Faculty Mentor Information

Liljana Babinkostova, Robin Betcher, Spencer Nelson, Marion Scheepers

Abstract

From Caesar’s cipher to Germany’s enigma machine to modern day cryptosytems, cryptography spans throughout history. Methods of encryption have evolved over hundreds of years and continue to evolve as computational efficiency increases. Over 2.5 quintillion bytes of data are generated per day through online networks such as banking, shopping, and social media. More than 90% of the total data in the world has been generated in the past two years, thereby requiring more sophisticated cybersecurity systems and an increasing demand for research in the field of cryptography. A curve of the form y2 = x3 + Ax + B, where A and B are constants, is what is known as an elliptic curve, which have become increasingly prevalent in modern cryptosystems. Our research focuses on the notion of elliptic primes, some of their properties, as well as some of their applications in cryptography. We also examine the primes that are both an elliptic prime and a twin prime.

Comments

Poster #W34

Included in

Mathematics Commons

Share

COinS
 

Decrypting the Link Between Elliptic Primes and Twin Primes

From Caesar’s cipher to Germany’s enigma machine to modern day cryptosytems, cryptography spans throughout history. Methods of encryption have evolved over hundreds of years and continue to evolve as computational efficiency increases. Over 2.5 quintillion bytes of data are generated per day through online networks such as banking, shopping, and social media. More than 90% of the total data in the world has been generated in the past two years, thereby requiring more sophisticated cybersecurity systems and an increasing demand for research in the field of cryptography. A curve of the form y2 = x3 + Ax + B, where A and B are constants, is what is known as an elliptic curve, which have become increasingly prevalent in modern cryptosystems. Our research focuses on the notion of elliptic primes, some of their properties, as well as some of their applications in cryptography. We also examine the primes that are both an elliptic prime and a twin prime.

 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.