Primality Tests and Use of Primes in Public-Key Systems

  • Authors:
  • Peter Landrock

  • Affiliations:
  • -

  • Venue:
  • Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the first part of this discussion, we first briefly discuss various prime generation methods, starting with the Rabin-Miller test, and then moving on to a very simple new deterministic test. After that we discuss various ways of constructing so-called strong primes, and why this better be avoided.