65,537

Last updated
65536 6553765538
Cardinal sixty-five thousand five hundred thirty-seven
Ordinal 65537th
(sixty-five thousand five hundred thirty-seventh)
Factorization prime
Prime 6,543rd
Greek numeral ͵εφλζ´
Roman numeral LXVDXXXVII
Binary 100000000000000012
Ternary 100222200223
Senary 12232256
Octal 2000018
Duodecimal 31B1512
Hexadecimal 1000116
Construction of a regular 65537-gon. See constructible polygon. Regular 65537-gon First Carlyle Circle.gif
Construction of a regular 65537-gon. See constructible polygon.

65537 is the integer after 65536 and before 65538.

In mathematics

65537 is the largest known prime number of the form (), and is most likely the last one. [1] Therefore, a regular polygon with 65537 sides is constructible with compass and unmarked straightedge. Johann Gustav Hermes gave the first explicit construction of this polygon. In number theory, primes of this form are known as Fermat primes, named after the mathematician Pierre de Fermat. The only known prime Fermat numbers are

Contents

[2]

In 1732, Leonhard Euler found that the next Fermat number is composite:

In 1880, Fortuné Landry  [ fr ] showed that

65537 is also the 17th Jacobsthal–Lucas number, and currently the largest known integer n for which the number is a probable prime. [3]

Applications

65537 is commonly used as a public exponent in the RSA cryptosystem. Because it is the Fermat number Fn = 22n + 1 with n = 4, the common shorthand is "F4" or "F4". [4] This value was used in RSA mainly for historical reasons; early raw RSA implementations (without proper padding) were vulnerable to very small exponents, while use of high exponents was computationally expensive with no advantage to security (assuming proper padding). [5]

65537 is also used as the modulus in some Lehmer random number generators, such as the one used by ZX Spectrum, [6] which ensures that any seed value will be coprime to it (vital to ensure the maximum period) while also allowing efficient reduction by the modulus using a bit shift and subtract.

Related Research Articles

In mathematics, integer factorization is the decomposition of a positive integer into a product of integers. Every positive integer greater than 1 is either the product of two or more integer factors greater than 1, in which case it is called a composite number, or it is not, in which case it is called a prime number. For example, 15 is a composite number because 15 = 3 · 5, but 7 is a prime number because it cannot be decomposed in this way. If one of the factors is composite, it can in turn be written as a product of smaller factors, for example 60 = 3 · 20 = 3 · (5 · 4). Continuing this process until every factor is prime is called prime factorization; the result is always unique up to the order of the factors by the prime factorization theorem.

In mathematics, a Mersenne prime is a prime number that is one less than a power of two. That is, it is a prime number of the form Mn = 2n − 1 for some integer n. They are named after Marin Mersenne, a French Minim friar, who studied them in the early 17th century. If n is a composite number then so is 2n − 1. Therefore, an equivalent definition of the Mersenne primes is that they are the prime numbers of the form Mp = 2p − 1 for some prime p.

<span class="mw-page-title-main">Modular arithmetic</span> Computation modulo a fixed integer

In mathematics, modular arithmetic is a system of arithmetic for integers, where numbers "wrap around" when reaching a certain value, called the modulus. The modern approach to modular arithmetic was developed by Carl Friedrich Gauss in his book Disquisitiones Arithmeticae, published in 1801.

<span class="mw-page-title-main">Prime number</span> Number divisible only by 1 or itself

A prime number is a natural number greater than 1 that is not a product of two smaller natural numbers. A natural number greater than 1 that is not prime is called a composite number. For example, 5 is prime because the only ways of writing it as a product, 1 × 5 or 5 × 1, involve 5 itself. However, 4 is composite because it is a product (2 × 2) in which both numbers are smaller than 4. Primes are central in number theory because of the fundamental theorem of arithmetic: every natural number greater than 1 is either a prime itself or can be factorized as a product of primes that is unique up to their order.

RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem, one of the oldest widely used for secure data transmission. The initialism "RSA" comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, who publicly described the algorithm in 1977. An equivalent system was developed secretly in 1973 at Government Communications Headquarters (GCHQ), the British signals intelligence agency, by the English mathematician Clifford Cocks. That system was declassified in 1997.

In number theory, Fermat's little theorem states that if p is a prime number, then for any integer a, the number apa is an integer multiple of p. In the notation of modular arithmetic, this is expressed as

In mathematics, a Fermat number, named after Pierre de Fermat (1607–1665), the first known to have studied them, is a positive integer of the form: where n is a non-negative integer. The first few Fermat numbers are: 3, 5, 17, 257, 65537, 4294967297, 18446744073709551617, ....

31 (thirty-one) is the natural number following 30 and preceding 32. It is a prime number.

<span class="mw-page-title-main">Constructible polygon</span> Regular polygon that can be constructed with compass and straightedge

In mathematics, a constructible polygon is a regular polygon that can be constructed with compass and straightedge. For example, a regular pentagon is constructible with compass and straightedge while a regular heptagon is not. There are infinitely many constructible polygons, but only 31 with an odd number of sides are known.

Modular exponentiation is exponentiation performed over a modulus. It is useful in computer science, especially in the field of public-key cryptography, where it is used in both Diffie–Hellman key exchange and RSA public/private keys.

In number theory, Dixon's factorization method is a general-purpose integer factorization algorithm; it is the prototypical factor base method. Unlike for other factor base methods, its run-time bound comes with a rigorous proof that does not rely on conjectures about the smoothness properties of the values taken by a polynomial.

In number theory, a Pierpont prime is a prime number of the form for some nonnegative integers u and v. That is, they are the prime numbers p for which p − 1 is 3-smooth. They are named after the mathematician James Pierpont, who used them to characterize the regular polygons that can be constructed using conic sections. The same characterization applies to polygons that can be constructed using ruler, compass, and angle trisector, or using paper folding.

<span class="mw-page-title-main">65537-gon</span> Shape with 65537 sides

In geometry, a 65537-gon is a polygon with 65,537 (216 + 1) sides. The sum of the interior angles of any non–self-intersecting 65537-gon is 11796300°.

The Lehmer random number generator, sometimes also referred to as the Park–Miller random number generator, is a type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The general formula is

In cryptography, PKCS #1 is the first of a family of standards called Public-Key Cryptography Standards (PKCS), published by RSA Laboratories. It provides the basic definitions of and recommendations for implementing the RSA algorithm for public-key cryptography. It defines the mathematical properties of public and private keys, primitive operations for encryption and signatures, secure cryptographic schemes, and related ASN.1 syntax representations.

The number 4,294,967,295 is a whole number equal to 232 − 1. It is a perfect totient number, meaning it is equal to the sum of its iterated totients. It follows 4,294,967,294 and precedes 4,294,967,296. It has a factorization of .

In cryptography, Very Smooth Hash (VSH) is a provably secure cryptographic hash function invented in 2005 by Scott Contini, Arjen Lenstra, and Ron Steinfeld. Provably secure means that finding collisions is as difficult as some known hard mathematical problem. Unlike other provably secure collision-resistant hashes, VSH is efficient and usable in practice. Asymptotically, it only requires a single multiplication per log(n) message-bits and uses RSA-type arithmetic. Therefore, VSH can be useful in embedded environments where code space is limited.

Coppersmith's attack describes a class of cryptographic attacks on the public-key cryptosystem RSA based on the Coppersmith method. Particular applications of the Coppersmith method for attacking RSA include cases when the public exponent e is small or when partial knowledge of a prime factor of the secret key is available.

In number theory, a cyclotomic field is a number field obtained by adjoining a complex root of unity to Q, the field of rational numbers.

References

  1. Boklan, Kent D.; Conway, John H. (2017). "Expect at most one billionth of a new Fermat Prime!". The Mathematical Intelligencer. 39 (1): 3–5. arXiv: 1605.01371 . doi:10.1007/s00283-016-9644-3. S2CID   119165671.
  2. Conway, J. H.; Guy, R. K. (1996). The Book of Numbers . New York: Springer-Verlag. p.  139. ISBN   0-387-97993-X.
  3. "Sequences by difficulty of search". Archived from the original on 2014-07-14. Retrieved 2014-06-14.
  4. "genrsa(1)". OpenSSL Project. Archived from the original on 2017-03-13. Retrieved 2017-05-24. -F4|-3 [..] the public exponent to use, either 65537 or 3. The default is 65537.
  5. "RSA with small exponents?".
  6. Vickers, Steve (1983). "Chapter 11. Random numbers". Sinclair ZX Spectrum Basic Programming (2nd ed.). Sinclair Research Ltd. pp. 73–75. Retrieved 2022-05-26. The ZX Spectrum uses p=65537 and a=75, and stores some bi-1 in memory.