Pseudo-prime number simulation and its application for security purpose
Many public cryptography schemes rely on the use of prime numbers like for encryption and decryption. A prime number is one number that is widely used and large and consists of hundreds of digits, so it takes time to test whether the numbers are prime or not. Miller-Rabin is one algorithm that could...
Main Authors: | , , , , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2018-01-01
|
Series: | MATEC Web of Conferences |
Online Access: | https://doi.org/10.1051/matecconf/201819703005 |
_version_ | 1818577712347873280 |
---|---|
author | Rahim Robbi Kurniasih Nuning Pohan Nurmaliana Sriadhi S Listyorini Tri Nanuru Ricardo Freedom Manurung Rosida Tiurma Najmurrokhman Asep Hasibuan Abdurrozzaq Abdullah Dahlan Napitupulu Darmawan |
author_facet | Rahim Robbi Kurniasih Nuning Pohan Nurmaliana Sriadhi S Listyorini Tri Nanuru Ricardo Freedom Manurung Rosida Tiurma Najmurrokhman Asep Hasibuan Abdurrozzaq Abdullah Dahlan Napitupulu Darmawan |
author_sort | Rahim Robbi |
collection | DOAJ |
description | Many public cryptography schemes rely on the use of prime numbers like for encryption and decryption. A prime number is one number that is widely used and large and consists of hundreds of digits, so it takes time to test whether the numbers are prime or not. Miller-Rabin is one algorithm that could be used to test prime number. Simulation to show how to test non-prime number elimination process can be used to determine the workings of the Miller-Rabin algorithm and also could be used as a media learning for students and lecturers to know how prime number test and generation. |
first_indexed | 2024-12-16T06:34:16Z |
format | Article |
id | doaj.art-3a6f5b4fe9b3450cbc8b0689a6106988 |
institution | Directory Open Access Journal |
issn | 2261-236X |
language | English |
last_indexed | 2024-12-16T06:34:16Z |
publishDate | 2018-01-01 |
publisher | EDP Sciences |
record_format | Article |
series | MATEC Web of Conferences |
spelling | doaj.art-3a6f5b4fe9b3450cbc8b0689a61069882022-12-21T22:40:49ZengEDP SciencesMATEC Web of Conferences2261-236X2018-01-011970300510.1051/matecconf/201819703005matecconf_aasec2018_03005Pseudo-prime number simulation and its application for security purposeRahim RobbiKurniasih NuningPohan NurmalianaSriadhi SListyorini TriNanuru Ricardo FreedomManurung Rosida TiurmaNajmurrokhman AsepHasibuan AbdurrozzaqAbdullah DahlanNapitupulu DarmawanMany public cryptography schemes rely on the use of prime numbers like for encryption and decryption. A prime number is one number that is widely used and large and consists of hundreds of digits, so it takes time to test whether the numbers are prime or not. Miller-Rabin is one algorithm that could be used to test prime number. Simulation to show how to test non-prime number elimination process can be used to determine the workings of the Miller-Rabin algorithm and also could be used as a media learning for students and lecturers to know how prime number test and generation.https://doi.org/10.1051/matecconf/201819703005 |
spellingShingle | Rahim Robbi Kurniasih Nuning Pohan Nurmaliana Sriadhi S Listyorini Tri Nanuru Ricardo Freedom Manurung Rosida Tiurma Najmurrokhman Asep Hasibuan Abdurrozzaq Abdullah Dahlan Napitupulu Darmawan Pseudo-prime number simulation and its application for security purpose MATEC Web of Conferences |
title | Pseudo-prime number simulation and its application for security purpose |
title_full | Pseudo-prime number simulation and its application for security purpose |
title_fullStr | Pseudo-prime number simulation and its application for security purpose |
title_full_unstemmed | Pseudo-prime number simulation and its application for security purpose |
title_short | Pseudo-prime number simulation and its application for security purpose |
title_sort | pseudo prime number simulation and its application for security purpose |
url | https://doi.org/10.1051/matecconf/201819703005 |
work_keys_str_mv | AT rahimrobbi pseudoprimenumbersimulationanditsapplicationforsecuritypurpose AT kurniasihnuning pseudoprimenumbersimulationanditsapplicationforsecuritypurpose AT pohannurmaliana pseudoprimenumbersimulationanditsapplicationforsecuritypurpose AT sriadhis pseudoprimenumbersimulationanditsapplicationforsecuritypurpose AT listyorinitri pseudoprimenumbersimulationanditsapplicationforsecuritypurpose AT nanururicardofreedom pseudoprimenumbersimulationanditsapplicationforsecuritypurpose AT manurungrosidatiurma pseudoprimenumbersimulationanditsapplicationforsecuritypurpose AT najmurrokhmanasep pseudoprimenumbersimulationanditsapplicationforsecuritypurpose AT hasibuanabdurrozzaq pseudoprimenumbersimulationanditsapplicationforsecuritypurpose AT abdullahdahlan pseudoprimenumbersimulationanditsapplicationforsecuritypurpose AT napitupuludarmawan pseudoprimenumbersimulationanditsapplicationforsecuritypurpose |