Role of Prime Numbers in Cryptography

Authors

  • Dr. Naveen Kashyap Ph.D. in Mathematics, Ambikapur, Surguja, C.G. Author

DOI:

https://doi.org/10.29070/ddy24369

Keywords:

Prime numbers, RSA algorithm, public key cryptography, number theory, data security, modular arithmetic

Abstract

The significance of prime numbers is profound within the domain of cryptography. In recent times, with the advent of digital communication systems, there is a need for the security of messages being transmitted in various fields like banking, e-commerce, government communications, and even personal matters. The field of cryptography is based on problems that are simple to solve in one direction but complex to solve in the other direction. Prime numbers are such examples, especially when large composite numbers are involved.

This paper explores the theoretical and practical role of prime numbers in modern cryptographic systems. This paper commences with basic mathematical concepts regarding prime numbers, which include the Fundamental Theorem of Arithmetic and modular arithmetic.

Next, it elaborates upon the use of these theories in public key encryption through an example of the RSA algorithm. Mathematical formulae are used alongside examples and visual aids to explain the process. Apart from discussing practical applications of prime numbers like internet security, digital signatures, and Blockchain technology, certain challenges are also presented. From the findings, it is evident that the prime number is a critical tool for secure communication in the digital age and will remain an active field of research in mathematics and computer science.

Downloads

Download data is not yet available.

References

1. Rivest, R., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM.

2. Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson Education.

3. Katz, J., & Lindell, Y. (2014). Introduction to Modern Cryptography. CRC Press.

4. Rosen, K. H. (2018). Discrete Mathematics and Its Applications. McGraw-Hill.

5. Paar, C., & Pelzl, J. (2010). Understanding Cryptography. Springer.

6. Koblitz, N. (1994). A Course in Number Theory and Cryptography. Springer.

7. Diffie, W., & Hellman, M. (1976). New Directions in Cryptography. IEEE Transactions on Information Theory.

9. Bernstein, D. J., Buchmann, J., & Dahmen, E. (2022). Post Quantum Cryptography. Springer Nature.

10. Boneh, D., & Shoup, V. (2023). A Graduate Course in Applied Cryptography. Stanford University Press.

11. Alagic, G., et al. (2022). Status Report on the Second Round of the NIST Post Quantum Cryptography Standardization Process. NIST Technical Report.

12. NIST (2023). Digital Signature Standard (DSS) and Public Key Cryptography Updates. National Institute of Standards and Technology.

13. Chen, L., Jordan, S., Liu, Y., Moody, D., Peralta, R., Perlner, R., & Smith Tone, D. (2022). Report on Post Quantum Cryptography. NISTIR Publication.

14. Buchmann, J., Dahmen, E., & Schneider, M. (2022). Post Quantum Cryptography: State of the Art. IEEE Security & Privacy.

15. Aggarwal, D., Brennen, G., Lee, T., Santha, M., & Tomamichel, M. (2023). Quantum Attacks on Cryptographic Systems. ACM Computing Surveys.

16. Bernstein, D. J. (2024). Future Directions in Cryptographic Security. Journal of Cryptographic Engineering.

17. Goldreich, O. (2023). Foundations of Cryptography – Modern Applications. Cambridge University Press.

18. NIST (2024). Post Quantum Cryptography Standardization: Selected Algorithms. National Institute of Standards and Technology.

19. Alkim, E., Bos, J., Ducas, L., Longa, P., Mironov, I., Naehrig, M., Nikolaenko, V., Peikert, C., Raghunathan, A., & Stebila, D. (2024). Post Quantum Cryptography for Internet Security. IEEE Communications Surveys & Tutorials.

Downloads

Published

2026-04-01

How to Cite

[1]
“Role of Prime Numbers in Cryptography”, JASRAE, vol. 23, no. 2, pp. 81–89, Apr. 2026, doi: 10.29070/ddy24369.