Implementation of the Aks Primality Testing Algorithm
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
[Math.NT] 10 May 2005
Journal de Th´eorie des Nombres de Bordeaux 00 (XXXX), 000–000 Restriction theory of the Selberg sieve, with applications par Ben GREEN et Terence TAO Resum´ e.´ Le crible de Selberg fournit des majorants pour cer- taines suites arithm´etiques, comme les nombres premiers et les nombres premiers jumeaux. Nous demontrons un th´eor`eme de restriction L2-Lp pour les majorants de ce type. Comme ap- plication imm´ediate, nous consid´erons l’estimation des sommes exponentielles sur les k-uplets premiers. Soient les entiers posi- tifs a1,...,ak et b1,...,bk. Ecrit h(θ) := n∈X e(nθ), ou X est l’ensemble de tous n 6 N tel que tousP les nombres a1n + b1,...,akn+bk sont premiers. Nous obtenons les bornes sup´erieures pour h p T , p > 2, qui sont (en supposant la v´erit´ede la con- k kL ( ) jecture de Hardy et Littlewood sur les k-uplets premiers) d’ordre de magnitude correct. Une autre application est la suivante. En utilisant les th´eor`emes de Chen et de Roth et un «principe de transf´erence », nous demontrons qu’il existe une infinit´ede suites arithm´etiques p1 < p2 < p3 de nombres premiers, telles que cha- cun pi + 2 est premier ou un produit de deux nombres premier. Abstract. The Selberg sieve provides majorants for certain arith- metic sequences, such as the primes and the twin primes. We prove an L2–Lp restriction theorem for majorants of this type. An im- mediate application is to the estimation of exponential sums over prime k-tuples. -
On Sufficient Conditions for the Existence of Twin Values in Sieves
On Sufficient Conditions for the Existence of Twin Values in Sieves over the Natural Numbers by Luke Szramowski Submitted in Partial Fulfillment of the Requirements For the Degree of Masters of Science in the Mathematics Program Youngstown State University May, 2020 On Sufficient Conditions for the Existence of Twin Values in Sieves over the Natural Numbers Luke Szramowski I hereby release this thesis to the public. I understand that this thesis will be made available from the OhioLINK ETD Center and the Maag Library Circulation Desk for public access. I also authorize the University or other individuals to make copies of this thesis as needed for scholarly research. Signature: Luke Szramowski, Student Date Approvals: Dr. Eric Wingler, Thesis Advisor Date Dr. Thomas Wakefield, Committee Member Date Dr. Thomas Madsen, Committee Member Date Dr. Salvador A. Sanders, Dean of Graduate Studies Date Abstract For many years, a major question in sieve theory has been determining whether or not a sieve produces infinitely many values which are exactly two apart. In this paper, we will discuss a new result in sieve theory, which will give sufficient conditions for the existence of values which are exactly two apart. We will also show a direct application of this theorem on an existing sieve as well as detailing attempts to apply the theorem to the Sieve of Eratosthenes. iii Contents 1 Introduction 1 2 Preliminary Material 1 3 Sieves 5 3.1 The Sieve of Eratosthenes . 5 3.2 The Block Sieve . 9 3.3 The Finite Block Sieve . 12 3.4 The Sieve of Joseph Flavius . -
Arxiv:1503.02592V1
MATHEMATICS OF COMPUTATION Volume 00, Number 0, Pages 000–000 S 0025-5718(XX)0000-0 TWO COMPACT INCREMENTAL PRIME SIEVES JONATHAN P. SORENSON Abstract. A prime sieve is an algorithm that finds the primes up to a bound n. We say that a prime sieve is incremental, if it can quickly determine if n+1 is prime after having found all primes up to n. We say a sieve is compact if it uses roughly √n space or less. In this paper we present two new results: We describe the rolling sieve, a practical, incremental prime sieve that • takes O(n log log n) time and O(√n log n) bits of space, and We show how to modify the sieve of Atkin and Bernstein [1] to obtain a • sieve that is simultaneously sublinear, compact, and incremental. The second result solves an open problem given by Paul Pritchard in 1994 [19]. 1. Introduction and Definitions A prime sieve is an algorithm that finds all prime numbers up to a given bound n. The fastest known algorithms, including Pritchard’s wheel sieve [16] and the Atkin- Bernstein sieve [1], can do this using at most O(n/ log log n) arithmetic operations. The easy-to-code sieve of Eratosthenes requires O(n log log n) time, and there are a number of sieves in the literature that require linear time [17, 18]. Normally, running time is the main concern in algorithm design, but in this paper we are also interested in two other properties: incrementality and compactness. We say that a sieve is compact if it uses at most n1/2+o(1) space. -
Sieve Algorithms for the Discrete Logarithm in Medium Characteristic Finite Fields Laurent Grémy
Sieve algorithms for the discrete logarithm in medium characteristic finite fields Laurent Grémy To cite this version: Laurent Grémy. Sieve algorithms for the discrete logarithm in medium characteristic finite fields. Cryptography and Security [cs.CR]. Université de Lorraine, 2017. English. NNT : 2017LORR0141. tel-01647623 HAL Id: tel-01647623 https://tel.archives-ouvertes.fr/tel-01647623 Submitted on 24 Nov 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. AVERTISSEMENT Ce document est le fruit d'un long travail approuvé par le jury de soutenance et mis à disposition de l'ensemble de la communauté universitaire élargie. Il est soumis à la propriété intellectuelle de l'auteur. Ceci implique une obligation de citation et de référencement lors de l’utilisation de ce document. D'autre part, toute contrefaçon, plagiat, reproduction illicite encourt une poursuite pénale. Contact : [email protected] LIENS Code de la Propriété Intellectuelle. articles L 122. 4 Code de la Propriété Intellectuelle. articles L 335.2- L 335.10 http://www.cfcopies.com/V2/leg/leg_droi.php -
Golden Oaks Software
New Method to Find Primes GOLDEN OAKS SOFTWARE Description of a New Method to Find Primes Golden Oaks Software 7524 Soquel Way Citrus Heights, CA 95610 Dr. Joe Butler [email protected] (916) 220 1654 30 September 2008 Copyright Date: Oct 06, 2008 Patent Date: Oct 08, 2008 Number: 61195490 PROPRIETARY STATEMENT This document contains commercial or financial information, or trade secrets, of Golden Oaks Software, which are proprietary and exempt from disclosure to the public under the Freedom of Information Act, 5 U.S.C. 552(b)(4), and unlawful disclosure thereof is a violation of the Trade Secrets Act, 18 U.S.C. 1905. Public disclosure of any such information or trade secrets shall not be made without the written permission of Golden Oaks Software. This document includes data that shall not be disclosed outside the Government and shall not be duplicated, used or disclosed, in whole or in part, for any purposes other than to evaluate the information. If however, a contract is awarded to this offeror as a result of, or in conjunction with, the submission of this data, the Government shall have the right to duplicate, use, or disclose, the data to the extent provided in the resulting contract. The restriction does not limit the Government’s right to use information contained in this data if it is obtained from other sources without restriction. The data subject to this restriction is contained in all sheets. primefnd.doc 1 11/22/2008 COPYRIGHT & PATENTED New Method to Find Primes ABSTRACT The following are documents and word description flowcharts of a new method to find prime numbers. -
Sieve Theory and Small Gaps Between Primes: Introduction
Sieve theory and small gaps between primes: Introduction Andrew V. Sutherland MASSACHUSETTS INSTITUTE OF TECHNOLOGY (on behalf of D.H.J. Polymath) Explicit Methods in Number Theory MATHEMATISCHES FORSCHUNGSINSTITUT OBERWOLFACH July 6, 2015 A quick historical overview pn+m − pn ∆m := lim inf Hm := lim inf (pn+m − pn) n!1 log pn n!1 Twin Prime Conjecture: H1 = 2 Prime Tuples Conjecture: Hm ∼ m log m 1896 Hadamard–Vallee´ Poussin ∆1 ≤ 1 1926 Hardy–Littlewood ∆1 ≤ 2=3 under GRH 1940 Rankin ∆1 ≤ 3=5 under GRH 1940 Erdos˝ ∆1 < 1 1956 Ricci ∆1 ≤ 15=16 1965 Bombieri–Davenport ∆1 ≤ 1=2, ∆m ≤ m − 1=2 ········· 1988 Maier ∆1 < 0:2485. 2005 Goldston-Pintz-Yıldırım ∆1 = 0, ∆m ≤ m − 1, EH ) H1 ≤ 16 2013 Zhang H1 < 70; 000; 000 2013 Polymath 8a H1 ≤ 4680 3 4m 2013 Maynard-Tao H1 ≤ 600, Hm m e , EH ) H1 ≤ 12 3:815m 2014 Polymath 8b H1 ≤ 246, Hm e , GEH ) H1 ≤ 6 H2 ≤ 398; 130, H3 ≤ 24; 797; 814,... The prime number theorem in arithmetic progressions Define the weighted prime counting functions1 X X Θ(x) := log p; Θ(x; q; a) := log p: prime p ≤ x prime p ≤ x p ≡ a mod q Then Θ(x) ∼ x (the prime number theorem), and for a ? q, x Θ(x; q; a) ∼ : φ(q) We are interested in the discrepancy between these two quantities. −x x x Clearly φ(q) ≤ Θ(x; q; a) − φ(q) ≤ q + 1 log x, and for any Q < x, X x X 2x log x x max Θ(x; q; a) − ≤ + x(log x)2: a?q φ(q) q φ(q) q ≤ Q q≤Q 1 P One can also use (x) := n≤x Λ(n), where Λ(n) is the von Mangoldt function. -
Explicit Counting of Ideals and a Brun-Titchmarsh Inequality for The
EXPLICIT COUNTING OF IDEALS AND A BRUN-TITCHMARSH INEQUALITY FOR THE CHEBOTAREV DENSITY THEOREM KORNEEL DEBAENE Abstract. We prove a bound on the number of primes with a given split- ting behaviour in a given field extension. This bound generalises the Brun- Titchmarsh bound on the number of primes in an arithmetic progression. The proof is set up as an application of Selberg’s Sieve in number fields. The main new ingredient is an explicit counting result estimating the number of integral elements with certain properties up to multiplication by units. As a conse- quence of this result, we deduce an explicit estimate for the number of ideals of norm up to x. 1. Introduction and statement of results Let q and a be coprime integers, and let π(x,q,a) be the number of primes not exceeding x which are congruent to a mod q. It is well known that for fixed q, π(x,q,a) 1 lim = . x→∞ π(x) φ(q) A major drawback of this result is the lack of an effective error term, and hence the impossibility to let q tend to infinity with x. The Brun-Titchmarsh inequality remedies the situation, if one is willing to accept a less precise relation in return for an effective range of q. It states that 2 x π(x,q,a) , for any x q. ≤ φ(q) log x/q ≥ While originally proven with 2 + ε in place of 2, the above formulation was proven by Montgomery and Vaughan [16] in 1973. Further improvement on this constant seems out of reach, indeed, if one could prove that the inequality holds with 2 δ arXiv:1611.10103v2 [math.NT] 9 Mar 2017 in place of 2, for any positive δ, one could deduce from this that there are no Siegel− 1 zeros. -
An Introduction to Sieve Methods and Their Applications Alina Carmen Cojocaru , M
Cambridge University Press 978-0-521-84816-9 — An Introduction to Sieve Methods and Their Applications Alina Carmen Cojocaru , M. Ram Murty Frontmatter More Information An Introduction to Sieve Methods and Their Applications © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-84816-9 — An Introduction to Sieve Methods and Their Applications Alina Carmen Cojocaru , M. Ram Murty Frontmatter More Information LONDON MATHEMATICAL SOCIETY STUDENT TEXTS Managing editor: Professor J. W. Bruce, Department of Mathematics, University of Hull, UK 3 Local fields, J. W. S. CASSELS 4 An introduction to twistor theory: Second edition, S. A. HUGGETT & K. P. TOD 5 Introduction to general relativity, L. P. HUGHSTON & K. P. TOD 8 Summing and nuclear norms in Banach space theory, G. J. O. JAMESON 9 Automorphisms of surfaces after Nielsen and Thurston, A. CASSON & S. BLEILER 11 Spacetime and singularities, G. NABER 12 Undergraduate algebraic geometry, MILES REID 13 An introduction to Hankel operators, J. R. PARTINGTON 15 Presentations of groups: Second edition, D. L. JOHNSON 17 Aspects of quantum field theory in curved spacetime, S. A. FULLING 18 Braids and coverings: selected topics, VAGN LUNDSGAARD HANSEN 20 Communication theory, C. M. GOLDIE & R. G. E. PINCH 21 Representations of finite groups of Lie type, FRANCOIS DIGNE & JEAN MICHEL 22 Designs, graphs, codes, and their links, P. J. CAMERON & J. H. VAN LINT 23 Complex algebraic curves, FRANCES KIRWAN 24 Lectures on elliptic curves, J. W. S CASSELS 26 An introduction to the theory of L-functions and Eisenstein series, H. HIDA 27 Hilbert Space: compact operators and the trace theorem, J. -
Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions
SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS By ADNAN AHMED MEMON Bachelor of Engineering in Telecommunication Sukkur Institute of Business Administration Sukkur, Sindh, Pakistan 2012 Submitted to the Faculty of the Graduate College of the Oklahoma State University in partial fulfillment of the requirements for the Degree of MASTER OF SCIENCE July, 2017 SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS Thesis Approved: Dr. Subhash C. Kak Thesis Adviser Dr. Qi Cheng Dr. Yanmin (Emily) Gong ii ACKNOWLEDGEMENTS Foremost, I would like to thank Almighty Allah for bestowing upon me His countless blessings, giving me strength and good health to finish this research. It is a great pleasure to acknowledge my deepest thanks to Prof. Subhash Kak, Regents Professor, School of Electrical and Computer Engineering, Oklahoma State University, Stillwater, OK, USA, whose consistent supervision and motivation enabled me to complete this research successfully. I would like to thank my family, especially my Mom for encouraging and supporting me during this whole thesis period. Thank you friends for being with me in difficult times. I would like to thank my sponsors i.e. Fulbright, IIE and USEFP for providing me fully funded scholarship so that I could focus on my research. This would not have been possible without their support. I would like to dedicate this research to my (late) father Mr. Ghulam Sarwar Memon who has always been a role model for me. iii Acknowledgements reflect the views of the author and are not endorsed by committee members or Oklahoma State University. Name: ADNAN AHMED MEMON Date of Degree: JULY, 2017 Title of Study: SECURE COMMUNICATION PROTOCOLS, SECRET SHARING AND AUTHENTICATION BASED ON GOLDBACH PARTITIONS Major Field: ELECTRICAL ENGINEERING Abstract: This thesis investigates the use of Goldbach partitions for secure communication protocols and for finding large prime numbers that are fundamental to these protocols. -
A Potentially Fast Primality Test
A Potentially Fast Primality Test Tsz-Wo Sze February 20, 2007 1 Introduction In 2002, Agrawal, Kayal and Saxena [3] gave the ¯rst deterministic, polynomial- time primality testing algorithm. The main step was the following. Theorem 1.1. (AKS) Given an integer n > 1, let r be an integer such that 2 ordr(n) > log n. Suppose p (x + a)n ´ xn + a (mod n; xr ¡ 1) for a = 1; ¢ ¢ ¢ ; b Á(r) log nc: (1.1) Then, n has a prime factor · r or n is a prime power. The running time is O(r1:5 log3 n). It can be shown by elementary means that the required r exists in O(log5 n). So the running time is O(log10:5 n). Moreover, by Fouvry's Theorem [8], such r exists in O(log3 n), so the running time becomes O(log7:5 n). In [10], Lenstra and Pomerance showed that the AKS primality test can be improved by replacing the polynomial xr ¡ 1 in equation (1.1) with a specially constructed polynomial f(x), so that the degree of f(x) is O(log2 n). The overall running time of their algorithm is O(log6 n). With an extra input integer a, Berrizbeitia [6] has provided a deterministic primality test with time complexity 2¡ min(k;b2 log log nc)O(log6 n), where 2kjjn¡1 if n ´ 1 (mod 4) and 2kjjn + 1 if n ´ 3 (mod 4). If k ¸ b2 log log nc, this algorithm runs in O(log4 n). The algorithm is also a modi¯cation of AKS by verifying the congruent equation s (1 + mx)n ´ 1 + mxn (mod n; x2 ¡ a) for a ¯xed s and some clever choices of m¡ .¢ The main drawback of this algorithm¡ ¢ is that it requires the Jacobi symbol a = ¡1 if n ´ 1 (mod 4) and a = ¡ ¢ n n 1¡a n = ¡1 if n ´ 3 (mod 4). -
A Friendly Intro to Sieves with a Look Towards Recent Progress on the Twin Primes Conjecture
A FRIENDLY INTRO TO SIEVES WITH A LOOK TOWARDS RECENT PROGRESS ON THE TWIN PRIMES CONJECTURE DAVID LOWRY-DUDA This is an extension and background to a talk I gave on 9 October 2013 to the Brown Graduate Student Seminar, called `A friendly intro to sieves with a look towards recent progress on the twin primes conjecture.' During the talk, I mention several sieves, some with a lot of detail and some with very little detail. I also discuss several results and built upon many sources. I'll provide missing details and/or sources for additional reading here. Furthermore, I like this talk, so I think it's worth preserving. 1. Introduction We talk about sieves and primes. Long, long ago, Euclid famously proved the in- finitude of primes (≈ 300 B.C.). Although he didn't show it, the stronger statement that the sum of the reciprocals of the primes diverges is true: X 1 ! 1; p p where the sum is over primes. Proof. Suppose that the sum converged. Then there is some k such that 1 X 1 1 < : pi 2 i=k+1 Qk Suppose that Q := i=1 pi is the product of the primes up to pk. Then the integers 1 + Qn are relatively prime to the primes in Q, and so are only made up of the primes pk+1;:::. This means that 1 !t X 1 X X 1 ≤ < 2; 1 + Qn pi n=1 t≥0 i>k where the first inequality is true since all the terms on the left appear in the middle (think prime factorizations and the distributive law), and the second inequality is true because it's bounded by the geometric series with ratio 1=2. -
The I/O Complexity of Computing Prime Tables 1 Introduction
The I/O Complexity of Computing Prime Tables Michael A. Bender1, Rezaul Chowdhury1, Alex Conway2, Mart´ın Farach-Colton2, Pramod Ganapathi1, Rob Johnson1, Samuel McCauley1, Bertrand Simon3, and Shikha Singh1 1 Stony Brook University, Stony Brook, NY 11794-2424, USA. fbender,rezaul,pganapathi,rob,smccauley,shiksinghg @cs.stonybrook.edu 2 Rutgers University, Piscataway, NJ 08854, USA. ffarach,[email protected] 3 LIP, ENS de Lyon, 46 allee´ d’Italie, Lyon, France. [email protected] Abstract. We revisit classical sieves for computing primes and analyze their performance in the external-memory model. Most prior sieves are analyzed in the RAM model, where the focus is on minimizing both the total number of operations and the size of the working set. The hope is that if the working set fits in RAM, then the sieve will have good I/O performance, though such an outcome is by no means guaranteed by a small working-set size. We analyze our algorithms directly in terms of I/Os and operations. In the external- memory model, permutation can be the most expensive aspect of sieving, in contrast to the RAM model, where permutations are trivial. We show how to implement classical sieves so that they have both good I/O performance and good RAM performance, even when the problem size N becomes huge—even superpolynomially larger than RAM. Towards this goal, we give two I/O-efficient priority queues that are optimized for the operations incurred by these sieves. Keywords: External-Memory Algorithms, Prime Tables, Sorting, Priority Queues 1 Introduction According to Fox News [21], “Prime numbers, which are divisible only by themselves and one, have little mathematical importance.