Preview

Aks Primality Theorem

Satisfactory Essays
Open Document
Open Document
450 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aks Primality Theorem
The AKS primality test (also known as Agrawal–Kayal–Saxena primality test and cyclotomic AKS test) is a deterministic primality-proving algorithm created and published by Manindra Agrawal, Neeraj Kayal, and Nitin Saxena, computer scientists at the Indian Institute of Technology Kanpur, on August 6, 2002, in a paper titled "PRIMES is in P".[1] The authors received many accolades, including the 2006 Gödel Prize and the 2006 Fulkerson Prize, for this work.

The algorithm determines whether a number is prime or composite within polynomial time.
Contents

1 Importance 2 Concepts 3 History and running time 4 Algorithm 5 References 6 External links

Importance

AKS is the first primality-proving algorithm to be simultaneously general, polynomial, deterministic, and unconditional. Previous algorithms had been developed for centuries but achieved three of these properties at most, but not all four.

The AKS algorithm can be used to verify the primality of any general number given. Many fast primality tests are known that work only for numbers with certain properties. For example, the Lucas–Lehmer test for Mersenne numbers works only for Mersenne numbers, while Pépin's test can be applied to Fermat numbers only. The maximum running time of the algorithm can be expressed as a polynomial over the number of digits in the target number. ECPP and APR conclusively prove or disprove that a given number is prime, but are not known to have polynomial time bounds for all inputs. The algorithm is guaranteed to distinguish deterministically whether the target number is prime or composite. Randomized tests, such as Miller–Rabin and Baillie–PSW, can test any given number for primality in polynomial time, but are known to produce only a probabilistic result. The correctness of AKS is not conditional on any subsidiary unproven hypothesis. In contrast, the Miller test is fully deterministic and runs in polynomial time over all

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Consequently, if the advantage of A against the proposed scheme is ϵ, the success probability of the algorithm C against the DDH challenge is at least ϵ/(e(m!q_T+1)).…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Lab Report

    • 880 Words
    • 4 Pages

    This POW is all about finding information and patterns about the way divisors of certain numbers are found and expressed. In this POW when we talk about divisors we usually are counting the number of divisors that a number has. The divisor is a number that a number can be divided by, of course every number is divisible by every other number but in these problems we are only talking about whole, positive numbers. Every number is divisible evenly by one or itself so every number has at least 2 divisors. Numbers that have only 2 divisors are called prime numbers, only uneven numbers can be prime numbers, all even numbers except two have at least 3 divisors, the number itself, 1 and 2.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Chem 100 Study Guide

    • 957 Words
    • 7 Pages

    partial or unclear erasures may be graded as incorrect. You may use a nonprogrammable calculator on this test. A copy of the Periodic Table of Elements is…

    • 957 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    The Revolutionary War was not a war that was fought just to show the British what the colonials were capable of. It was fought to earn our independence and freedom from the unfair British rule. We knew that we did not want to live like that anymore, so we fought as hard and strategically as we could and in the end won the war and our independence. There are three main reasons why the Colonials won the Revolutionary War. The first reason is that leading up to the war, we boycotted all kinds of British goods to show them that we still held some form of power while under their control and would not stand to be taxed unfairly.…

    • 213 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Basketball: a game that requires quickness, strength, intelligence, and focus on both the offensive and defensive end. It is difficult, though, to play this game and maintain these skills when you’re defending or being defended by the lightning-fast Sean Michael Frank.…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. It checks the vulnerabilities which resists a remote cracker to get control or access the sensitive data on a user systems.…

    • 692 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Promethium, Pm, is the 61st element on the Periodic Table. It was discovered in 1945 by Jacob A. Marinsky. It’s a metal, and named after the Greek God Prometheus. It is not naturally occurring, but can survive outside of a lab.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Purpose: Finding the general properties of elements through tests and then being able to organize the metals, nonmetals, and semimetals on the periodic table.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    As part of your research plan, you must first draft a research question for your research paper that will guide the rest of your writing. A research question, which is more specific and focused than a general topic, is the question that your research paper will be answering. For example, if your general area of interest is social security, a possible research question might ask “How can low-income families save more money if the United States had a reformed social security plan that includes personal retirement accounts?”…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Andrew John Wiles

    • 779 Words
    • 4 Pages

    Fermat’s Last Theorem states that no three positive integers a, b, and c can satisfy the equation an + bn = cn for any integer value of n that’s greater than two. Pierre de Fermat speculated this theorem in 1637. Fermat only left the proof of…

    • 779 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Josh

    • 6922 Words
    • 28 Pages

    5. Scott R. Fluhrer, Itsik Mantin, and Adi Shamir. Weaknesses in the key scheduling algorithm of RC4. In Serge Vaudenay and Amr M. Youssef, editors, Selected Areas in Cryptography 2001, volume 2259 of Lecture Notes in Computer Science, pages 1–24. Springer, 2001. 6. David Hulton (h1kari). bsd-airtools. http://www.dachb0den.com/projects/ bsd-airtools.html. 7. Andreas Klein. Attacks on the RC4 stream cipher. submitted to Designs, Codes and Cryptography, 2007. 8. KoreK. chopchop (experimental WEP attacks). http://www.netstumbler.org/ showthread.php?t=12489, 2004. 9. KoreK. Next generation of WEP attacks? http://www.netstumbler.org/ showpost.php?p=93942&postcount=35, 2004. 10. Subhamoy Maitra and Goutam Paul. Many keystream bytes of RC4 leak secret key information. Cryptology ePrint Archive, Report 2007/261, 2007. http://eprint. iacr.org/. 11. Toshihiro Ohigashi, Hidenori Kuwakado, and Masakatu Morii. A key recovery attack on WEP with less packets. to be published, 2007. 12. Yuko Ozasa, Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, and Masakatu Morii. A study on the Tews, Weinmann, Pyshkin attack against WEP. In IEICE Tech. Rep., volume 107 of ISEC2007-47, pages 17–21, Hokkaido, July 2007. Thu, Jul 19, 2007 - Fri, Jul 20 : Future University-Hakodate (ISEC, SITE, IPSJ-CSEC). 13. D. C. Plummer. RFC 826: Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware, November 1982. 14. Jon Postel. Internet Protocol. Request for Comments (Standard) 791, Internet Engineering Task Force, September 1981. 15. Adam Stubblefield, John Ioannidis, and Aviel D. Rubin. A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Transactions on Information and System Security, 7(2):319–332, May 2004. 16. The Aircrack-NG team. Aircrack-ng suite, 2007. http://www.aircrack-ng.org. 17. Serge Vaudenay and Martin Vuagnoux. Passive-only key recovery attacks on RC4. In Selected Areas in Cryptography 2007, Lecture Notes in Computer Science. Springer, 2007. to appear. 18. Wi-Fi Alliance. Wi-Fi Protected Acccess (WPA), 2003. http://www.wi-fi.org.…

    • 6922 Words
    • 28 Pages
    Good Essays
  • Powerful Essays

    * Implement one of our PDP schemes and show experimentally that probabilistic possession guarantees make it practical to verify possession of large data sets.…

    • 1129 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Federal Information Processing Standards Publication 197. (2001, 11 26). Announcing the ADVANCED ENCRYPTION STANDARD (AES). Retrieved 12 1, 2014, from csrc.nist.gov: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf…

    • 2415 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    they realized that computers could manipulate not only numbers but also symbols. That meant that computers should be…

    • 13045 Words
    • 53 Pages
    Good Essays
  • Good Essays

    Partial Sums of Primes

    • 4599 Words
    • 19 Pages

    Where n ranges over the positive integers from 1 to infinity and where s is a complex number. To get an understanding of the importance of this function, one needs to know some history about it. Dating back to the times of Euclid, the prime numbers have been studied in great deal. What makes them the most interesting over the other numbers is that they hold a special property of not being able to be decomposed into to separate integers. The only numbers that the primes are divisible by is one and themselves. Another, more interesting topic about the primes is their distribution. The question that is asked is “Are the primes distributed in a regular pattern or just randomly placed throughout the integers?” This question is answered by the Riemann Hypothesis to an extent.…

    • 4599 Words
    • 19 Pages
    Good Essays

Related Topics