2017
DOI: 10.1088/1742-6596/930/1/012032
|View full text |Cite
|
Sign up to set email alerts
|

Prime Number: an Experiment Rabin-Miller and Fast Exponentiation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Security in a cryptographic protocol is very important [12], this is because many attacks on the protocol due to the selection of wrong algorithms in cryptographic protocol. Modular arithmetic [17], greatest common divisor [13], [17], euclidean algorithm, prime number [11] and inverse modulo [18] are used on the application of Pohlig-hellman algorithm and three-pass protocol.…”
Section: Methodsmentioning
confidence: 99%
“…Security in a cryptographic protocol is very important [12], this is because many attacks on the protocol due to the selection of wrong algorithms in cryptographic protocol. Modular arithmetic [17], greatest common divisor [13], [17], euclidean algorithm, prime number [11] and inverse modulo [18] are used on the application of Pohlig-hellman algorithm and three-pass protocol.…”
Section: Methodsmentioning
confidence: 99%
“…The prime number is a positive integer a, where a ≥ 2 can only be divided by 1 and the number itself. The nature of division of integers gives birth to the concepts of prime numbers and modulo arithmetic [1,15,[17][18][19]. Most public-key algorithms use prime numbers as one of their parameter values [20,21].…”
Section: Prime Numbersmentioning
confidence: 99%
“…The problem that arises is that the prime number is infinite. Not only that, many numbers are glimpsed like primes, but in reality they are not [1,15]. This problem causes the search for prime numbers takes longer time for using as key in cryptography algorithms.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cryptography method is one of the methods used to improve data security because it can perform the process of encryption and decryption. There are several encryption algorithms that are already open for study such as DES, AES, TwoFish, BlowFish, RC2, RC4, RC5, RSA [23], [24] (Rivest, Shamir, Adleman) and others. This study discusses the implementation of one time encryption algorithm pad and vigenere cipher to secure text messages [25], [26].…”
Section: Introductionmentioning
confidence: 99%