Skip to main content

Prime Numbers and Cryptography

  • Chapter
  • First Online:
Prime Numbers and Computer Methods for Factorization

Part of the book series: Modern Birkhäuser Classics ((MBC))

  • 2813 Accesses

Abstract

There is a remarkable disparity between the degree of difficulty of the task of multiplication and that of factorization. Multiplying integers together is a reasonable exercise for a young child if the integers are small, and it remains a very straightforward task even when the integers are very large. The reverse operation, however, that of resolving a given integer into factors, is cumbersome except for the very smallest integers and becomes near to impossible for large numbers. This assymmetry is exploited in a new kind of cryptosystem, called RSA after its discoverers, Rivest, Shamir and Adleman. In the RSA system secrecy is provided by placing a would-be codebreaker in a situation where in principle he commands all information necessary for reading the protected message but is confronted with an arithmetic task which in practice is prohibitively time-consuming.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Bibliography

  1. Claude Shannon, “A Mathematical Theory of Communication,” Bell System Technical Journal 27 (1948) pp. 379–423 and 623–656.

    MathSciNet  MATH  Google Scholar 

  2. . Martin Gardner, “A New Kind of Cipher that Would Take Millions of Years to Break;” Scientific Am. 237 (Aug. 1977) pp. 120–124.

    Article  Google Scholar 

  3. W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Inform. Theory 22 (1976) pp. 644–654.

    Article  MathSciNet  MATH  Google Scholar 

  4. R. L. Rivest, A. Shamir, and L. Adleman, “A Method For Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM 21 (1978) pp. 120–126.

    Article  MathSciNet  MATH  Google Scholar 

  5. Alan G. Konheim, Cryptography: A Primer, Wiley-Interscience, New York, 1981.

    MATH  Google Scholar 

  6. . János Pintz, William L. Steiger, and Endre Szemerédi, “Infinite Sets of Primes with Fast Primality Tests and Quick Generation of Large Primes,” Math. Comp. 53 (1989) pp. 399–406.

    Article  MathSciNet  MATH  Google Scholar 

  7. Neal Koblitz, A Course in Number Theory and Cryptography, Springer-Verlag, 1987.

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hans Riesel .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Riesel, H. (2011). Prime Numbers and Cryptography. In: Prime Numbers and Computer Methods for Factorization. Modern Birkhäuser Classics. Birkhäuser, Boston, MA. https://doi.org/10.1007/978-0-8176-8298-9_7

Download citation

Publish with us

Policies and ethics