SECTION 5-2 Large Prime Numbers Slide 5-2-1. THE INFINITUDE OF PRIMES Slide 5-2-2 There is no largest prime number. Euclid proved this around 300 B.C.

Slides:



Advertisements
Similar presentations
Presented by Alex Atkins.  An integer p >= 2 is a prime if its only positive integer divisors are 1 and p.  Euclid proved that there are infinitely.
Advertisements

Number Theory Algorithms and Cryptography Algorithms Prepared by John Reif, Ph.D. Analysis of Algorithms.
Prime numbers are extremely important because they are the basis for many daily applications. In fact, thanks to the primes, we can today count on cryptosystems,
Prime Numbers and How to Avoid Them Pi Mu Epsilon April 19, 2012 CWRU.
Perfect, Prime, and Sierpiński Numbers A mathematical excursion from the time of Pythagoras to the computer age Lane Community College Academic Colloquium.
Chapter 5 Number Theory © 2008 Pearson Addison-Wesley. All rights reserved.
PrasadPrimes1 VEDIC MATHEMATICS : Primes T. K. Prasad
Whiteboardmaths.com © 2004 All rights reserved
Prime Numbers A prime number is a number with exactly two factors The first ten prime numbers: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29.
Sets, Combinatorics, Probability, and Number Theory Mathematical Structures for Computer Science Chapter 3 Copyright © 2006 W.H. Freeman & Co.MSCS Slides.
22C:19 Discrete Structures Integers and Modular Arithmetic
Section 5-4 Greatest Common Factor and Least Common Multiple.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Chapter 8 More Number Theory. Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime.
1. What number does the following array represent?
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
Elementary Number Theory and Methods of Proof. Basic Definitions An integer n is an even number if there exists an integer k such that n = 2k. An integer.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
1 Integers and Division CS/APMA 202 Rosen section 2.4 Aaron Bloomfield.
ELEMENTARY NUMBER THEORY AND METHODS OF PROOF
Chapter 5 Number Theory © 2008 Pearson Addison-Wesley.
Software Security Seminar - 1 Chapter 11. Mathematical Background 발표자 : 안병희 Applied Cryptography.
Number Theory Number Theory: A reflection of the basic mathematical endeavor. Exploration Of Patterns: Number theory abounds with patterns and requires.
Chapter 5 Number Theory © 2008 Pearson Addison-Wesley. All rights reserved.
Chapter 3 Greek Number Theory The Role of Number Theory Polygonal, Prime and Perfect Numbers The Euclidean Algorithm Pell’s Equation The Chord and Tangent.
 2012 Pearson Education, Inc. Slide Chapter 5 Number Theory.
Section 5.1 Number Theory.
1 Mersenne Primes How to generate more prime numbers? Mersenne ( ) generated primes using formula: where p is a prime M 2 = 3; M 3 = 7, M 5 = 31,
SECTION 5-3 Selected Topics from Number Theory Slide
Structures 5 Number Theory What is number theory?
Amazing Facts on Prime Numbers
Module :MA3036NI Cryptography and Number Theory Lecture Week 7
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
By: Miguel Vega PIERRE DE FERMAT. BIRTH AND DEATH Pierre was born in Beaumage France on august,20,1601. Died on January 12, 1665 in Casters France.
Factor trees.
Prime Factorization of Composite Numbers Here is a list of ten numbers of which five are prime and five are composite. I have identified the composite.
Prime Numbers.
© T Madas. A prime number or simply a prime, is a number with exactly two factors. These two factors are always the number 1 and the prime number itself.
CompSci 102 Discrete Math for Computer Science
Formula? Unit?.  Formula ?  Unit?  Formula?  Unit?
YSLInformation Security -- Public-Key Cryptography1 Prime and Relatively Prime Numbers Divisors: We say that b  0 divides a if a = mb for some m, where.
Quit Pierre de Fermat Fermat’s Last Conjecture Prime Numbers Euler’s Conjecture.
Chapter 4 With Question/Answer Animations. Section 4.1.
Lecture 6.1: Misc. Topics: Number Theory CS 250, Discrete Structures, Fall 2011 Nitesh Saxena.
Special Quadratic Functions An Investigation Special Quadratic Functions Consider the quadratic function  f(n) = n 2 + n + 41 If we put n = 0, we get.
Assignment #3 Solutions January 24, Practical Aspects of Modern Cryptography Problem #1 Use Fermat’s Little Theorem and induction on k to prove.
Slide Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley.
Week 4 - Wednesday.  What did we talk about last time?  Finished DES  AES.
 2012 Pearson Education, Inc. Slide Chapter 5 Number Theory.
Dan Boneh Intro. Number Theory Fermat and Euler Online Cryptography Course Dan Boneh.
9.1 Primes and Related Congruence Equations 23 Sep 2013.
Anthology of Encryption Davon Dunajski. In the Beginning Rudimentary Code One Time Pads Enigma Machine Tasks – Authentication – Integrity – Nonrepudiation.
Chapter 4 With Question/Answer Animations 1. Chapter Summary Divisibility and Modular Arithmetic - Sec 4.1 – Lecture 16 Integer Representations and Algorithms.
Perfect Numbers (3/26) Definition. A number is called perfect if it is equal to the sum of its proper divisors. Examples: 6 and 28 are the first two (check!).
EVEN NUMBERS EVEN NUMBERS 1 = prime 2 = prime1 3 = prime 4 = 2 x 22 5 = prime 6 = 2 x 33 7 = prime 8 = 2 x 2 x 24 9 = 3 x 3 10 = 2 x 55.
Section 5.1 Number Theory.
PRIME NUMBERS PRESENTED BY : NANDAN GOEL.
Chapter 4 (Part 1): Induction & Recursion
Chapter 5: Number Theory
6*. An Introduction to Number Theory
Perfect numbers.
Section 5.1 Number Theory.
Prime and Relatively Prime Numbers
Chapter 5 Number Theory 2012 Pearson Education, Inc.
Introduction to Cryptography
Section 5.1 Number Theory.
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Chapter 5 Number Theory 2012 Pearson Education, Inc.
Presentation transcript:

SECTION 5-2 Large Prime Numbers Slide 5-2-1

THE INFINITUDE OF PRIMES Slide There is no largest prime number. Euclid proved this around 300 B.C.

THE SEARCH FOR LARGE PRIMES Slide Primes are the basis for modern cryptography systems, or secret codes. Mathematicians continue to search for larger and larger primes. The theory of prime numbers forms the basis of security systems for vast amounts of personal, industrial, and business data.

MERSENNE NUMBERS AND MERSENNE PRIMES Slide For n = 1, 2, 3, …, the Mersenne numbers are those generated by the formula 1.If n is composite, then M n is composite. 2.If n is prime, then M n may be prime or composite. The prime values of M n are called Mersenne primes.

EXAMPLE: MERSENNE NUMBERS Slide Find the Mersenne number for n = 5. Solution M 5 = 2 5 – 1 = 32 – 1 = 31

FERMAT NUMBERS Slide Fermat numbers are another attempt at generating prime numbers. The Fermat numbers are generated by the formula The first five Fermat numbers (through n = 4) are prime.

EULER’S AND ESCOTT’S FORMULAS FOR FINDING PRIMES Slide Euler’s prime number formula first fails at n = 41: Escott’s prime number formula first fails at n = 80: