Browse Definitions :
Definition

Fermat prime

A Fermat prime is a Fermat number that is also a prime number . A Fermat number F n is of the form 2 m + 1, where m is the n th power of 2 (that is, m = 2 n , where n is an integer ). To find the Fermat number F n for an integer n , you first find m = 2 n , and then calculate 2 m + 1. The term arises from the name of a 17th-Century French lawyer and mathematician, Pierre de Fermat, who first defined these numbers and noticed their significance.

Fermat believed that all numbers of the above form are prime numbers; that is, that F n is prime for all integral values of n . This is indeed the case for n = 0, n = 1, n = 2, n = 3, and n = 4:

When n = 0, m = 2 = 1; therefore
F = 2 1 + 1 = 2 + 1 = 3, which is prime

When n = 1,? m = 2 1 = 2; therefore
F 1 = 2 2 + 1 = 4 + 1 = 5, which is prime

When n = 2, m = 2 2 = 4; therefore
F 2 = 2 4 + 1 = 16 + 1 = 17, which is prime

When n = 3, m = 2 3 = 8; therefore
F 3 = 2 8 + 1 = 256 + 1 = 257, which is prime

When n = 4, m = 2 4 = 16; therefore
F 4 = 2 16 + 1 = 65536 + 1 = 65537, which is prime

Using computers, mathematicians have not yet found any Fermat primes for n greater than 4. So far, Fermat's original hypothesis seems to have been wrong. The search continues for Fermat numbers F n that are prime when n is greater than 4.

Compare Mersenne prime .

This was last updated in September 2005

Continue Reading About Fermat prime

SearchNetworking
  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close