Some Number-theoretic Conjectures and Their Relation to the Generation of Cryptographic Primes 1
نویسنده
چکیده
The purpose of this paper is to justify the claim that a method for generating primes presented at EUROCRYPT'89 generates primes with virtually uniform distribution. Using convincing heuristic arguments, the conditional probability distributions of the size of the largest prime factor p 1 (n) of a number n on the order of N is derived, given that n satisses one of the conditions 2n+1 is prime, 2an+1 is prime for a given a, or the d integers u 1 ; : : : ; u d , where u 1 = 2a 1 n + 1 and u t = 2a t u t?1 + 1 for 2 t d, are all primes for a given list of integers a 1 ; : : : ; a d. In particular, the conditional probabilities that n is itself a prime, or is of the form \k times a prime" for k = 2; 3; : : : ; is treated for the above conditions. It is shown that although for all k these probabilities strongly depend on the condition placed on n, the probability distribution of the relative size 1 (n) = log N p 1 (n) of the largest prime factor of n is virtually independent of any of these conditions. Some number-theoretic conjectures related to this analysis are stated. Furthermore, the probability distribution of the size of the smaller prime factor of an RSA-modulus of a certain size is investigated.
منابع مشابه
On the Infinitude of Some Special Kinds of Primes —— Dedicated to the memory of my mother
The aim of this paper is to try to establish a generic model for the problem that several multivariable number-theoretic functions represent simultaneously primes for infinitely many integral points. More concretely, we introduced briefly the research background–the history and current situation–from Euclid’s second theorem to Green-Tao theorem. We analyzed some equivalent necessary conditions ...
متن کاملFast Generation of Random, Strong Rsa Primes
A number of cryptographic standards currently under development call for the use of strong primes in the generation of an RSA key. This paper suggests a fast way of generating random strong primes that also satisfy a number of other cryptographic requirements. The method requires no more time to generate strong primes than it takes to generate random primes.
متن کاملSome experiments in number theory
Following footsteps of Gauss, Euler, Riemann, Hurwitz, Smith, Hardy, Littlewood, Hedlund, Khinchin and Chebyshev, we visit some topics in elementary number theory. For matrices defined by Gaussian primes we observe a circular spectral law for the eigenvalues. We experiment then with various Goldbach conjectures for Gaussian primes, Eisenstein primes, Hurwitz primes or Octavian primes. These con...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملSome conjectures on the gaps between consecutive primes
Five conjectures on the gaps between consecutive primes are formulated One expresses the number of twins below a given bound directly by N These conjectures are compared with the computer results and a good agre ement is found Introduction In Hardy and Littlewood have proposed about conjectures The con jecture B of their paper states There are in nitely many primes pairs p p where p p d for eve...
متن کامل