Greatest common divisor and its applications in security: Case study
| dc.contributor.author | Sri Siddhartha, M. | |
| dc.contributor.author | Rodriques, J. | |
| dc.contributor.author | Chandavarkar, B.R. | |
| dc.date.accessioned | 2026-02-06T06:36:36Z | |
| dc.date.issued | 2020 | |
| dc.description.abstract | In this paper, we explain the importance and applications of the Greatest Common Divisor(GCD) in the field of security. GCD of two numbers is the greatest divisor that ultimately divides these two numbers. The paper initially discusses four standard algorithms used in calculating GCD: Euclidean Algorithm, Binary GCD algorithm, Dijkstra's algorithm, and Lehmer's algorithm. We then analyze the various GCD applications in computer security. Some applications like generating modular multiplicative inverse are used in various cryptographic algorithms, reducing public keys' disclosure within closed groups, the importance of GCD in cryptographic algorithms, key refreshment message authentication, and peer validation. In the end, we cover the effects arising due to not proper use of GCD according to the algorithms stated in this paper, and how a poor choice of prime numbers that we use to compute the GCD and miscalculation of GCD can affect the computer security. © 2020 IEEE. | |
| dc.identifier.citation | Proceedings - 2020 International Conference on Interdisciplinary Cyber Physical Systems, ICPS 2020, 2020, Vol., , p. 51-57 | |
| dc.identifier.uri | https://doi.org/10.1109/ICPS51508.2020.00015 | |
| dc.identifier.uri | https://idr.nitk.ac.in/handle/123456789/30554 | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.subject | Computer Security | |
| dc.subject | Cryptography | |
| dc.subject | Decryption | |
| dc.subject | Encryption | |
| dc.subject | Greatest Common Divisor | |
| dc.subject | Number Theory | |
| dc.subject | Private key | |
| dc.subject | Public key | |
| dc.title | Greatest common divisor and its applications in security: Case study |
