Safe primes density and cryptographic applications
Safe prime number deployment has proved to be a major concern when developing public key cryptographic applications. Most popular public key cryptosystems (PKC) are rooted in the grounds of a high-quality safe prime number generator being available. For instance, RSA-present almost anywhere a PKC is...
Saved in:
Published in: | Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303) pp. 363 - 367 |
---|---|
Main Authors: | , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
1999
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Safe prime number deployment has proved to be a major concern when developing public key cryptographic applications. Most popular public key cryptosystems (PKC) are rooted in the grounds of a high-quality safe prime number generator being available. For instance, RSA-present almost anywhere a PKC is needed-is claimed to need the so-called "strong primes", related to safe primes. Similarly, BBS (the Blum-Blum-Shub PKC) is founded on pseudo-random number generation by means of the so-called BBS generator, whose maximal length orbits are obtained precisely when 2-safe primes, verifying some other suitable conditions, are used to build up the congruence modulus. Interest in this type of number encourages research into its density and methods of computation. We present an estimate for the density of both 1-safe and 2-safe prime numbers. |
---|---|
ISBN: | 9780780352476 0780352475 |
DOI: | 10.1109/CCST.1999.797938 |