www.gsjpublications.com Journal of Journal of Global Scientific Research (ISSN: 2523-9376) Global Scientific Research 5 (2020) 596-601 www.gsjpublications.com/jgsr

Introduce a Generalized Public Keys Using a Sequence of ω- Numbers Built from Beurling's Function of Reals

Sarah Sh. Hasan

Department of Mathematics, College of Education, University of Al-Mustansiriyah, Baghdad, Iraq.

Email address: [email protected]

Received: 14 Aug 2020, Revised: 19 Aug 2020, Accepted: 28 Aug 2020, Online: 30 Aug 2020

Abstract The generalized primes had been introduced during the third decade of the last century by Beurling in which for any infinite sequence of increasing positive real's start with an element sharply greater than one called generalized (or Beurling) primes. The fundamental theorem of arithmetic form the sequence of generalized (or Beurling) . So many authors have been working with this subject in order to having a clue of the truth of The Riemann-Hypothesis as a special case. This work gives an algorithm for creating a sequence of weird numbers from any positive real number. This used an arithmetical function 풢(푥) which consists of some filters works together for obtaining the relative weird (or primitive weird) number (or for short ω-number and ωp- number) to the real number 푥. The purpose of obtaining the is to use them (as a special case) for applying them in the Beurling zeta function in order to find a better lower and upper bounds. On the other hand, one could use the sequence of that weird numbers as secret keys for any security algorithm.

Keywords: Arithmetical Function, ω-Numbers, ωp-Numbers.

1. Introduction sequence of generalized (or Beurling) integers could be obtained. Therefore, these two sequences During the 3rd decade of the last century, Beurling (of Beurling primes, Beurling integers) called had introduced the generalized sequence of primes Beurling’s system. This work involves Beurling’s where every increasing (positive and infinite) manner to create a concrete filters for building a ∞ sequence of real's {푟푖}푖=1 with 푟푖 > 1 called sequence of ω-numbers as a special sequence Beurling (or generalized) primes. With the sense satisfies Beurling’s condition of generalized of the fundamental theorem of arithmetic, the primes. Hasan, S. S Journal of Global Scientific Research (ISSN: 2523-9376) Vol. 5 2020 597

The main goal of this work are, firstly use the some conditions the positive number 푚 mention sequence of ωp-numbers in the upper 푥 = 푐 ∏푖=1 푞푖 is ωp-number with c is a deficient bound of the county number of integers 풩푖(푥) = number such that ∇(푐) ≥ 1 and 푞1, … , 푞푚 are

∑푛∈푁 1 to see the behavior of (풩푖(푥) − 𝜌푥) how it primes. They addressed an algorithm to calculate looks like when 푥 takes ω-number values and goes all PA-numbers (see [4]). Define the function to infinity. On the other hand, the arithmetical 풢: 풮 → ℕ, where function 풢(푥) (for 푥 takes a large enough positive real values) prepares a ω-numbers and so one could 풮 = {푥| 푥휖{푥훼}훼≥1, 푤ℎ푒푟푒 1 < 푥1 ≤ 푥2 ≤ 푥3 ≤ ⋯ use them as a keys instead of primes in some and 푥훼 goes to ∞ as 훼 goes to ∞}. security algorithms which make the algorithm as The set of any real numbers belongs to a sequence strong as possible in security cases. 푥훼 satisfies the conditions of Beurling's prime Let 푛 be a belongs to ℕ, and 𝜎(푛) system (for more details see [5]). Here, 푥 belongs + to be the sum of of 푛. We refer to the to ℝ , where 푥 is greater than a positive number 푎 abundance of 푛 by ∆(푛) which represent the and 풢(푥) is a natural number. difference between 𝜎(푛) and 2푛, and to its Furthermore, we used a special case of generalized deficiency by ∇(푛) = −∆(푛) which represent the Chebyshev's 휓-function difference between 2푛 and 𝜎(푛). A natural number푛 is called an abundant if ∆(푛) greater 휓픷(푥) + 1 = 푓푙표푤(푥), than 1, whenever ∇(푛)greater than 1and if ∆(푛) = ∇(푛) = 0.A to construct an [6]: number 푛 which is abundant and can be expressed log 푥 as a sum of some or all of its distinct proper ∞ 풢(푥) = ∑푘=1 휇(푘) (휓픷 (푒 푘 ))...... (1) is called 풔풑-number (semiperfect). A ω- number (weird number) is an abundant and not 푠푝- Where the sum is finite (whenever푘 is sharply number.An 푛 is called 푷푨- log 2 −1 number (primitive abundant) if it is not a multiple greater than ( ) ). Also, 풢 it is a step function log 푥 of smaller abundant number. A ωp-number and increasing with jumps 1. Where this jump clear (primitive weird number) is a ω-number which is only when 푥 ≠ 푎푚, such that 푎, 푚 are integers and not a multiple of any smaller ω-number. greater than 1. In 1972, A ω-numbers was defined by Benkoski Note that, the function 흁(풌) is the Mӧbius [1]. Due to the rarity of these numbers, it is called function and the 풇풍풐풘(풙) is the integer part of 풙. by this name, for instance: There is only seven ω- numbers less than 10000. These numbers are This work shows the using of this step function to infinite. create an algorithm for obtaining a ω-numbers from a positive real's 푥.There are so many usage of In 1980, Pajunen [2] defined ωp-number. This type an infinite sequence of these ω-numbers. One of numbers have been studied by many authors 푟 could use these sequences which are satisfied the which is of the form 2 푞1푞2 where 푞1 and 푞2 are conditions of Beurling’s prime to apply it in the primes (for instance see [3]) and addressed the upper and lower bounds of Beurling zeta function. related properties. The other usage of that sequence is to obtain a Three years ago, a several authors have been secret key for modified algorithm, choosing 푥 to be worked on this and lately they showed that under a large real number (due to the rarity of ω- Hasan, S. S Journal of Global Scientific Research (ISSN: 2523-9376) Vol. 5 2020 598

numbers) and pass it through the filters to find a ω- cryptosystem. It presented in 1977 in the Scientific numbers from it. This work concentrated on American article written by Gardner [11]. It obtaining a sequence of ω-numbers for security invented by its inventors Rivest, Shamir and purposes. Adleman [12]. It has gained considerable importance since it has been used in Now turning our attention is to give a brief communications. It uses in the Transport Layer overview of the information security for needed Security (TLS) protocol and its predecessor, the concepts. Information security follows three basic Secure Sockets Layer (SSL) protocol, and elements, confidentiality, Integrity and availability. symmetric cryptosystem key distribution. Confidentiality prevents unauthorized people from seeing or using data. Integrity keeps data without The public key cryptosystem uses two keys, a change by unauthorized through a tracked. public key and a private key. The public key is free Availability regulars accessible to data when distributed and it is not secured. It generates by authorized users need it [7]. All these goals can sender. It uses by sender in encryption operation achieve using a cryptographic system. and produces a ciphertext. Private key uses by receiver for recovery original text from ciphertext. A cryptographic system is a process of safe data It is share by sender. Hacker is always attacked a from unwanted people for seeing or modification. public key to generate a private key. He benefits It’s a method to convert ordinary text into fromthe generation private key from a public key unintelligible and vice versa. There are three [12]. cryptographic techniques, symmetric key cryptosystem, hash function and public key The RSA has two keys, public key and private key. cryptosystem. In symmetric key cryptosystem, both The public key generates from a multiplication of sender and receiver use the same key for two large prime numbers. The private key number encrypting and decrypting a message so key must also generates from the same two prime numbers. be saved at sender and receiver. Hash function is So the problem of RSA factorizes the large one direction function and it is production fix number, whenever the large number factorizes, length hash value per plain text. It does not use a private key compromises. So that, power of key. Asymmetric key cryptosystem have two keys. encryption rises exponentially when large number The key is known called the public key and key is size is double or triple. secured called the private key. The public key uses to encrypting data and the private key for The main problem in RSA is factorize large decrypting [8]. A cryptographic system has two number. For any large enough real number there is phases encryption and decryption. Encryption is a a weird number less than it, so one can say that method to convert plaintext into ciphertext. there is a hidden large ω-numberin real number. A Decryption is a reverse of encryption. It’s recovery Large ω-number can be generated from a large original plain text. A cryptographic system enough real number using an arithmetical function includes algorithms, keys, and key management of Beurling’s primes: facilities. log 푥 ∞ 풢(푥) = ∑푘=1 휇(푘) (휓픷 (푒 푘 ))...... (1) The term public key cryptography appeared in the mid of 1970’s by Diffie and Hellman [9] and where 휓 is is the generalized (or Beurling) Merkle [10]. The best example in order to illustrate 픷 counting function of Beurling primes. this work is the applying the mention idea in RSA algorithm. The RSA is first public key Hasan, S. S Journal of Global Scientific Research (ISSN: 2523-9376) Vol. 5 2020 599

푛 ℓ Here, clearly (1) is a step function and has Let 푥 = 푐 ∏푖=1 푞푖 and 퓚 =∪푘=0 {푎 ∈ ℕ|푘푞푛 + 푟 increasing jumps with 1. This jumps only when 푥 ∏푗=1(푞̅푗 + 1) < 푎 < (푘 + 1)푞1}, is not of the form푎푚, where 푎, 푚 are integers and greater than 1 (see for more details [6]) then for all 푎 ∈ 퓚, 푎 cannot be expressible as a sum of distinct divisors of 푥. 2. Filters of Creating the ω-Numbers Proof: Clearly the set 퓚 is not empty. Let 푘 ≤ ℓ and ωp-Numbers and let 푎 belongs to 풦 and assume the contrary This section gives filters for creating the ω-number such that can be expressible as a sum of distinct and ωp-number by using the arithmetical function divisors of 푥. As 풢in order to use them for building an algorithm to 2 enumerate these numbers. 푎 < 푞1 .

Lemma 2.1 Define the step function for any 푥 So these divisors take one of two forms 푞̅푞1 or 푞̅ belongs to 풮 as follows: with 푞̅|푐 and 푞̅ belongs to the set {푞̅1, 푞̅̅2̅, … , 푞̅̅푟̅}.

푁 푀 푀 휃풢(푥) For 푎 = ∑푗=1 푞̅푗푞1 + ∑푖=1 푞̃푖 where {푞̃푖}푖=1 is the 풢1(푥) = (풢(푥)) set of distinct divisors of 푐. So Where the characteristic function 푀 푁 푟

1 𝑖푓풢(푥) = 푎. 푏 푎, 푏 > 1 𝑖푛 ℕ ∑ 푞̃푖 = 푎 − ∑ 푞̅푗푞1 > 푎 − 푘푞푛 > ∏(푞̅푗 + 1) 휃 = { 풢(푥) 0 𝑖푓풢(푥) ≠ 푎. 푏 푎, 푏 > 1 𝑖푛 ℕ 푖=1 푗=1 푗=1

Then풢1(푥)is either natural or equal zero. The proof This is a contradiction with the conditions in풦. is obvious. Therefore, there is no elements in 풦 can be expressed as a sum of distinct divisors of 푥. Corollary 2.2 For any 푥 belongs to 풮 greater than 푎. Let Corollary 2.4 Let

( ) 1 𝑖푓 Δ(풢 (푥)) ∈ 풦 1 𝑖푓∆(풢1 푥 ) > 1 휇 = { 2 풢2(푥) 0 𝑖푓 ∆(풢 (푥)) ∉ 풦 휗풢1(푥) = { 2 0 𝑖푓∆(풢1(푥)) ≤ 1 define the step function for any 푥 belongs to 풮 as define follows:

휗풢 (푥) 휇풢2(푥) 풢2(푥) = (풢1(푥)) 1 풢3(푥) = (풢2(푥))

Then 풢2(푥) is either abundant number or zero. Then 풢3(푥) is either ω-number or zero.

푟 Proposition 2.3 Let 푐 = ∏푗=1 푞̅푗 such that For more specific case talking about ωp-number: ∆(푐) ≤ −1 (푐 to be deficient number) and 푛 푛 Proposition 2.5 Let 풢4 be a step function defined greater than 1. Let {푞푖}푖=1 be an increasing for each푥 belongs to 풮 greater than 푎 as follows: sequence of prime numbers such that 푞1 is greater 푟 than ∏푗=1(푞̅푗 + 1). Let 휏풢 (푥) 풢4(푥) = (풢3(푥)) 3

푞 −∏푟 (푞̅ +1) ℓ = 푓푙표푤 ( 1 푗=1 푗 ). 푞푛−푞1 Hasan, S. S Journal of Global Scientific Research (ISSN: 2523-9376) Vol. 5 2020 600

Where 10. } 11. Else 푘 12. Return false. //not ω-number

1 𝑖푓 풢 (푥) = ∏ 푞 푤ℎ푒푟푒 4 푖 13. End 푖=1 푟

∆ (∏ 푞푖) < 0 푓표푟 푎푙푙 푟 < 푘 푖=1 4. Conclusion

휏풢3(푥) = 푘 This work inform us that any sequence of ωp- 0 𝑖푓풢4(푥) ≠ ∏ 푞푖 푤ℎ푒푟푒 numbers must be of the form ∏푘 푞 .This enable 푖=1 푖=1 푖 푟 us to the possibility of finding a sequence of odd ∆ (∏ 푞푖) < 0 푓표푟 푎푙푙 푟 < 푘 ω-numbers and ωp-numbers by applying the given 푖=1 { } theoretical part of this work. As a future work one can complete the steps of the algorithm using the

Then 풢4(푥) is either ωp-number or zero. filters given in proposition (2.5) to obtain ωp- numbers. Proof: see [13]. 5. References 3. Proposed Methods [1] Benkoski S. J., and Krdö.s P. (1974). On Weird The suggestion method consists from number two and Pseudoperfect Numbers, mathematics of main steps, first, generation natural number from computation, 28(126): 617-623. real number using the arithmetical function and [2] Pajunen, S. (1980). On primitive weird second ω-number generation from natural number. numbers, MRFS: A Collection of Manuscripts General algorithm describes in algorithm (1). In Related to the Fibonacci Sequence (18th addition, the outcome of the following algorithm Anniversary Volume), V. Hoggat, ed., depends on the ability of the computer that used for Fibonacci Association;162–166. obtaining a ω-numbers. [3] Iannucci, D.E. (2015). On primitive weird numbers of the form 2kpq, Algorithm (1) ω-Numbers Test arXiv:1504.02761v1. [4] Amato, G., Hasler, M., Melfi, G., Parton, M. Input: Big Integer number (Nbig), Divisor set (2019). Primitive abundant and weird numbers (Divset), Summation (Sum). with many prime factors, Journal of Number

Output Boolean Theory 201:436–459. [5] Beurling, A. (1937). Analyse de la Begin loiasymptotique de la distribution des nombres premiers generalizes, I, Acta Math., 68:255–

1. Nbig------read() 291.

2. Divset< ------Divisor (Nbig) [6] Al-Maamori, F. (2016). Hadi, A. K., AL-Salih,

3. Sum < ------Summation(Divset) A., Building the Primes p and q (of the Public

4. If Sum greater than Nbigthen Key Algorithm) By using Function of Real's, 5. { research Journal of Applied

6. If SumProblemTest(divset) then Sciences,11(10):1050-1053. 7. Return false. //not ω-number [7] Forouzan, B.A. (2010). Cryptography and 8. Else Network Security, Tata McGraw Hill Education 9. Return true. // ω-number. Private Limited, New York. Hasan, S. S Journal of Global Scientific Research (ISSN: 2523-9376) Vol. 5 2020 601

[8] Stallings, W., Cryptography and Network [12] Rivest, R.L., Shamir, A. and Adleman, L. Security: Principles and Practice. 6 Edition, (1978). A Method for Obtaining Digital Pearson, Boston (2013). Signatures and Public-key Cryptosystems, [9] Diffie, W., and M. Hellman 1976. New Communications of the ACM, 21:120-126. directions in cryptography. IEEETrans. Inform. [13] Sarah Sh. H., Al-Maamori, F. (2019). A Further

Theory IT-22: 644–654. Restricting the Gap Between (N픷 − τx) and [10] Merkle, R. C. (1978). Secure communications (N − τx) on R.H. By Using The Sense of ω-

over insecure channels. Communications of the numbers and ωp-numbers. Jour of Adv Research ACM, 294–299. in Dynamical & Control Systems, Vol. 11, 05- [11] Gardner, M. (1977). A new kind of cipher that Special Issue. would take millions of yearsto break, Scientific American, 237:120–124.