Prime numbers are also used to send encrypted messages in the eld Cryptography in the
past and today. In cryptography, each user has two dierent keys, one open and one secret for
encryption and decryption. The public key is public and anyone can see it. The secret key is
kept condential and should not be known to anyone other than its owner. Encryption is done
with a public key, while the decryption is done with a private key. we will start with the denition of perfectly safe prime numbers that
we will use in encryption with prime numbers. Then we will use the perfect numbers that we
have created in RSA and Rabin encryptions.
Prime Numbers Distribution of Primes Applications of Prime Numbers
Birincil Dil | İngilizce |
---|---|
Konular | Mühendislik |
Bölüm | Articles |
Yazarlar | |
Yayımlanma Tarihi | 28 Aralık 2020 |
Kabul Tarihi | 25 Aralık 2020 |
Yayımlandığı Sayı | Yıl 2020 Cilt: 3 Sayı: 2 |