Skip to main content

2013 | OriginalPaper | Buchkapitel

An Improved Divisibility Test Algorithm for Primality Testing

verfasst von : Arjun Kumar, TaeYong Kim, HoonJae Lee

Erschienen in: Ubiquitous Information Technologies and Applications

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security of information is a major concern now a days in the world. Cryptography plays a major role in ensuring the safety of the information that is being transferred over the internet or any unsecure medium. Prime Numbers are very important aspect of any Cryptographic System and play a major role in ensuring the safety of the concerned Cryptographic System. Currently there are various algorithms used for checking that a particular number is a prime or not. Few of the commonly used algorithms are Divisibility Test, Fermat Test, and Chinese Primality Test etc. This paper proposes an enhancement in the Divisibility Primality Testing algorithm that reduces the number of comparisons to be made and thus enhancing the performance of the algorithm. In addition to this the pseudo code and implementation code of the improved algorithm are provided in detail. An analysis and comparison of the existing algorithm and the enhanced algorithm is also presented in the given paper.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code In C. Wiley, New York (1996)MATH Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code In C. Wiley, New York (1996)MATH
2.
Zurück zum Zitat Van Der Lubbe, J.C.A.: Basic Methods of Cryptography. Cambridge University Press, New York (1998)MATH Van Der Lubbe, J.C.A.: Basic Methods of Cryptography. Cambridge University Press, New York (1998)MATH
3.
4.
Zurück zum Zitat Kumar, R.S., Pradeep,E., Naveen, K., Gunasekaran, R.: Enhanced cost effective symmetric key algorithm for small amount of data. In: 2nd IEEE International Conference on Signal Acquisition and Processing, pp. 354–357. IEEE Press, Bangalore (2010) Kumar, R.S., Pradeep,E., Naveen, K., Gunasekaran, R.: Enhanced cost effective symmetric key algorithm for small amount of data. In: 2nd IEEE International Conference on Signal Acquisition and Processing, pp. 354–357. IEEE Press, Bangalore (2010)
5.
Zurück zum Zitat Singh, S.: Analysis and implementation of public-key cryptosystem based on the boolean satisfiability problem. In: 7th Malasia International Conference on Communication, pp. 704–709. IEEE Press, Kuala Lumpur (2005) Singh, S.: Analysis and implementation of public-key cryptosystem based on the boolean satisfiability problem. In: 7th Malasia International Conference on Communication, pp. 704–709. IEEE Press, Kuala Lumpur (2005)
6.
Zurück zum Zitat Bresson, P D.C., Pointcheval, D.: A simple public key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Aciacrypt 2003. LNCS, vol. 2894, pp. 37–54. Springer, Berlin (2003) Bresson, P D.C., Pointcheval, D.: A simple public key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Aciacrypt 2003. LNCS, vol. 2894, pp. 37–54. Springer, Berlin (2003)
7.
Zurück zum Zitat Adleman, L.M.: On distinguishing prime numbers from composite numbers. In: 21st IEEE Annual Symposium on Foundations of Computer Science, pp. 387–406. IEEE Press, New York (1980) Adleman, L.M.: On distinguishing prime numbers from composite numbers. In: 21st IEEE Annual Symposium on Foundations of Computer Science, pp. 387–406. IEEE Press, New York (1980)
8.
Zurück zum Zitat Fellows, M.R., Koblitz, N.: Self-witnessing polynomial-time complexity and prime factorization. In: Proceedings of the Seventh Annual Structure in Complexity Theory Conference, pp. 107–110.I EEE Press, Canada (1992) Fellows, M.R., Koblitz, N.: Self-witnessing polynomial-time complexity and prime factorization. In: Proceedings of the Seventh Annual Structure in Complexity Theory Conference, pp. 107–110.I EEE Press, Canada (1992)
9.
Zurück zum Zitat Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security. Mc Graw Hill, India (2011) Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security. Mc Graw Hill, India (2011)
10.
Zurück zum Zitat Agrawal, M., Kayal, N., Saxena, N.: PRIMES is in P. Ann. Math. 2, 781–793 (2002)MathSciNet Agrawal, M., Kayal, N., Saxena, N.: PRIMES is in P. Ann. Math. 2, 781–793 (2002)MathSciNet
12.
Zurück zum Zitat Agrawal, M., Biswas, S.: Primality and identity testing via Chinese remaindering. In: 40th IEEE Annual Symposium on Foundations of Computer Science, pp. 202–208. IEEE Press, Kanpur (1999) Agrawal, M., Biswas, S.: Primality and identity testing via Chinese remaindering. In: 40th IEEE Annual Symposium on Foundations of Computer Science, pp. 202–208. IEEE Press, Kanpur (1999)
13.
Zurück zum Zitat Zhu, W.T.: Analyzing euler-fermat theorem based multicast key distribution schemes with chinese remainder theorem. In: IFIP International Conference on Network and Parallel Computing, pp. 11–17. IEEE Press, Shanghai (2008) Zhu, W.T.: Analyzing euler-fermat theorem based multicast key distribution schemes with chinese remainder theorem. In: IFIP International Conference on Network and Parallel Computing, pp. 11–17. IEEE Press, Shanghai (2008)
14.
Zurück zum Zitat Penzhorn, W.T.: Fast algorithms for the generation of large primes for the RSA cryptosytem. In: Proceedings of the 1992 South African Symposium on Communication and Signal Processing, pp. 169–172. IEEE Press, South Africa (1992) Penzhorn, W.T.: Fast algorithms for the generation of large primes for the RSA cryptosytem. In: Proceedings of the 1992 South African Symposium on Communication and Signal Processing, pp. 169–172. IEEE Press, South Africa (1992)
Metadaten
Titel
An Improved Divisibility Test Algorithm for Primality Testing
verfasst von
Arjun Kumar
TaeYong Kim
HoonJae Lee
Copyright-Jahr
2013
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-5857-5_59

Neuer Inhalt