If I Pick Prime Numbers For My Security, How Fast Will I Find Them, and How Safe Are They?

Many of our public key methods rely on prime numbers, as they have wonderful properties, including a way of performing mathematical operations on numbers, but constrain them with a finite field (and where our maximum number is the prime number less one). The difficulty in RSA, for example, is to factorize the value of N into the two…




This publication brings together interesting articles related to cyber security.

Recommended from Medium

Analyzing a macro enabled office file.

Tryhackme tsharkpcapanalysis Writeup

FBI Says Cryptocurrency Fraud On LinkedIn A ‘Significant Threat’: How…

FBI Says Cryptocurrency Fraud On LinkedIn A 'Significant Threat': How...

Which Encryption Process Encrypts on Either Side?

Analysis of TLS/SSL Handshake Failure Scenarios on Alibaba Cloud

{UPDATE} Baby Hazel Learn Seasons Hack Free Resources Generator

Adam Tracy Explains the Cloud Act

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

The Rise of the Machines? … “And, the name? A…I… Hart … ly”

Basic Set Theory by Exercises: Products and Unions.

15 Lines of Python: Poisson’s Equation in N Dimensions

Neural Network Guitar Plugins on Pi-Stomp with MODEP