Quadratic Residues and the Distribution of Primes

1959 ◽  
Vol 13 (68) ◽  
pp. 272 ◽  
Author(s):  
Daniel Shanks
Mathematics ◽  
2018 ◽  
Vol 6 (12) ◽  
pp. 289 ◽  
Author(s):  
Matt Visser

The gap between what we can explicitly prove regarding the distribution of primes and what we suspect regarding the distribution of primes is enormous. It is (reasonably) well-known that the Riemann hypothesis is not sufficient to prove Andrica’s conjecture: ∀n≥1, is p n + 1 - p n ≤ 1 ? However, can one at least get tolerably close? I shall first show that with a logarithmic modification, provided one assumes the Riemann hypothesis, one has p n + 1 /ln p n + 1 - p n /ln p n < 11/25; (n ≥ 1). Then, by considering more general mth roots, again assuming the Riemann hypothesis, I show that p n + 1 m - p n m < 44/(25 e[m < 2]); (n ≥ 3; m > 2). In counterpoint, if we limit ourselves to what we can currently prove unconditionally, then the only explicit Andrica-like results seem to be variants on the relatively weak results below: ln2 pn + 1 - ln2 pn < 9; ln3 pn + 1 - ln3 pn < 52; ln4 pn + 1 - ln4 pn < 991; (n ≥ 1). I shall also update the region on which Andrica’s conjecture is unconditionally verified.


2005 ◽  
Vol 168 (1) ◽  
pp. 235-242 ◽  
Author(s):  
Weidong Qiu ◽  
Kefei Chen

Author(s):  
Nikolaos Kritikos
Keyword(s):  

2021 ◽  
Vol 297 ◽  
pp. 01046
Author(s):  
Zhour Oumazouz ◽  
Driss Karim

The main objective of the study conducted in this article is to introduce a new algorithm of encryption and decryption of a sensitive message after transforming it into a binary message. Our proposed encryption algorithm is based on the study of a particular graph constructed algebraically from the quadratic residues. We have exploited the Paley graph to introduce an abstract way of encryption of such message bit according to the other message bits by the intermidiate study of the neighborhood of a graph vertex. The strong regularity of the Paley graphs and the unknown behavior of the quadratic residues will play a very important role in the cryptanalysis part which allows to say that the brute force attack remains for the moment the only way to obtain the set of possible messages.


Sign in / Sign up

Export Citation Format

Share Document