-keys-for-windows/) Using the general number field sieve, the state-of-the-art classical algorithm for such factorizations, breaking RSA-1024 is estimated to require on the order of 500,000 core-years of computation on modern hardware.[](https://crypto.stackexchange.com/questions/109810/how-could-a-1024-bits-rsa-modulus-be-most-economically-factored-within-months-to)
### RSA-1536
RSA-1536 is a 1536-bit [semiprime](/page/Semiprime) constructed as the product of two distinct large prime numbers, introduced by RSA Laboratories as part of their factoring challenge to advance [research](/page/Research) in [computational number theory](/page/Computational_number_theory) and highlight the difficulty of factoring large integers.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-32-en.pdf) This number spans approximately 463 decimal digits, reflecting the immense scale required for contemporary cryptographic security.[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-32-en.pdf)
The explicit decimal value of RSA-1536 is as follows:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-32-en.pdf)
Despite significant progress in [factorization](/page/Factorization) techniques, such as the number field sieve, RSA-1536 remains unfactored as of November 2025.[](https://mathworld.wolfram.com/RSANumber.html) Its persistence underscores the computational barriers to breaking RSA-based [encryption](/page/Encryption) at this scale, where no known classical algorithm can efficiently decompose it into its prime factors.[](https://mathworld.wolfram.com/RSANumber.html)
RSA-1536 serves as a benchmark for evolving cryptographic standards, illustrating the transition to larger key sizes beyond [1024](/page/1024) bits to ensure long-term security against advancing computational power.[](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf) Specifically, 1536-bit RSA moduli are endorsed for [digital signature](/page/Digital_signature) generation in legacy systems until 2030, providing a [balance of performance](/page/Balance_of_performance) and resistance to factorization attacks.[](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf)
### RSA-2048
RSA-2048 is a 2048-bit [semiprime](/page/Semiprime) number, constructed as the product of two distinct 1024-bit prime numbers, and serves as the largest challenge in the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) series. It consists of exactly 617 [decimal](/page/Decimal) digits and remains unfactored using classical [computing](/page/Computing) methods as of November 2025. Unlike smaller RSA challenge numbers, no cash prize was associated with its factorization, as the overall challenge program was discontinued by RSA Laboratories in 2007 without awarding prizes for numbers beyond RSA-768.[](https://blog.cloudflare.com/pq-2025/)
The full decimal representation of RSA-2048 is:
[](https://mysterytwister.org/media/challenges/pdf/mtc3-rsa-32-en.pdf)
Despite significant progress in [factorization](/page/Factorization) techniques, such as the number field sieve, RSA-1536 remains unfactored as of November 2025.[](https://mathworld.wolfram.com/RSANumber.html) Its persistence underscores the computational barriers to breaking RSA-based [encryption](/page/Encryption) at this scale, where no known classical algorithm can efficiently decompose it into its prime factors.[](https://mathworld.wolfram.com/RSANumber.html)
RSA-1536 serves as a benchmark for evolving cryptographic standards, illustrating the transition to larger key sizes beyond [1024](/page/1024) bits to ensure long-term security against advancing computational power.[](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf) Specifically, 1536-bit RSA moduli are endorsed for [digital signature](/page/Digital_signature) generation in legacy systems until 2030, providing a [balance of performance](/page/Balance_of_performance) and resistance to factorization attacks.[](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf)
### RSA-2048
RSA-2048 is a 2048-bit [semiprime](/page/Semiprime) number, constructed as the product of two distinct 1024-bit prime numbers, and serves as the largest challenge in the [RSA Factoring Challenge](/page/RSA_Factoring_Challenge) series. It consists of exactly 617 [decimal](/page/Decimal) digits and remains unfactored using classical [computing](/page/Computing) methods as of November 2025. Unlike smaller RSA challenge numbers, no cash prize was associated with its factorization, as the overall challenge program was discontinued by RSA Laboratories in 2007 without awarding prizes for numbers beyond RSA-768.[](https://blog.cloudflare.com/pq-2025/)
The full decimal representation of RSA-2048 is:
[](https://dev.mysterytwister.org/media/challenges/pdf/mtc3-rsa-38-en.pdf)
As of 2025, RSA-2048 represents the current standard key size for RSA encryption in many cryptographic protocols, with the National Institute of Standards and Technology (NIST) recommending its continued use for providing at least 112 bits of security through 2030, prior to a planned deprecation in favor of post-quantum alternatives.[](https://www.sectigo.com/resource-library/root-causes-447-nist-deprecates-rsa-2048-and-ecc-256) Recent quantum computing experiments, such as a 2024 D-Wave study demonstrating factorization of specially constructed 2048-bit semiprimes where factors differ by only two bits, have not succeeded in factoring the specific RSA-2048 number, and such claims remain unverified for this challenge instance.[](https://www.hstoday.us/subject-matter-areas/cybersecurity/no-chinese-did-not-crack-rsa-with-quantum-yet/)[](https://www.sciopen.com/article/10.26599/TST.2024.9010028)
[](https://dev.mysterytwister.org/media/challenges/pdf/mtc3-rsa-38-en.pdf)
As of 2025, RSA-2048 represents the current standard key size for RSA encryption in many cryptographic protocols, with the National Institute of Standards and Technology (NIST) recommending its continued use for providing at least 112 bits of security through 2030, prior to a planned deprecation in favor of post-quantum alternatives.[](https://www.sectigo.com/resource-library/root-causes-447-nist-deprecates-rsa-2048-and-ecc-256) Recent quantum computing experiments, such as a 2024 D-Wave study demonstrating factorization of specially constructed 2048-bit semiprimes where factors differ by only two bits, have not succeeded in factoring the specific RSA-2048 number, and such claims remain unverified for this challenge instance.[](https://www.hstoday.us/subject-matter-areas/cybersecurity/no-chinese-did-not-crack-rsa-with-quantum-yet/)[](https://www.sciopen.com/article/10.26599/TST.2024.9010028)
