Browse Definitions :
Definition

# prime number

A prime number is a whole number greater than 1 whose only factors are 1 and itself. A factor is a whole number that can be divided evenly into another number. The first few prime numbers are 2, 3, 5, 7, 11, 13, 17, 19, 23 and 29. Numbers that have more than two factors are called composite numbers. The number 1 is neither prime nor composite.

Prime numbers can be used for a number of reasons. For example, some types of cryptography will use prime numbers.

For every prime number, for example "p," there exists a prime number that is greater than p, called p'. This mathematical proof, which was demonstrated in ancient times by the Greek mathematician Euclid, validates the concept that there is no "largest" prime number. As the set of natural numbers N = {1, 2, 3, ...} proceeds, prime numbers do generally become less frequent and are more difficult to find in a reasonable amount of time.

### How to determine if a number is prime

A computer can be used to test extremely large numbers to see if they are prime. But, because there is no limit to how large a natural number can be, there is always a point where testing in this manner becomes too great a task -- even for the most powerful supercomputers. As an example, the largest known prime number in December of 2018 was 24,862,048 digits.

Various algorithms have been formulated in an attempt to generate ever-larger prime numbers. For example, suppose "n" is a whole number, and it is not yet known if n is prime or composite. First, take the square root -- or the 1/2 power -- of n; then round this number up to the next highest whole number and call the result m. Then find all of the following quotients:

qm = n / m
q(m-1) = n / (m-1)
q(m-2) = n / (m-2)
q(m-3) = n / (m-3)
. . .
q3 = n / 3
q2 = n / 2

The number n is prime if -- and only if -- none of the q's, as derived above, are whole numbers.

### Mersenne and Fermat primes

A Mersenne prime is a number that must be reducible to the form 2 n - 1, where n is a prime number. The first few known values of n that produce Mersenne primes are where n = 2, n = 3, n = 5, n = 7, n = 13, n = 17, n = 19, n = 31, n = 61, and n = 89.

A Fermat prime is a Fermat number that is also prime. A Fermat number F n is of the form 2 m + 1, where m signifies the power of 2 -- that is, m = 2 n, and where n is an integer.

### Prime numbers and cryptography

Encryption always follows a fundamental rule: the algorithm -- or the actual procedure being used -- doesn't need to be kept secret, but the key does. Prime numbers can be very useful for creating keys. For example, the strength of public/private key encryption lies in the fact that it's easy to calculate the product of two randomly chosen prime numbers. However, it can be very difficult and time-consuming to determine which two prime numbers were used to create an extremely large product, when only the product is known.

In RSA (Rivest-Shamir-Adleman), a well-known example of public key cryptography, prime numbers are always supposed to be unique. The primes used by the Diffie-Hellman key exchange and the Digital Signature Standard (DSS) cryptography schemes, however, are frequently standardized and used by a large number of applications.

This was last updated in December 2020

• network traffic

Network traffic is the amount of data that moves across a network during any given time.

• dynamic and static

In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

• MAC address (media access control address)

A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

• Evil Corp

Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

• Trojan horse

In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

• quantum key distribution (QKD)

Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

• green IT (green information technology)

Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

• benchmark

A benchmark is a standard or point of reference people can use to measure something else.

• spatial computing

Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

• talent acquisition

Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

• employee retention

Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

• hybrid work model

A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

• BOPIS (buy online, pick up in-store)

BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

• real-time analytics

Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

• database marketing

Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

Close