Primes of the Form (B N + 1)/(B + 1)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Amazing Prime Heuristic.Pdf
This document has been moved to https://arxiv.org/abs/2103.04483 Please use that version instead. AN AMAZING PRIME HEURISTIC CHRIS K. CALDWELL 1. Introduction The record for the largest known twin prime is constantly changing. For example, in October of 2000, David Underbakke found the record primes: 83475759 264955 1: · The very next day Giovanni La Barbera found the new record primes: 1693965 266443 1: · The fact that the size of these records are close is no coincidence! Before we seek a record like this, we usually try to estimate how long the search might take, and use this information to determine our search parameters. To do this we need to know how common twin primes are. It has been conjectured that the number of twin primes less than or equal to N is asymptotic to N dx 2C2N 2C2 2 2 Z2 (log x) ∼ (log N) where C2, called the twin prime constant, is approximately 0:6601618. Using this we can estimate how many numbers we will need to try before we find a prime. In the case of Underbakke and La Barbera, they were both using the same sieving software (NewPGen1 by Paul Jobling) and the same primality proving software (Proth.exe2 by Yves Gallot) on similar hardware{so of course they choose similar ranges to search. But where does this conjecture come from? In this chapter we will discuss a general method to form conjectures similar to the twin prime conjecture above. We will then apply it to a number of different forms of primes such as Sophie Germain primes, primes in arithmetic progressions, primorial primes and even the Goldbach conjecture. -
Arxiv:1412.5226V1 [Math.NT] 16 Dec 2014 Hoe 11
q-PSEUDOPRIMALITY: A NATURAL GENERALIZATION OF STRONG PSEUDOPRIMALITY JOHN H. CASTILLO, GILBERTO GARC´IA-PULGAR´IN, AND JUAN MIGUEL VELASQUEZ-SOTO´ Abstract. In this work we present a natural generalization of strong pseudoprime to base b, which we have called q-pseudoprime to base b. It allows us to present another way to define a Midy’s number to base b (overpseudoprime to base b). Besides, we count the bases b such that N is a q-probable prime base b and those ones such that N is a Midy’s number to base b. Furthemore, we prove that there is not a concept analogous to Carmichael numbers to q-probable prime to base b as with the concept of strong pseudoprimes to base b. 1. Introduction Recently, Grau et al. [7] gave a generalization of Pocklignton’s Theorem (also known as Proth’s Theorem) and Miller-Rabin primality test, it takes as reference some works of Berrizbeitia, [1, 2], where it is presented an extension to the concept of strong pseudoprime, called ω-primes. As Grau et al. said it is right, but its application is not too good because it is needed m-th primitive roots of unity, see [7, 12]. In [7], it is defined when an integer N is a p-strong probable prime base a, for p a prime divisor of N −1 and gcd(a, N) = 1. In a reading of that paper, we discovered that if a number N is a p-strong probable prime to base 2 for each p prime divisor of N − 1, it is actually a Midy’s number or a overpseu- doprime number to base 2. -
The RSA Algorithm Clifton Paul Robinson
Bridgewater State University Virtual Commons - Bridgewater State University Honors Program Theses and Projects Undergraduate Honors Program 5-1-2018 The Key to Cryptography: The RSA Algorithm Clifton Paul Robinson Follow this and additional works at: http://vc.bridgew.edu/honors_proj Part of the Computer Sciences Commons Recommended Citation Robinson, Clifton Paul. (2018). The Key ot Cryptography: The RSA Algorithm. In BSU Honors Program Theses and Projects. Item 268. Available at: http://vc.bridgew.edu/honors_proj/268 Copyright © 2018 Clifton Paul Robinson This item is available as part of Virtual Commons, the open-access institutional repository of Bridgewater State University, Bridgewater, Massachusetts. The Key to Cryptography: The RSA Algorithm Clifton Paul Robinson Submitted in Partial Completion of the Requirements for Commonwealth Interdisciplinary Honors in Computer Science and Mathematics Bridgewater State University May 1, 2018 Dr. Jacqueline Anderson Thesis Co-Advisor Dr. Michael Black, Thesis Co-Advisor Dr. Ward Heilman, Committee Member Dr. Haleh Khojasteh, Committee Member BRIDGEWATER STATE UNIVERSITY UNDERGRADUATE THESIS The Key To Cryptography: The RSA Algorithm Author: Advisors: Clifton Paul ROBINSON Dr. Jackie ANDERSON Dr. Michael BLACK Submitted in Partial Completion of the Requirements for Commonwealth Honors in Computer Science and Mathematics Dr. Ward Heilman, Reading Committee Dr. Haleh Khojasteh, Reading Committee ii Dedicated to Mom, Dad, James, and Mimi iii Contents Abstractv 1 Introduction1 1.1 The Project Overview........................1 2 Theorems and Definitions2 2.1 Definitions..............................2 2.2 Theorems...............................5 3 The History of Cryptography6 3.1 Origins................................6 3.2 A Transition.............................6 3.3 Cryptography at War........................7 3.4 The Creation and Uses of RSA...................7 4 The Mathematics9 4.1 What is a Prime Number?.....................9 4.2 Factoring Numbers........................ -
Cullen Numbers with the Lehmer Property
PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 00, Number 0, Pages 000–000 S 0002-9939(XX)0000-0 CULLEN NUMBERS WITH THE LEHMER PROPERTY JOSE´ MAR´IA GRAU RIBAS AND FLORIAN LUCA Abstract. Here, we show that there is no positive integer n such that n the nth Cullen number Cn = n2 + 1 has the property that it is com- posite but φ(Cn) | Cn − 1. 1. Introduction n A Cullen number is a number of the form Cn = n2 + 1 for some n ≥ 1. They attracted attention of researchers since it seems that it is hard to find primes of this form. Indeed, Hooley [8] showed that for most n the number Cn is composite. For more about testing Cn for primality, see [3] and [6]. For an integer a > 1, a pseudoprime to base a is a compositive positive integer m such that am ≡ a (mod m). Pseudoprime Cullen numbers have also been studied. For example, in [12] it is shown that for most n, Cn is not a base a-pseudoprime. Some computer searchers up to several millions did not turn up any pseudo-prime Cn to any base. Thus, it would seem that Cullen numbers which are pseudoprimes are very scarce. A Carmichael number is a positive integer m which is a base a pseudoprime for any a. A composite integer m is called a Lehmer number if φ(m) | m − 1, where φ(m) is the Euler function of m. Lehmer numbers are Carmichael numbers; hence, pseudoprimes in every base. No Lehmer number is known, although it is known that there are no Lehmer numbers in certain sequences, such as the Fibonacci sequence (see [9]), or the sequence of repunits in base g for any g ∈ [2, 1000] (see [4]). -
Generating Provable Primes Efficiently on Embedded Devices
Generating Provable Primes Efficiently on Embedded Devices Christophe Clavier1, Benoit Feix1;2, Lo¨ıc Thierry2;?, and Pascal Paillier3 1 XLIM, University of Limoges, [email protected] 2 INSIDE Secure [email protected],[email protected] 3 CryptoExperts [email protected] Abstract. This paper introduces new techniques to generate provable prime numbers efficiently on embedded devices such as smartcards, based on variants of Pocklington's and the Brillhart-Lehmer-Selfridge-Tuckerman- Wagstaff theorems. We introduce two new generators that, combined with cryptoprocessor-specific optimizations, open the way to efficient and tamper-resistant on-board generation of provable primes. We also report practical results from our implementations. Both our theoretical and ex- perimental results show that constructive methods can generate provable primes essentially as efficiently as state-of-the-art generators for probable primes based on Fermat and Miller-Rabin pseudo-tests. We evaluate the output entropy of our two generators and provide techniques to ensure a high level of resistance against physical attacks. This paper intends to provide practitioners with the first practical solutions for fast and secure generation of provable primes in embedded security devices. Keywords: Prime Numbers, Pocklington's theorem, Public Key Cryp- tography, Embedded Software, Modular Exponentiation, Cryptographic Accelerators, Primality Proving. 1 Introduction Large prime numbers are a basic ingredient of keys in several standardized primi- tives such as RSA [21], Digital Signature Algorithm (DSA) [12] or Diffie-Hellman key exchange (DH) [10]. This paper precisely addresses the generation of prov- able prime numbers in embedded, crypto-enabled devices. When it comes to RSA key generation, two approaches coexist: key pairs may be generated off-board (i.e. -
On Repdigits As Sums of Fibonacci and Tribonacci Numbers
S S symmetry Article On Repdigits as Sums of Fibonacci and Tribonacci Numbers Pavel Trojovský Department of Mathematics, Faculty of Science, University of Hradec Králové, 500 03 Hradec Králové, Czech Republic; [email protected]; Tel.: +42-049-333-2860 Received: 17 September 2020; Accepted: 21 October 2020; Published: 26 October 2020 Abstract: In this paper, we use Baker’s theory for nonzero linear forms in logarithms of algebraic numbers and a Baker-Davenport reduction procedure to find all repdigits (i.e., numbers with only one distinct digit in its decimal expansion, thus they can be seen as the easiest case of palindromic numbers, which are a “symmetrical” type of numbers) that can be written in the form Fn + Tn, for some n ≥ 1, where (Fn)n≥0 and (Tn)n≥0 are the sequences of Fibonacci and Tribonacci numbers, respectively. Keywords: Diophantine equations; repdigits; Fibonacci; Tribonacci; Baker’s theory MSC: 11B39; 11J86 1. Introduction A palindromic number is a number that has the same form when written forwards or backwards, i.e., of the form c1c2c3 ... c3c2c1 (thus it can be said that they are “symmetrical” with respect to an axis of symmetry). The first 19th palindromic numbers are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 11, 22, 33, 44, 55, 66, 77, 88, 99 and clearly they are a repdigits type. A number n is called repdigit if it has only one repeated digit in its decimal expansion. More precisely, n has the form ! 10` − 1 n = a , 9 for some ` ≥ 1 and a 2 [1, 9] (as usual, we set [a, b] = fa, a + 1, .. -
The Probability That a Random Probable Prime Is Composite*
MATHEMATICS OF COMPUTATION VOLUME 53, NUMBER 188 OCTOBER 1989, PAGES 721-741 The Probability that a Random Probable Prime is Composite* By Su Hee Kim and Carl Pomerance** Abstract. Consider a procedure which (1) chooses a random odd number n < x, (2) chooses a random number 6, 1 < b < n — 1, and (3) accepts n if bn~l = 1 (mod n). Let P(x) denote the probability that this procedure accepts a composite number. It is known from work of Erdös and the second author that P(x) —>0 as x —►oo. In this paper, explicit inequalities are established for P(x)\ For example, it is shown that P(10100) < 2.77 x 10~8 and that P(x) < (logx)"197 for x > 101()5. Introduction. Suppose one wants to produce a random prime p < x, drawn with the uniform distribution. One possible solution is to choose a random number n, 1 < n < x, and apply a test to n that can tell if it is prime or composite. This procedure is repeated independently until a prime is found. By the prime number theorem, the expected number of trials until a prime is drawn is about log x. If one wishes to choose an odd prime, the trials n may be restricted to odd numbers. The expected number of trials is then about ¿ log x. There are many algorithms which can be used to decide if n is prime or com- posite. However, using the Fermât congruence is a very cheap test that is usually recommended as a preliminary procedure before a more time-consuming test is at- tempted. -
Quadratic Frobenius Probable Prime Tests Costing Two Selfridges
Quadratic Frobenius probable prime tests costing two selfridges Paul Underwood June 6, 2017 Abstract By an elementary observation about the computation of the difference of squares for large in- tegers, deterministic quadratic Frobenius probable prime tests are given with running times of approximately 2 selfridges. 1 Introduction Much has been written about Fermat probable prime (PRP) tests [1, 2, 3], Lucas PRP tests [4, 5], Frobenius PRP tests [6, 7, 8, 9, 10, 11, 12] and combinations of these [13, 14, 15]. These tests provide a probabilistic answer to the question: “Is this integer prime?” Although an affirmative answer is not 100% certain, it is answered fast and reliable enough for “industrial” use [16]. For speed, these various PRP tests are usually preceded by factoring methods such as sieving and trial division. The speed of the PRP tests depends on how quickly multiplication and modular reduction can be computed during exponentiation. Techniques such as Karatsuba’s algorithm [17, section 9.5.1], Toom-Cook multiplication, Fourier Transform algorithms [17, section 9.5.2] and Montgomery expo- nentiation [17, section 9.2.1] play their roles for different integer sizes. The sizes of the bases used are also critical. Oliver Atkin introduced the concept of a “Selfridge Unit” [18], approximately equal to the running time of a Fermat PRP test, which is called a selfridge in this paper. The Baillie-PSW test costs 1+3 selfridges, the use of which is very efficient when processing a candidate prime list. There is no known Baillie-PSW pseudoprime but Greene and Chen give a way to construct some similar counterexam- ples [19]. -
Problems Archives
Cache update: 56 minutes Problems Archives The problems archives table shows problems 1 to 651. If you would like to tackle the 10 most recently published problems then go to Recent problems. Click the description/title of the problem to view details and submit your answer. ID Description / Title Solved By 1 Multiples of 3 and 5 834047 2 Even Fibonacci numbers 666765 3 Largest prime factor 476263 4 Largest palindrome product 422115 5 Smallest multiple 428955 6 Sum square difference 431629 7 10001st prime 368958 8 Largest product in a series 309633 9 Special Pythagorean triplet 313806 10 Summation of primes 287277 11 Largest product in a grid 207029 12 Highly divisible triangular number 194069 13 Large sum 199504 14 Longest Collatz sequence 199344 15 Lattice paths 164576 16 Power digit sum 201444 17 Number letter counts 133434 18 Maximum path sum I 127951 19 Counting Sundays 119066 20 Factorial digit sum 175533 21 Amicable numbers 128681 22 Names scores 118542 23 Non-abundant sums 91300 24 Lexicographic permutations 101261 25 1000-digit Fibonacci number 137312 26 Reciprocal cycles 73631 27 Quadratic primes 76722 28 Number spiral diagonals 96208 29 Distinct powers 92388 30 Digit fifth powers 96765 31 Coin sums 74310 32 Pandigital products 62296 33 Digit cancelling fractions 62955 34 Digit factorials 82985 35 Circular primes 74645 36 Double-base palindromes 78643 37 Truncatable primes 64627 38 Pandigital multiples 55119 39 Integer right triangles 64132 40 Champernowne's constant 70528 41 Pandigital prime 59723 42 Coded triangle numbers 65704 43 Sub-string divisibility 52160 44 Pentagon numbers 50757 45 Triangular, pentagonal, and hexagonal 62652 46 Goldbach's other conjecture 53607 47 Distinct primes factors 50539 48 Self powers 100136 49 Prime permutations 50577 50 Consecutive prime sum 54478 Cache update: 56 minutes Problems Archives The problems archives table shows problems 1 to 651. -
Independence of the Miller-Rabin and Lucas Probable Prime Tests
Independence of the Miller-Rabin and Lucas Probable Prime Tests Alec Leng Mentor: David Corwin March 30, 2017 1 Abstract In the modern age, public-key cryptography has become a vital component for se- cure online communication. To implement these cryptosystems, rapid primality test- ing is necessary in order to generate keys. In particular, probabilistic tests are used for their speed, despite the potential for pseudoprimes. So, we examine the commonly used Miller-Rabin and Lucas tests, showing that numbers with many nonwitnesses are usually Carmichael or Lucas-Carmichael numbers in a specific form. We then use these categorizations, through a generalization of Korselt’s criterion, to prove that there are no numbers with many nonwitnesses for both tests, affirming the two tests’ relative independence. As Carmichael and Lucas-Carmichael numbers are in general more difficult for the two tests to deal with, we next search for numbers which are both Carmichael and Lucas-Carmichael numbers, experimentally finding none less than 1016. We thus conjecture that there are no such composites and, using multi- variate calculus with symmetric polynomials, begin developing techniques to prove this. 2 1 Introduction In the current information age, cryptographic systems to protect data have become a funda- mental necessity. With the quantity of data distributed over the internet, the importance of encryption for protecting individual privacy has greatly risen. Indeed, according to [EMC16], cryptography is allows for authentication and protection in online commerce, even when working with vital financial information (e.g. in online banking and shopping). Now that more and more transactions are done through the internet, rather than in person, the importance of secure encryption schemes is only growing. -
Introducing Quaternions to Integer Factorisation
Journal of Physical Science and Application 5 (2) (2015) 101-107 doi: 10.17265/2159-5348/2015.02.003 D DAVID PUBLISHING Introducing Quaternions to Integer Factorisation HuiKang Tong 4500 Ang Mo Kio Avenue 6, 569843, Singapore Abstract: The key purpose of this paper is to open up the concepts of the sum of four squares and the algebra of quaternions into the attempts of factoring semiprimes, the product of two prime numbers. However, the application of these concepts here has been clumsy, and would be better explored by those with a more rigorous mathematical background. There may be real immediate implications on some RSA numbers that are slightly larger than a perfect square. Key words: Integer factorisation, RSA, quaternions, sum of four squares, euler factorisation method. Nomenclature In Section 3, we extend the Euler factoring method to one using the sum of four squares and the algebra p, q: prime factors n: semiprime pq, the product of two primes of quaternions. We comment on the development of P: quaternion with norm p the mathematics in Section 3.1, and introduce the a, b, c, d: components of a quaternion integral quaternions in Section 3.2, and its relationship 1. Introduction with the sum of four squares in Section 3.3. In Section 3.4, we mention an algorithm to generate the sum of We assume that the reader know the RSA four squares. cryptosystem [1]. Notably, the ability to factorise a In Section 4, we propose the usage of concepts of random and large semiprime n (the product of two the algebra of quaternions into the factorisation of prime numbers p and q) efficiently can completely semiprimes. -
Lucas Numbers with the Lehmer Property
LUCAS NUMBERS WITH THE LEHMER PROPERTY BERNADETTE FAYE and FLORIAN LUCA Communicated by Vasile Br^ınz˘anescu A composite positive integer n is Lehmer if φ(n) divides n − 1, where φ(n) is the Euler's totient function. No Lehmer number is known, nor has it been proved that they don't exist. In 2007, the second author [7] proved that there is no Lehmer number in the Fibonacci sequence. In this paper, we adapt the method from [7] to show that there is no Lehmer number in the companion Lucas sequence of the Fibonacci sequence (Ln)n≥0 given by L0 = 2;L1 = 1 and Ln+2 = Ln+1 + Ln for all n ≥ 0. AMS 2010 Subject Classification: 11B39, 11A25. Key words: Lucas numbers, Euler function. 1. INTRODUCTION Let φ(n) be the Euler function of a positive integer n. Recall that if n has the prime factorization α1 α2 αk n = p1 p2 ··· pk ; then α1−1 α2−1 αk−1 φ(n) = (p1 − 1)p1 (p2 − 1)p2 ··· (pk − 1)pk : Lehmer [6] conjectured that if φ(n) j n − 1 then n is a prime. To this day, the conjecture remains open. Counterexamples to Lehmer's conjecture have been dubbed Lehmer numbers. Several people worked on getting larger and larger lower bounds on a potential Lehmer number. For a positive integer m, we write !(m) for the number of distinct prime factors of m. Lehmer himself proved that if N is Lehmer, then !(N) ≥ 7. This has been improved by Cohen and Hagis [3] to !(N) ≥ 14: The current record !(N) ≥ 15 is due to Renze [9].