Which Mathematician's Theorem Linked Prime Numbers to Cryptography?

Click For Summary

Discussion Overview

The discussion revolves around the connection between prime numbers and cryptography, particularly focusing on the mathematical foundations that enable secure communication. Participants explore the role of prime numbers in cryptographic algorithms, especially in relation to modular arithmetic and the difficulty of factoring large numbers.

Discussion Character

  • Exploratory
  • Technical explanation
  • Conceptual clarification
  • Debate/contested

Main Points Raised

  • One participant recalls a lecture about prime numbers and their link to cryptography, mentioning mathematicians like Hardy or Euler, but is uncertain about specific theorems.
  • Another participant explains that the security of cryptographic systems is based on the difficulty of factoring large numbers, particularly products of two carefully chosen primes.
  • A subsequent reply discusses the belief that factoring is NP-hard, suggesting that the computational complexity of this problem is significant, which underpins the security of cryptographic protocols.
  • It is noted that cryptographic schemes rely on the premise of having processes that are easy to perform but hard to reverse, with number theory providing the necessary complexity.
  • One participant mentions that there is no specific theorem but refers to the algebra that demonstrates the inverse relationship of encoding and decoding algorithms.
  • A basic source on RSA cryptography is provided for further reading.

Areas of Agreement / Disagreement

Participants express various viewpoints on the relationship between prime numbers and cryptography, with no consensus on a specific theorem or mathematician. The discussion includes differing interpretations of the mathematical principles involved.

Contextual Notes

Participants reference the RSA algorithm and its reliance on the difficulty of factoring large numbers, but there is no detailed exploration of the mathematical proofs or assumptions involved in these claims.

Who May Find This Useful

This discussion may be of interest to individuals exploring the mathematical foundations of cryptography, particularly those curious about the role of prime numbers and modular arithmetic in secure communication.

synkk
Messages
216
Reaction score
0
Hello, this is rather vague but I had a lecture around a year ago about prime numbers and how a mathematician (Hardy or Euler?) found a proof to do with prime numbers and then this lead on to cryptography and internet security...

That's all I can particularly remember but I'm wondering on what was the theorem or who was the mathematician that proved this specific "thing" which lead to the creation of cryptography.

Also I remember it had Modular arithmetic!
 
Physics news on Phys.org
synkk said:
Hello, this is rather vague but I had a lecture around a year ago about prime numbers and how a mathematician (Hardy or Euler?) found a proof to do with prime numbers and then this lead on to cryptography and internet security...

That's all I can particularly remember but I'm wondering on what was the theorem or who was the mathematician that proved this specific "thing" which lead to the creation of cryptography.

Also I remember it had Modular arithmetic!

That's actually a very beautiful subject if you like math but would take some time to understand. It's no particular theorem but just rather the real-life inability to factor large numbers easily. So if I write down a 1000-digit number and it's the product of two primes, and if those two primes are carefully chosen, it's virtually impossible to determine them by any means even by trial and error using the current state of compute technology. Therefore, if I encrypt a message, convert it to numbers and this conversion involves the product of two very large primes, it's practically impossible to decipher my code without knowing beforehand what the prime numbers used in the encryption were.

Here's one reference: "A Concrete Introduction to Higher Algebra", by Lindsay Childs. It has several chapters dealing with the algorithm, knows as the RSA algorithm.
 
Last edited:
Hey synkk.

To follow up on your post, the reason why cryptography is based on primes for most of the protocols is that it is believed that factoring is NP-hard in the way that the computational complexity is exponential in terms of O(e^n) (or something similar).

The main premise of cryptography is that we want a process that has an inverse which is easy to do, but hard to undo. As of now, it turns out that number theory provides the hard part to 'undo', because a lot of these schemes rely on the fact that it's hard to factor numbers: The schemes don't actually factor primes specifically, but the factoring of prime numbers for a lot of these schemes is equivalent to decoding a particular message.

If there were other techniques that provided this 'easy to do, hard to undo' mechanism that didn't involve primes, then they would most likely be considered and in fact, in the security realm of mathematics, these are considered in many related ways like with one-way functions (One-way functions are not bijective like with encoding and decoding messages, but they are important for security purposes).

So that's the basic reason why number theory is used: many people believe that factoring is a hard process and based on this, we continue to use the schemes based on number theory, diophantine analysis, and primes.
 
jackmell said:
It's no particular theorem
Except, perhaps, the algebra which shows the encode and decode algorithms are indeed inverses.
 
A basic source for you, on RSA criptography-Public Key:

http://en.wikipedia.org/wiki/RSA_(algorithm )
 
Last edited by a moderator:

Similar threads

  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 2 ·
Replies
2
Views
3K
  • · Replies 8 ·
Replies
8
Views
8K
  • · Replies 228 ·
8
Replies
228
Views
37K
  • · Replies 1 ·
Replies
1
Views
3K
Replies
1
Views
4K
  • · Replies 5 ·
Replies
5
Views
6K
Replies
6
Views
4K
  • · Replies 14 ·
Replies
14
Views
3K
  • · Replies 6 ·
Replies
6
Views
6K