Pseudoprime Numbers: Basic Concepts and the Problem of Security

نویسنده

  • Vladimir Pevnev
چکیده

The analysis of existing methods of construction of prime numbers is carried out in the presented paper. New concepts related to pseudoprime numbers are introduced. Theorems are formulated and proved on the basis of which such numbers are constructed. Using pseudoprime numbers can significantly reduce the number of candidates viewed as primes. The proposed corollaries of the theorems allow to significantly increase the ranges of unambiguous determination of such candidates. The results of the conducted experiments are presented, their analysis is carried out. The most important result of applying pseudoprime numbers is the estimation of the number of numbers to be checked. For large numbers with a size of more than 200 decimal signs, they make up less than 8 percent of the numbers on a given interval, and as the size of the numbers increases, this percentage decreases. Based on experimental data, basic properties of pseudoprime numbers are formulated.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiobjective security game with fuzzy payoffs

A multiobjective security game problem with fuzzy payoffs is studied in this paper. The problem is formulated as a bilevel programming problem with fuzzy coefficients. Using the idea of nearest interval approximation of fuzzy numbers, the problem is transformed into a bilevel programming problem with interval coefficients. The Karush-Kuhn-Tucker conditions is applied then to reduce the problem ...

متن کامل

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

Eternal m-security subdivision numbers in graphs

An eternal $m$-secure set of a graph $G = (V,E)$ is aset $S_0subseteq V$ that can defend against any sequence ofsingle-vertex attacks by means of multiple-guard shifts along theedges of $G$. A suitable placement of the guards is called aneternal $m$-secure set. The eternal $m$-security number$sigma_m(G)$ is the minimum cardinality among all eternal$m$-secure sets in $G$. An edge $uvin E(G)$ is ...

متن کامل

A new attitude coupled with the basic thinking to ordering for ranking fuzzy ‎numbers

‎Ranking fuzzy numbers is generalization of the concepts of order, and class, and so have fundamental applications. Moreover, deriving the final efficiency and powerful ranking are helpful to decision makers when solving fuzzy problems. Selecting a good ranking method can apply to choosing a desired criterion in a fuzzy environment. There are numerous methods proposed for the ranking of fuzzy n...

متن کامل

A new attitude coupled with the basic fuzzy thinking to distance between two fuzzy numbers

Fuzzy measures are suitable in analyzing human subjective evaluation processes. Several different strategies have been proposed for distance of fuzzy numbers. The distances introduced for fuzzy numbers can be categorized in two groups:\1. The crisp distances which explain crisp values for the distance between two fuzzy numbers.\2. The fuzzy distance which introduce a fuzzy distance for normal f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017