Taxonomy and Practical Evaluation of Primality Testing Algorithms

06/15/2020
by   Anas AbuDaqa, et al.
0

Modern cryptography algorithms are commonly used to ensure information security. Prime numbers are needed in many asymmetric cryptography algorithms. For example, RSA algorithm selects two large prime numbers and multiplies to each other to obtain a large composite number whose factorization is very difficult. Producing a prime number is not an easy task as they are not distributed regularly through integers. Primality testing algorithms are used to determine whether a particular number is prime or composite. In this paper, an intensive survey is thoroughly conducted among the several primality testing algorithms showing the pros and cons, the time complexity, and a brief summary of each algorithm. Besides, an implementation of these algorithms is accomplished using Java and Python as programming languages to evaluate the efficiency of both the algorithms and the programming languages.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/16/2018

Restructuring of Discrete Logarithm Problem and ElGamal Cryptosystem by Using the Power Fibonacci Sequence Module M

In this paper, we have studied on adapting to asymmetric cryptography po...
research
03/23/2022

Which programming languages do hackers use? A survey at the German Chaos Computer Club

There are numerous articles about the programming languages most commonl...
research
01/04/2023

Implementation of hyperbolic complex numbers in Julia language

Background: Hyperbolic complex numbers are used in the description of hy...
research
06/25/2020

Strengthening the Baillie-PSW primality test

The Baillie-PSW primality test combines Fermat and Lucas probable prime ...
research
03/21/2022

Joint Probabilities within Random Permutations

A celebrated analogy between prime factorizations of integers and cycle ...
research
11/04/2021

An Empirical Comparison of the Quadratic Sieve Factoring Algorithm and the Pollard Rho Factoring Algorithm

One of the most significant challenges on cryptography today is the prob...

Please sign up or login with your details

Forgot password? Click here to reset