SlideShare a Scribd company logo
Why prime numbers are of great importance and their use in everyday life 
23 
3343 
457 17 
107 
By VincS
Definition of prime number 
A prime number (also prime)is a natural integer, greater than 1, which can 
be divided only by 1 or by itself (without generating remainder). 
Definition of composited number 
Conversely, a composited number is a natural integer, greater than 1, which can be 
divided by two or more prime numbers (without generating remainder).
Primes:the building blocks of mathematics 
By the two definitions, we can understand how prime numbers can be considered as the 
building blocks of mathematics, because with them (along with the number 1, which is a 
special number) are formed all the natural integers. 
• 1 (special number = 1 x 1 x 1 x ……) 
• 2 (prime number) 
• 3 (prime number) 
• 4 (composited number) = 2 x 2 
• 5 (prime number) 
• 6 (composited number) = 2 x 3 
• 7 (prime number) 
• 8 (composited number) = 2 x 2 x 2 
• 9 (composited number) = 3 x 3 
• 10 (composited number) = 2 x 5 
• … etcetera …
The number 1 is special! 
Since thousands of years mathematecians have discussed if the number 1 is a prime 
number or not (as in the modern trend of thought). 
The number 1 is actually a special number (as the number 0 [zero] is special for other 
reasons); in fact it can be at the same time a prime number and a composite number. 
Here's why: 
• the number 1 falls in the specificity of prime numbers as it can only be divided by 1 or 
by itself without generating remainder 
• the number 1 can, at the same time, be the result of 1x1x..x1 (staying the same) and then 
fall in the specificity of dialed numbers
Why prime numbers are currently of great 
importance? 
Because they are suitable for techniques that, more than others, ensure the confidentiality of 
communications, and their reliability; among many others, for example, economic transactions. 
Some examples: 
https://; no one can understand what is sent via the browser 
WEP/WAP keys; no one can use for free your ADSL contract via wi-fi 
cryptography; only who knows the password can access documents 
electronic signature; no one can sign documents on your behalf 
POS; no one can catch your PIN 
on-line banking; no one can steal your money 
etc.etc..
In which way? 
Simplifing, for a trivial calculator is very easy to do the multiplication of two prime 
numbers ... 
52639 x 47353 = 2492614567 
... but it is rather difficult (even for large computers) do the reverse as finding the two 
prime numbers starting knowing the result of the product. 
On the web there are thousands of documents that explain how this property is used to 
ensure privacy. If you want to try other examples, there are many network utilities that 
generate prime numbers and other running factorization of composite numbers.
Suggested tools to perform test 
To generate the nth prime number (and others stuffs) I can recommend ... 
http://primes.utm.edu/nthprime/ 
To perform the decomposition I can recommend ... 
http://www.spiega.com/rez/scomposizione_fattori.php?
Is it a prime number? 
Unfortunately, a particular characteristic of prime numbers is that is not easy, even for 
larger computers, determining whether they are effectively prime numbers or if they are 
not. 
To do this, in a short time, probabilistic methods are used (eg. the Rabin-Miller). These 
methods, therefore, have a margin of error that is inversely proportional to the time the 
test is performed. 
Other methods, such as deterministic methods (eg. Wilson or AKS), have no margin of 
error, but they are almost impossible to use because it would take a long time to run a 
single test, making it useless for any application.
Where is the problem? 
The limitation of not being able to generate and verify big numbers certainly primes 
in a short time, makes unsecure the encryption of information because the 
decomposition of generated products would be relatively simple. Do you want to 
test it? 
Oversimplifying, try to imagine that a certain prime number is the secret information 
you want to transmit to a friend of yours through the network. Previously you both 
friends shared a "probably" prime being your key of encryption and decryption. Let 
be their product the way you think to safely send it through the network. You are 
sure that no one will be able to do the decomposition of the product even if it would 
be intercepted. But are you really sure?
Here is the problem! 
Let’s get the prime number secret information 47353 (16 bits wide) and multiply it by the "probably" prime number encryption 
key (16 bits wide) 34387 (someone sold it to you as to be a prime number but indeed it is = 137 x 251 ) . 
Now let’s run on the calculator 34387 x 47353 = 1628327611 and let’s insert the result in an on-line decomposition tool (click 
below) .... 
http://www.spiega.com/rez/scomposizione_fattori.php?q=1628327611 
You'll see that in a few moments the result of the breakdown will appear!!! 
Your secret number has been discovered! 
Just to double check, let’s insert the product of a encryption key “certainly” prime number 
52639 x 47353 = 2492614567 (click below) ... 
http://www.spiega.com/rez/scomposizione_fattori.php?q=2492614567 
The tool is unable to calculate the factors and mistakes it for a prime number! 
Your secret number is safely at your friend’s home that can so divide … 
2492614567/52639 = 47353 … to get so the secret information you would let him knowing!
Prime numbers bigger and bigger! 
Is it clear now why the inability to determine if a number is really prime endangers the secrecy of any kind of communications? 
It 'easy to understand that greater are the two prime numbers and how greater will be the difficult to make the 
decomposition of the product. Surely you have heard of 128-bit encryption, 256-bit but also over (512 and 1024 bits). Here 
below are a few ... 
52639 ..................................................................................... it’s a 16 bits wide prime number 
3732374119............................................................................. it’s a 32 bits wide prime number 
9431969683375056557 ......................................................... it’s a 64 bits wide prime number 
234162490561541866917184511796682725377 .................. it’s a 128 bits wide prime number 
Increasing the availability of the computing power, we must continually increase the number of encryption bits (few years ago it 
was 128 and now has growth up to 1024). 
It’s not our goal to explore these issues but what above reported is just enough to understand the importance of finding a 
primality test that uses a deterministic method and fast. 
Is it really impossible?
The importance of execution time 
However, if you still have doubts about the importance that may have the speed in 
calculation you could search on any search engine (eg. Google) the following sentences 
"execution time primality test“ (without the quotes). A few thousand have been 
found? Please give a look.
Has everything been said? 
Has everything been written? 
It's amazing how, in the third millennium, we can still discover 
interesting things about prime numbers. An example is the website ... 
www.VincS.it 
... where is stated and proved a theorem so simple, yet original, that it 
could have been written in the year 300 BC by Greek mathematicians.

More Related Content

Similar to Hunting primes (a caccia di primi) 27 ott 2014

Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
AlexWang212277
 
Quantum cryptography for researchers - Teodor Strömberg - SRD23
Quantum cryptography for researchers - Teodor Strömberg - SRD23Quantum cryptography for researchers - Teodor Strömberg - SRD23
Quantum cryptography for researchers - Teodor Strömberg - SRD23
SURFevents
 
Good++
Good++Good++
Data oriented design and c++
Data oriented design and c++Data oriented design and c++
Data oriented design and c++
Mike Acton
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYTuhin_Das
 
#GDC15 Code Clinic
#GDC15 Code Clinic#GDC15 Code Clinic
#GDC15 Code Clinic
Mike Acton
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digits
johnhwoodsslideshare
 
One Time Pad Journal
One Time Pad JournalOne Time Pad Journal
One Time Pad Journal
Amirul Wiramuda
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
Sudhanshu Mishra
 
rsa_result-tmd.doc
rsa_result-tmd.docrsa_result-tmd.doc
rsa_result-tmd.doc
HcVinChuynCn
 
128 BIT WHAT?
128 BIT WHAT?128 BIT WHAT?
128 BIT WHAT?
Razorpoint Security
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security System
Matthew Bricker
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On Cryptography
Haley Johnson
 
Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
Felipe Prado
 
Software Security : From school to reality and back!
Software Security : From school to reality and back!Software Security : From school to reality and back!
Software Security : From school to reality and back!
Peter Hlavaty
 

Similar to Hunting primes (a caccia di primi) 27 ott 2014 (20)

Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
 
Quantum cryptography for researchers - Teodor Strömberg - SRD23
Quantum cryptography for researchers - Teodor Strömberg - SRD23Quantum cryptography for researchers - Teodor Strömberg - SRD23
Quantum cryptography for researchers - Teodor Strömberg - SRD23
 
Aina_final
Aina_finalAina_final
Aina_final
 
Good++
Good++Good++
Good++
 
Data oriented design and c++
Data oriented design and c++Data oriented design and c++
Data oriented design and c++
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
#GDC15 Code Clinic
#GDC15 Code Clinic#GDC15 Code Clinic
#GDC15 Code Clinic
 
Information Security
Information SecurityInformation Security
Information Security
 
Basic hacking tutorial i
Basic hacking tutorial iBasic hacking tutorial i
Basic hacking tutorial i
 
Part Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digitsPart Numbering and ID codes: general considerations and check digits
Part Numbering and ID codes: general considerations and check digits
 
One Time Pad Journal
One Time Pad JournalOne Time Pad Journal
One Time Pad Journal
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
rsa_result-tmd.doc
rsa_result-tmd.docrsa_result-tmd.doc
rsa_result-tmd.doc
 
128 BIT WHAT?
128 BIT WHAT?128 BIT WHAT?
128 BIT WHAT?
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security System
 
Week12
Week12Week12
Week12
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On Cryptography
 
Black ops 2012
Black ops 2012Black ops 2012
Black ops 2012
 
Hackers secrets
Hackers secretsHackers secrets
Hackers secrets
 
Software Security : From school to reality and back!
Software Security : From school to reality and back!Software Security : From school to reality and back!
Software Security : From school to reality and back!
 

Recently uploaded

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Hunting primes (a caccia di primi) 27 ott 2014

  • 1. Why prime numbers are of great importance and their use in everyday life 23 3343 457 17 107 By VincS
  • 2. Definition of prime number A prime number (also prime)is a natural integer, greater than 1, which can be divided only by 1 or by itself (without generating remainder). Definition of composited number Conversely, a composited number is a natural integer, greater than 1, which can be divided by two or more prime numbers (without generating remainder).
  • 3. Primes:the building blocks of mathematics By the two definitions, we can understand how prime numbers can be considered as the building blocks of mathematics, because with them (along with the number 1, which is a special number) are formed all the natural integers. • 1 (special number = 1 x 1 x 1 x ……) • 2 (prime number) • 3 (prime number) • 4 (composited number) = 2 x 2 • 5 (prime number) • 6 (composited number) = 2 x 3 • 7 (prime number) • 8 (composited number) = 2 x 2 x 2 • 9 (composited number) = 3 x 3 • 10 (composited number) = 2 x 5 • … etcetera …
  • 4. The number 1 is special! Since thousands of years mathematecians have discussed if the number 1 is a prime number or not (as in the modern trend of thought). The number 1 is actually a special number (as the number 0 [zero] is special for other reasons); in fact it can be at the same time a prime number and a composite number. Here's why: • the number 1 falls in the specificity of prime numbers as it can only be divided by 1 or by itself without generating remainder • the number 1 can, at the same time, be the result of 1x1x..x1 (staying the same) and then fall in the specificity of dialed numbers
  • 5. Why prime numbers are currently of great importance? Because they are suitable for techniques that, more than others, ensure the confidentiality of communications, and their reliability; among many others, for example, economic transactions. Some examples: https://; no one can understand what is sent via the browser WEP/WAP keys; no one can use for free your ADSL contract via wi-fi cryptography; only who knows the password can access documents electronic signature; no one can sign documents on your behalf POS; no one can catch your PIN on-line banking; no one can steal your money etc.etc..
  • 6. In which way? Simplifing, for a trivial calculator is very easy to do the multiplication of two prime numbers ... 52639 x 47353 = 2492614567 ... but it is rather difficult (even for large computers) do the reverse as finding the two prime numbers starting knowing the result of the product. On the web there are thousands of documents that explain how this property is used to ensure privacy. If you want to try other examples, there are many network utilities that generate prime numbers and other running factorization of composite numbers.
  • 7. Suggested tools to perform test To generate the nth prime number (and others stuffs) I can recommend ... http://primes.utm.edu/nthprime/ To perform the decomposition I can recommend ... http://www.spiega.com/rez/scomposizione_fattori.php?
  • 8. Is it a prime number? Unfortunately, a particular characteristic of prime numbers is that is not easy, even for larger computers, determining whether they are effectively prime numbers or if they are not. To do this, in a short time, probabilistic methods are used (eg. the Rabin-Miller). These methods, therefore, have a margin of error that is inversely proportional to the time the test is performed. Other methods, such as deterministic methods (eg. Wilson or AKS), have no margin of error, but they are almost impossible to use because it would take a long time to run a single test, making it useless for any application.
  • 9. Where is the problem? The limitation of not being able to generate and verify big numbers certainly primes in a short time, makes unsecure the encryption of information because the decomposition of generated products would be relatively simple. Do you want to test it? Oversimplifying, try to imagine that a certain prime number is the secret information you want to transmit to a friend of yours through the network. Previously you both friends shared a "probably" prime being your key of encryption and decryption. Let be their product the way you think to safely send it through the network. You are sure that no one will be able to do the decomposition of the product even if it would be intercepted. But are you really sure?
  • 10. Here is the problem! Let’s get the prime number secret information 47353 (16 bits wide) and multiply it by the "probably" prime number encryption key (16 bits wide) 34387 (someone sold it to you as to be a prime number but indeed it is = 137 x 251 ) . Now let’s run on the calculator 34387 x 47353 = 1628327611 and let’s insert the result in an on-line decomposition tool (click below) .... http://www.spiega.com/rez/scomposizione_fattori.php?q=1628327611 You'll see that in a few moments the result of the breakdown will appear!!! Your secret number has been discovered! Just to double check, let’s insert the product of a encryption key “certainly” prime number 52639 x 47353 = 2492614567 (click below) ... http://www.spiega.com/rez/scomposizione_fattori.php?q=2492614567 The tool is unable to calculate the factors and mistakes it for a prime number! Your secret number is safely at your friend’s home that can so divide … 2492614567/52639 = 47353 … to get so the secret information you would let him knowing!
  • 11. Prime numbers bigger and bigger! Is it clear now why the inability to determine if a number is really prime endangers the secrecy of any kind of communications? It 'easy to understand that greater are the two prime numbers and how greater will be the difficult to make the decomposition of the product. Surely you have heard of 128-bit encryption, 256-bit but also over (512 and 1024 bits). Here below are a few ... 52639 ..................................................................................... it’s a 16 bits wide prime number 3732374119............................................................................. it’s a 32 bits wide prime number 9431969683375056557 ......................................................... it’s a 64 bits wide prime number 234162490561541866917184511796682725377 .................. it’s a 128 bits wide prime number Increasing the availability of the computing power, we must continually increase the number of encryption bits (few years ago it was 128 and now has growth up to 1024). It’s not our goal to explore these issues but what above reported is just enough to understand the importance of finding a primality test that uses a deterministic method and fast. Is it really impossible?
  • 12. The importance of execution time However, if you still have doubts about the importance that may have the speed in calculation you could search on any search engine (eg. Google) the following sentences "execution time primality test“ (without the quotes). A few thousand have been found? Please give a look.
  • 13. Has everything been said? Has everything been written? It's amazing how, in the third millennium, we can still discover interesting things about prime numbers. An example is the website ... www.VincS.it ... where is stated and proved a theorem so simple, yet original, that it could have been written in the year 300 BC by Greek mathematicians.