On Generating Prime Numbers Efficiently
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
X9.80–2005 Prime Number Generation, Primality Testing, and Primality Certificates
This is a preview of "ANSI X9.80:2005". Click here to purchase the full version from the ANSI store. American National Standard for Financial Services X9.80–2005 Prime Number Generation, Primality Testing, and Primality Certificates Accredited Standards Committee X9, Incorporated Financial Industry Standards Date Approved: August 15, 2005 American National Standards Institute American National Standards, Technical Reports and Guides developed through the Accredited Standards Committee X9, Inc., are copyrighted. Copying these documents for personal or commercial use outside X9 membership agreements is prohibited without express written permission of the Accredited Standards Committee X9, Inc. For additional information please contact ASC X9, Inc., P.O. Box 4035, Annapolis, Maryland 21403. This is a preview of "ANSI X9.80:2005". Click here to purchase the full version from the ANSI store. ANS X9.80–2005 Foreword Approval of an American National Standard requires verification by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made toward their resolution. The use of American National Standards is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. -
An Analysis of Primality Testing and Its Use in Cryptographic Applications
An Analysis of Primality Testing and Its Use in Cryptographic Applications Jake Massimo Thesis submitted to the University of London for the degree of Doctor of Philosophy Information Security Group Department of Information Security Royal Holloway, University of London 2020 Declaration These doctoral studies were conducted under the supervision of Prof. Kenneth G. Paterson. The work presented in this thesis is the result of original research carried out by myself, in collaboration with others, whilst enrolled in the Department of Mathe- matics as a candidate for the degree of Doctor of Philosophy. This work has not been submitted for any other degree or award in any other university or educational establishment. Jake Massimo April, 2020 2 Abstract Due to their fundamental utility within cryptography, prime numbers must be easy to both recognise and generate. For this, we depend upon primality testing. Both used as a tool to validate prime parameters, or as part of the algorithm used to generate random prime numbers, primality tests are found near universally within a cryptographer's tool-kit. In this thesis, we study in depth primality tests and their use in cryptographic applications. We first provide a systematic analysis of the implementation landscape of primality testing within cryptographic libraries and mathematical software. We then demon- strate how these tests perform under adversarial conditions, where the numbers being tested are not generated randomly, but instead by a possibly malicious party. We show that many of the libraries studied provide primality tests that are not pre- pared for testing on adversarial input, and therefore can declare composite numbers as being prime with a high probability. -
[Math.NT] 10 May 2005
Journal de Th´eorie des Nombres de Bordeaux 00 (XXXX), 000–000 Restriction theory of the Selberg sieve, with applications par Ben GREEN et Terence TAO Resum´ e.´ Le crible de Selberg fournit des majorants pour cer- taines suites arithm´etiques, comme les nombres premiers et les nombres premiers jumeaux. Nous demontrons un th´eor`eme de restriction L2-Lp pour les majorants de ce type. Comme ap- plication imm´ediate, nous consid´erons l’estimation des sommes exponentielles sur les k-uplets premiers. Soient les entiers posi- tifs a1,...,ak et b1,...,bk. Ecrit h(θ) := n∈X e(nθ), ou X est l’ensemble de tous n 6 N tel que tousP les nombres a1n + b1,...,akn+bk sont premiers. Nous obtenons les bornes sup´erieures pour h p T , p > 2, qui sont (en supposant la v´erit´ede la con- k kL ( ) jecture de Hardy et Littlewood sur les k-uplets premiers) d’ordre de magnitude correct. Une autre application est la suivante. En utilisant les th´eor`emes de Chen et de Roth et un «principe de transf´erence », nous demontrons qu’il existe une infinit´ede suites arithm´etiques p1 < p2 < p3 de nombres premiers, telles que cha- cun pi + 2 est premier ou un produit de deux nombres premier. Abstract. The Selberg sieve provides majorants for certain arith- metic sequences, such as the primes and the twin primes. We prove an L2–Lp restriction theorem for majorants of this type. An im- mediate application is to the estimation of exponential sums over prime k-tuples. -
On Sufficient Conditions for the Existence of Twin Values in Sieves
On Sufficient Conditions for the Existence of Twin Values in Sieves over the Natural Numbers by Luke Szramowski Submitted in Partial Fulfillment of the Requirements For the Degree of Masters of Science in the Mathematics Program Youngstown State University May, 2020 On Sufficient Conditions for the Existence of Twin Values in Sieves over the Natural Numbers Luke Szramowski I hereby release this thesis to the public. I understand that this thesis will be made available from the OhioLINK ETD Center and the Maag Library Circulation Desk for public access. I also authorize the University or other individuals to make copies of this thesis as needed for scholarly research. Signature: Luke Szramowski, Student Date Approvals: Dr. Eric Wingler, Thesis Advisor Date Dr. Thomas Wakefield, Committee Member Date Dr. Thomas Madsen, Committee Member Date Dr. Salvador A. Sanders, Dean of Graduate Studies Date Abstract For many years, a major question in sieve theory has been determining whether or not a sieve produces infinitely many values which are exactly two apart. In this paper, we will discuss a new result in sieve theory, which will give sufficient conditions for the existence of values which are exactly two apart. We will also show a direct application of this theorem on an existing sieve as well as detailing attempts to apply the theorem to the Sieve of Eratosthenes. iii Contents 1 Introduction 1 2 Preliminary Material 1 3 Sieves 5 3.1 The Sieve of Eratosthenes . 5 3.2 The Block Sieve . 9 3.3 The Finite Block Sieve . 12 3.4 The Sieve of Joseph Flavius . -
Arxiv:1503.02592V1
MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 S 0025-5718(XX)0000-0 TWO COMPACT INCREMENTAL PRIME SIEVES JONATHAN P. SORENSON Abstract. A prime sieve is an algorithm that finds the primes up to a bound n. We say that a prime sieve is incremental, if it can quickly determine if n+1 is prime after having found all primes up to n. We say a sieve is compact if it uses roughly √n space or less. In this paper we present two new results: We describe the rolling sieve, a practical, incremental prime sieve that • takes O(n log log n) time and O(√n log n) bits of space, and We show how to modify the sieve of Atkin and Bernstein [1] to obtain a • sieve that is simultaneously sublinear, compact, and incremental. The second result solves an open problem given by Paul Pritchard in 1994 [19]. 1. Introduction and Definitions A prime sieve is an algorithm that finds all prime numbers up to a given bound n. The fastest known algorithms, including Pritchard’s wheel sieve [16] and the Atkin- Bernstein sieve [1], can do this using at most O(n/ log log n) arithmetic operations. The easy-to-code sieve of Eratosthenes requires O(n log log n) time, and there are a number of sieves in the literature that require linear time [17, 18]. Normally, running time is the main concern in algorithm design, but in this paper we are also interested in two other properties: incrementality and compactness. We say that a sieve is compact if it uses at most n1/2+o(1) space. -
Sieve Algorithms for the Discrete Logarithm in Medium Characteristic Finite Fields Laurent Grémy
Sieve algorithms for the discrete logarithm in medium characteristic finite fields Laurent Grémy To cite this version: Laurent Grémy. Sieve algorithms for the discrete logarithm in medium characteristic finite fields. Cryptography and Security [cs.CR]. Université de Lorraine, 2017. English. NNT : 2017LORR0141. tel-01647623 HAL Id: tel-01647623 https://tel.archives-ouvertes.fr/tel-01647623 Submitted on 24 Nov 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. AVERTISSEMENT Ce document est le fruit d'un long travail approuvé par le jury de soutenance et mis à disposition de l'ensemble de la communauté universitaire élargie. Il est soumis à la propriété intellectuelle de l'auteur. Ceci implique une obligation de citation et de référencement lors de l’utilisation de ce document. D'autre part, toute contrefaçon, plagiat, reproduction illicite encourt une poursuite pénale. Contact : [email protected] LIENS Code de la Propriété Intellectuelle. articles L 122. 4 Code de la Propriété Intellectuelle. articles L 335.2- L 335.10 http://www.cfcopies.com/V2/leg/leg_droi.php -
Golden Oaks Software
New Method to Find Primes GOLDEN OAKS SOFTWARE Description of a New Method to Find Primes Golden Oaks Software 7524 Soquel Way Citrus Heights, CA 95610 Dr. Joe Butler [email protected] (916) 220 1654 30 September 2008 Copyright Date: Oct 06, 2008 Patent Date: Oct 08, 2008 Number: 61195490 PROPRIETARY STATEMENT This document contains commercial or financial information, or trade secrets, of Golden Oaks Software, which are proprietary and exempt from disclosure to the public under the Freedom of Information Act, 5 U.S.C. 552(b)(4), and unlawful disclosure thereof is a violation of the Trade Secrets Act, 18 U.S.C. 1905. Public disclosure of any such information or trade secrets shall not be made without the written permission of Golden Oaks Software. This document includes data that shall not be disclosed outside the Government and shall not be duplicated, used or disclosed, in whole or in part, for any purposes other than to evaluate the information. If however, a contract is awarded to this offeror as a result of, or in conjunction with, the submission of this data, the Government shall have the right to duplicate, use, or disclose, the data to the extent provided in the resulting contract. The restriction does not limit the Government’s right to use information contained in this data if it is obtained from other sources without restriction. The data subject to this restriction is contained in all sheets. primefnd.doc 1 11/22/2008 COPYRIGHT & PATENTED New Method to Find Primes ABSTRACT The following are documents and word description flowcharts of a new method to find prime numbers. -
Sieve Theory and Small Gaps Between Primes: Introduction
Sieve theory and small gaps between primes: Introduction Andrew V. Sutherland MASSACHUSETTS INSTITUTE OF TECHNOLOGY (on behalf of D.H.J. Polymath) Explicit Methods in Number Theory MATHEMATISCHES FORSCHUNGSINSTITUT OBERWOLFACH July 6, 2015 A quick historical overview pn+m − pn ∆m := lim inf Hm := lim inf (pn+m − pn) n!1 log pn n!1 Twin Prime Conjecture: H1 = 2 Prime Tuples Conjecture: Hm ∼ m log m 1896 Hadamard–Vallee´ Poussin ∆1 ≤ 1 1926 Hardy–Littlewood ∆1 ≤ 2=3 under GRH 1940 Rankin ∆1 ≤ 3=5 under GRH 1940 Erdos˝ ∆1 < 1 1956 Ricci ∆1 ≤ 15=16 1965 Bombieri–Davenport ∆1 ≤ 1=2, ∆m ≤ m − 1=2 ········· 1988 Maier ∆1 < 0:2485. 2005 Goldston-Pintz-Yıldırım ∆1 = 0, ∆m ≤ m − 1, EH ) H1 ≤ 16 2013 Zhang H1 < 70; 000; 000 2013 Polymath 8a H1 ≤ 4680 3 4m 2013 Maynard-Tao H1 ≤ 600, Hm m e , EH ) H1 ≤ 12 3:815m 2014 Polymath 8b H1 ≤ 246, Hm e , GEH ) H1 ≤ 6 H2 ≤ 398; 130, H3 ≤ 24; 797; 814,... The prime number theorem in arithmetic progressions Define the weighted prime counting functions1 X X Θ(x) := log p; Θ(x; q; a) := log p: prime p ≤ x prime p ≤ x p ≡ a mod q Then Θ(x) ∼ x (the prime number theorem), and for a ? q, x Θ(x; q; a) ∼ : φ(q) We are interested in the discrepancy between these two quantities. −x x x Clearly φ(q) ≤ Θ(x; q; a) − φ(q) ≤ q + 1 log x, and for any Q < x, X x X 2x log x x max Θ(x; q; a) − ≤ + x(log x)2: a?q φ(q) q φ(q) q ≤ Q q≤Q 1 P One can also use (x) := n≤x Λ(n), where Λ(n) is the von Mangoldt function. -
Explicit Counting of Ideals and a Brun-Titchmarsh Inequality for The
EXPLICIT COUNTING OF IDEALS AND A BRUN-TITCHMARSH INEQUALITY FOR THE CHEBOTAREV DENSITY THEOREM KORNEEL DEBAENE Abstract. We prove a bound on the number of primes with a given split- ting behaviour in a given field extension. This bound generalises the Brun- Titchmarsh bound on the number of primes in an arithmetic progression. The proof is set up as an application of Selberg’s Sieve in number fields. The main new ingredient is an explicit counting result estimating the number of integral elements with certain properties up to multiplication by units. As a conse- quence of this result, we deduce an explicit estimate for the number of ideals of norm up to x. 1. Introduction and statement of results Let q and a be coprime integers, and let π(x,q,a) be the number of primes not exceeding x which are congruent to a mod q. It is well known that for fixed q, π(x,q,a) 1 lim = . x→∞ π(x) φ(q) A major drawback of this result is the lack of an effective error term, and hence the impossibility to let q tend to infinity with x. The Brun-Titchmarsh inequality remedies the situation, if one is willing to accept a less precise relation in return for an effective range of q. It states that 2 x π(x,q,a) , for any x q. ≤ φ(q) log x/q ≥ While originally proven with 2 + ε in place of 2, the above formulation was proven by Montgomery and Vaughan [16] in 1973. Further improvement on this constant seems out of reach, indeed, if one could prove that the inequality holds with 2 δ arXiv:1611.10103v2 [math.NT] 9 Mar 2017 in place of 2, for any positive δ, one could deduce from this that there are no Siegel− 1 zeros. -
An Introduction to Sieve Methods and Their Applications Alina Carmen Cojocaru , M
Cambridge University Press 978-0-521-84816-9 — An Introduction to Sieve Methods and Their Applications Alina Carmen Cojocaru , M. Ram Murty Frontmatter More Information An Introduction to Sieve Methods and Their Applications © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-84816-9 — An Introduction to Sieve Methods and Their Applications Alina Carmen Cojocaru , M. Ram Murty Frontmatter More Information LONDON MATHEMATICAL SOCIETY STUDENT TEXTS Managing editor: Professor J. W. Bruce, Department of Mathematics, University of Hull, UK 3 Local fields, J. W. S. CASSELS 4 An introduction to twistor theory: Second edition, S. A. HUGGETT & K. P. TOD 5 Introduction to general relativity, L. P. HUGHSTON & K. P. TOD 8 Summing and nuclear norms in Banach space theory, G. J. O. JAMESON 9 Automorphisms of surfaces after Nielsen and Thurston, A. CASSON & S. BLEILER 11 Spacetime and singularities, G. NABER 12 Undergraduate algebraic geometry, MILES REID 13 An introduction to Hankel operators, J. R. PARTINGTON 15 Presentations of groups: Second edition, D. L. JOHNSON 17 Aspects of quantum field theory in curved spacetime, S. A. FULLING 18 Braids and coverings: selected topics, VAGN LUNDSGAARD HANSEN 20 Communication theory, C. M. GOLDIE & R. G. E. PINCH 21 Representations of finite groups of Lie type, FRANCOIS DIGNE & JEAN MICHEL 22 Designs, graphs, codes, and their links, P. J. CAMERON & J. H. VAN LINT 23 Complex algebraic curves, FRANCES KIRWAN 24 Lectures on elliptic curves, J. W. S CASSELS 26 An introduction to the theory of L-functions and Eisenstein series, H. HIDA 27 Hilbert Space: compact operators and the trace theorem, J. -
Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions
SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS By ADNAN AHMED MEMON Bachelor of Engineering in Telecommunication Sukkur Institute of Business Administration Sukkur, Sindh, Pakistan 2012 Submitted to the Faculty of the Graduate College of the Oklahoma State University in partial fulfillment of the requirements for the Degree of MASTER OF SCIENCE July, 2017 SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS Thesis Approved: Dr. Subhash C. Kak Thesis Adviser Dr. Qi Cheng Dr. Yanmin (Emily) Gong ii ACKNOWLEDGEMENTS Foremost, I would like to thank Almighty Allah for bestowing upon me His countless blessings, giving me strength and good health to finish this research. It is a great pleasure to acknowledge my deepest thanks to Prof. Subhash Kak, Regents Professor, School of Electrical and Computer Engineering, Oklahoma State University, Stillwater, OK, USA, whose consistent supervision and motivation enabled me to complete this research successfully. I would like to thank my family, especially my Mom for encouraging and supporting me during this whole thesis period. Thank you friends for being with me in difficult times. I would like to thank my sponsors i.e. Fulbright, IIE and USEFP for providing me fully funded scholarship so that I could focus on my research. This would not have been possible without their support. I would like to dedicate this research to my (late) father Mr. Ghulam Sarwar Memon who has always been a role model for me. iii Acknowledgements reflect the views of the author and are not endorsed by committee members or Oklahoma State University. Name: ADNAN AHMED MEMON Date of Degree: JULY, 2017 Title of Study: SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS Major Field: ELECTRICAL ENGINEERING Abstract: This thesis investigates the use of Goldbach partitions for secure communication protocols and for finding large prime numbers that are fundamental to these protocols. -
The I/O Complexity of Computing Prime Tables 1 Introduction
The I/O Complexity of Computing Prime Tables Michael A. Bender1, Rezaul Chowdhury1, Alex Conway2, Mart´ın Farach-Colton2, Pramod Ganapathi1, Rob Johnson1, Samuel McCauley1, Bertrand Simon3, and Shikha Singh1 1 Stony Brook University, Stony Brook, NY 11794-2424, USA. fbender,rezaul,pganapathi,rob,smccauley,shiksinghg @cs.stonybrook.edu 2 Rutgers University, Piscataway, NJ 08854, USA. ffarach,[email protected] 3 LIP, ENS de Lyon, 46 allee´ d’Italie, Lyon, France. [email protected] Abstract. We revisit classical sieves for computing primes and analyze their performance in the external-memory model. Most prior sieves are analyzed in the RAM model, where the focus is on minimizing both the total number of operations and the size of the working set. The hope is that if the working set fits in RAM, then the sieve will have good I/O performance, though such an outcome is by no means guaranteed by a small working-set size. We analyze our algorithms directly in terms of I/Os and operations. In the external- memory model, permutation can be the most expensive aspect of sieving, in contrast to the RAM model, where permutations are trivial. We show how to implement classical sieves so that they have both good I/O performance and good RAM performance, even when the problem size N becomes huge—even superpolynomially larger than RAM. Towards this goal, we give two I/O-efficient priority queues that are optimized for the operations incurred by these sieves. Keywords: External-Memory Algorithms, Prime Tables, Sorting, Priority Queues 1 Introduction According to Fox News [21], “Prime numbers, which are divisible only by themselves and one, have little mathematical importance.