Prime numbers and cryptography

In summary, the creation of cryptography is based on the real-life inability to factor large numbers easily and the belief that factoring is NP-hard. This is why number theory and primes are used in most protocols, as they provide the hard part to 'undo' in the encryption process. The RSA algorithm is a popular example of this and can be found in "A Concrete Introduction to Higher Algebra" by Lindsay Childs. Other techniques, such as one-way functions, are also considered for security purposes.
  • #1
synkk
216
0
Hello, this is rather vague but I had a lecture around a year ago about prime numbers and how a mathematician (Hardy or Euler?) found a proof to do with prime numbers and then this lead on to cryptography and internet security...

That's all I can particularly remember but I'm wondering on what was the theorem or who was the mathematician that proved this specific "thing" which lead to the creation of cryptography.

Also I remember it had Modular arithmetic!
 
Physics news on Phys.org
  • #2
synkk said:
Hello, this is rather vague but I had a lecture around a year ago about prime numbers and how a mathematician (Hardy or Euler?) found a proof to do with prime numbers and then this lead on to cryptography and internet security...

That's all I can particularly remember but I'm wondering on what was the theorem or who was the mathematician that proved this specific "thing" which lead to the creation of cryptography.

Also I remember it had Modular arithmetic!

That's actually a very beautiful subject if you like math but would take some time to understand. It's no particular theorem but just rather the real-life inability to factor large numbers easily. So if I write down a 1000-digit number and it's the product of two primes, and if those two primes are carefully chosen, it's virtually impossible to determine them by any means even by trial and error using the current state of compute technology. Therefore, if I encrypt a message, convert it to numbers and this conversion involves the product of two very large primes, it's practically impossible to decipher my code without knowing beforehand what the prime numbers used in the encryption were.

Here's one reference: "A Concrete Introduction to Higher Algebra", by Lindsay Childs. It has several chapters dealing with the algorithm, knows as the RSA algorithm.
 
Last edited:
  • #3
Hey synkk.

To follow up on your post, the reason why cryptography is based on primes for most of the protocols is that it is believed that factoring is NP-hard in the way that the computational complexity is exponential in terms of O(e^n) (or something similar).

The main premise of cryptography is that we want a process that has an inverse which is easy to do, but hard to undo. As of now, it turns out that number theory provides the hard part to 'undo', because a lot of these schemes rely on the fact that it's hard to factor numbers: The schemes don't actually factor primes specifically, but the factoring of prime numbers for a lot of these schemes is equivalent to decoding a particular message.

If there were other techniques that provided this 'easy to do, hard to undo' mechanism that didn't involve primes, then they would most likely be considered and in fact, in the security realm of mathematics, these are considered in many related ways like with one-way functions (One-way functions are not bijective like with encoding and decoding messages, but they are important for security purposes).

So that's the basic reason why number theory is used: many people believe that factoring is a hard process and based on this, we continue to use the schemes based on number theory, diophantine analysis, and primes.
 
  • #4
jackmell said:
It's no particular theorem
Except, perhaps, the algebra which shows the encode and decode algorithms are indeed inverses.
 
  • #5
A basic source for you, on RSA criptography-Public Key:

http://en.wikipedia.org/wiki/RSA_(algorithm )
 
Last edited by a moderator:

1. What is a prime number?

A prime number is a positive integer that is only divisible by 1 and itself. This means that it has exactly two factors, 1 and the number itself. Examples of prime numbers include 2, 3, 5, 7, 11, and so on.

2. Why are prime numbers important in cryptography?

Prime numbers are crucial in cryptography because they are the building blocks of many encryption algorithms. These algorithms use large prime numbers to generate keys and encode data, making it difficult for hackers to decipher the information without the correct key.

3. How are prime numbers used in RSA encryption?

In RSA encryption, two large prime numbers are multiplied together to create a public key. This public key is used to encrypt data, which can only be decrypted by using the two prime numbers, known as the private key. The difficulty of factoring large prime numbers is what makes RSA encryption secure.

4. Can prime numbers be used for more than just encryption?

Yes, prime numbers have applications in many areas of mathematics and computer science, such as in generating random numbers, creating secure hash functions, and in coding theory. They are also used in various real-world applications, such as in generating credit card numbers or creating unique identification numbers.

5. Are there any patterns or sequences in prime numbers?

While there are some patterns in the distribution of prime numbers, they are generally considered to be random and unpredictable. There is no known formula for generating prime numbers, and their occurrence cannot be predicted with certainty. This makes them ideal for use in cryptography, as it is difficult for hackers to guess or predict the prime numbers used in encryption algorithms.

Similar threads

  • Linear and Abstract Algebra
Replies
2
Views
808
  • Linear and Abstract Algebra
Replies
2
Views
2K
Replies
2
Views
3K
  • Linear and Abstract Algebra
Replies
4
Views
2K
  • Linear and Abstract Algebra
Replies
9
Views
5K
  • Linear and Abstract Algebra
Replies
6
Views
7K
  • Linear and Abstract Algebra
Replies
2
Views
3K
Replies
6
Views
3K
  • Linear and Abstract Algebra
Replies
8
Views
7K
Replies
4
Views
1K
Back
Top