Browse Definitions :
Definition

# Fermat prime

A Fermat prime is a Fermat number that is also a prime number . A Fermat number F n is of the form 2 m + 1, where m is the n th power of 2 (that is, m = 2 n , where n is an integer ). To find the Fermat number F n for an integer n , you first find m = 2 n , and then calculate 2 m + 1. The term arises from the name of a 17th-Century French lawyer and mathematician, Pierre de Fermat, who first defined these numbers and noticed their significance.

Fermat believed that all numbers of the above form are prime numbers; that is, that F n is prime for all integral values of n . This is indeed the case for n = 0, n = 1, n = 2, n = 3, and n = 4:

When n = 0, m = 2 = 1; therefore
F = 2 1 + 1 = 2 + 1 = 3, which is prime

When n = 1,? m = 2 1 = 2; therefore
F 1 = 2 2 + 1 = 4 + 1 = 5, which is prime

When n = 2, m = 2 2 = 4; therefore
F 2 = 2 4 + 1 = 16 + 1 = 17, which is prime

When n = 3, m = 2 3 = 8; therefore
F 3 = 2 8 + 1 = 256 + 1 = 257, which is prime

When n = 4, m = 2 4 = 16; therefore
F 4 = 2 16 + 1 = 65536 + 1 = 65537, which is prime

Using computers, mathematicians have not yet found any Fermat primes for n greater than 4. So far, Fermat's original hypothesis seems to have been wrong. The search continues for Fermat numbers F n that are prime when n is greater than 4.

Compare Mersenne prime .

This was last updated in September 2005

• Wi-Fi 6E

Wi-Fi 6E is one variant of the 802.11ax standard.

• microsegmentation

Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

• network packet

A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

• MICR (magnetic ink character recognition)

MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

• What is cybersecurity?

Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

• Android System WebView

Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

• privacy compliance

Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

• contingent workforce

A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

• product development (new product development -- NPD)

Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

• talent acquisition

Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

• employee retention

Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

• hybrid work model

A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...