00985nas a2200181 4500000000100000000000100001008004100002260000900043653001800052653004400070653002800114100002100142700001800163245005800181300001200239490000700251520054500258 2020 d c202010aCybersecurity10aMiller-Rabin primality test improvement10aPublic Key Cryptography1 aNikolai Stoianov1 aAndrey Ivanov00aPublic Key Generation Principles Impact Cybersecurity a249-2600 v473 a
Public key cryptography algorithms are based on number theory laws and principles. For every cryptography system one of the most important is-sues is the user’s key which he/she uses to encrypt the messages. That is the reason the key generation process is always fundamental for data protection and, since cryptography takes up more space in our daily lives, the public key generation principles are so important. In this article the authors discuss the Miller–Rabin primality test in its relation to the key generation process.