Prime k-tupleIn number theory, a prime k-tuple is a finite collection of values representing a repeatable pattern of differences between prime numbers. For a k-tuple (a, b, ...), the positions where the k-tuple matches a pattern in the prime numbers are given by the set of integers n such that all of the values (n + a, n + b, ...) are prime. Typically the first value in the k-tuple is 0 and the rest are distinct positive even numbers. Several of the shortest k-tuples are known by other common names: OEIS sequence covers 7-tuples (prime septuplets) and contains an overview of related sequences, e.
Cryptographic protocolA cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives. A protocol describes how the algorithms should be used and includes details about data structures and representations, at which point it can be used to implement multiple, interoperable versions of a program. Cryptographic protocols are widely used for secure application-level data transport.
Prime quadrupletIn number theory, a prime quadruplet (sometimes called prime quadruple) is a set of four prime numbers of the form {p,\ p+2,\ p+6,\ p+8}. This represents the closest possible grouping of four primes larger than 3, and is the only prime constellation of length 4. The first eight prime quadruplets are: {5, 7, 11, 13}, {11, 13, 17, 19}, {101, 103, 107, 109}, {191, 193, 197, 199}, {821, 823, 827, 829}, {1481, 1483, 1487, 1489}, {1871, 1873, 1877, 1879}, {2081, 2083, 2087, 2089} All prime quadruplets except {5, 7, 11, 13} are of the form {30n + 11, 30n + 13, 30n + 17, 30n + 19} for some integer n.
Greatest GenerationThe Greatest Generation, also known as the G.I. Generation and the World War II generation, is the Western demographic cohort following the Lost Generation and preceding the Silent Generation. The generation is generally defined as people born from 1901 to 1927. They were shaped by the Great Depression and were the primary generation composing the enlisted forces in World War II. Most people of the Greatest Generation are the parents of the Silent Generation and Baby Boomers, and, in turn, were the children of the Lost Generation.
Generation ZGeneration Z (often shortened to Gen Z), colloquially known as zoomers, is the demographic cohort succeeding Millennials and preceding Generation Alpha. Researchers and popular media use the mid-to-late 1990s as starting birth years and the early 2010s as ending birth years. Most members of Generation Z are children of Generation X or younger Baby Boomers. The older members may be the parents of the younger members of Generation Alpha.
Silent GenerationThe Silent Generation, also known as the Traditionalist Generation, is the Western demographic cohort following the Greatest Generation and preceding the baby boomers. The generation is generally defined as people born from 1928 to 1945. By this definition and U.S. Census data, there were 23 million Silents in the United States as of 2019. In the United States, the Great Depression of the 1930s and World War II in the early-to-mid 1940s caused people to have fewer children and as a result, the generation is comparatively small.
Sexy primeIn number theory, sexy primes are prime numbers that differ from each other by 6. For example, the numbers 5 and 11 are both sexy primes, because both are prime and 11 − 5 = 6. The term "sexy prime" is a pun stemming from the Latin word for six: sex. If p + 2 or p + 4 (where p is the lower prime) is also prime, then the sexy prime is part of a prime triplet.
Diffie–Hellman key exchangeDiffie–Hellman key exchange is a mathematical method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman. DH is one of the earliest practical examples of public key exchange implemented within the field of cryptography. Published in 1976 by Diffie and Hellman, this is the earliest publicly known work that proposed the idea of a private key and a corresponding public key.
Key exchangeKey exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. If the sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt messages received. The nature of the equipping they require depends on the encryption technique they might use. If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys.
Integer factorizationIn number theory, integer factorization is the decomposition, when possible, of a positive integer into a product of smaller integers. If the factors are further restricted to be prime numbers, the process is called prime factorization, and includes the test whether the given integer is prime (in this case, one has a "product" of a single factor). When the numbers are sufficiently large, no efficient non-quantum integer factorization algorithm is known. However, it has not been proven that such an algorithm does not exist.