Is There a Shortage of Primes for Cryptography?

نویسنده

  • Samuel S. Wagstaff
چکیده

Cryptographic algorithms often prescribe the use of primes whose length in bits is a power of 2. Recently, we proved that for m > 1, there is no prime number with 2 significant bits, exactly two of which are 0 bits. Here we generalize this theorem to impose many more restrictions on primes whose length in bits is a power of 2. No similar restrictions apply to primes of other lengths. We consider whether the restrictions on primes with length 2 bits are so great that one should choose other lengths for primes to be used in cryptography.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Silverman's conjecture for a family of elliptic curves

Let $E$ be an elliptic curve over $Bbb{Q}$ with the given Weierstrass equation $ y^2=x^3+ax+b$. If $D$ is a squarefree integer, then let $E^{(D)}$ denote the $D$-quadratic twist of $E$ that is given by $E^{(D)}: y^2=x^3+aD^2x+bD^3$. Let $E^{(D)}(Bbb{Q})$ be the group of $Bbb{Q}$-rational points of $E^{(D)}$. It is conjectured by J. Silverman that there are infinitely many primes $p$ for which $...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Infinite Sets of Primes with Fast Primality Tests and Quick Generation of Large Primes

Infinite sets P and Q of primes are described, P C Q. For any natural number n it can be decided if n e P in (deterministic) time 0((logn)9). This answers affirmatively the question of whether there exists an infinite set of primes whose membership can be tested in polynomial time, and is a main result of the paper. Also, for every n € Q, we show how to randomly produce a proof of the primality...

متن کامل

Distinct Fuzzy Subgroups of a Dihedral Group of Order $2pqrs$ for Distinct Primes $p, , q, , r$ and $s$

In this paper we classify fuzzy subgroups of the dihedral group $D_{pqrs}$  for distinct primes  $p$, $q$, $r$ and $s$. This follows similar work we have done on distinct fuzzy subgroups of some dihedral groups.We present formulae for the number of (i) distinct maximal chains of subgroups, (ii) distinct fuzzy subgroups and (iii) non-isomorphic classes of fuzzy subgroups under our chosen equival...

متن کامل

TOP LOCAL COHOMOLOGY AND TOP FORMAL LOCAL COHOMOLOGY MODULES WITH SPECIFIED ATTACHED PRIMES

Let (R,m) be a Noetherian local ring, M be a finitely generated R-module of dimension n and a be an ideal of R. In this paper, generalizing the main results of Dibaei and Jafari [3] and Rezaei [8], we will show that if T is a subset of AsshR M, then there exists an ideal a of R such that AttR Hna (M)=T. As an application, we give some relationships between top local cohomology modules and top f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2006