Is There a Shortage of Primes for Cryptography?
نویسنده
چکیده
Cryptographic algorithms often prescribe the use of primes whose length in bits is a power of 2. Recently, we proved that for m > 1, there is no prime number with 2 significant bits, exactly two of which are 0 bits. Here we generalize this theorem to impose many more restrictions on primes whose length in bits is a power of 2. No similar restrictions apply to primes of other lengths. We consider whether the restrictions on primes with length 2 bits are so great that one should choose other lengths for primes to be used in cryptography.
منابع مشابه
On Silverman's conjecture for a family of elliptic curves
Let $E$ be an elliptic curve over $Bbb{Q}$ with the given Weierstrass equation $ y^2=x^3+ax+b$. If $D$ is a squarefree integer, then let $E^{(D)}$ denote the $D$-quadratic twist of $E$ that is given by $E^{(D)}: y^2=x^3+aD^2x+bD^3$. Let $E^{(D)}(Bbb{Q})$ be the group of $Bbb{Q}$-rational points of $E^{(D)}$. It is conjectured by J. Silverman that there are infinitely many primes $p$ for which $...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملInfinite Sets of Primes with Fast Primality Tests and Quick Generation of Large Primes
Infinite sets P and Q of primes are described, P C Q. For any natural number n it can be decided if n e P in (deterministic) time 0((logn)9). This answers affirmatively the question of whether there exists an infinite set of primes whose membership can be tested in polynomial time, and is a main result of the paper. Also, for every n € Q, we show how to randomly produce a proof of the primality...
متن کاملDistinct Fuzzy Subgroups of a Dihedral Group of Order $2pqrs$ for Distinct Primes $p, , q, , r$ and $s$
In this paper we classify fuzzy subgroups of the dihedral group $D_{pqrs}$ for distinct primes $p$, $q$, $r$ and $s$. This follows similar work we have done on distinct fuzzy subgroups of some dihedral groups.We present formulae for the number of (i) distinct maximal chains of subgroups, (ii) distinct fuzzy subgroups and (iii) non-isomorphic classes of fuzzy subgroups under our chosen equival...
متن کاملTOP LOCAL COHOMOLOGY AND TOP FORMAL LOCAL COHOMOLOGY MODULES WITH SPECIFIED ATTACHED PRIMES
Let (R,m) be a Noetherian local ring, M be a finitely generated R-module of dimension n and a be an ideal of R. In this paper, generalizing the main results of Dibaei and Jafari [3] and Rezaei [8], we will show that if T is a subset of AsshR M, then there exists an ideal a of R such that AttR Hna (M)=T. As an application, we give some relationships between top local cohomology modules and top f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 3 شماره
صفحات -
تاریخ انتشار 2006