Greatest common divisor and its applications in security: Case study

dc.contributor.authorSri Siddhartha, M.
dc.contributor.authorRodriques, J.
dc.contributor.authorChandavarkar, B.R.
dc.date.accessioned2026-02-06T06:36:36Z
dc.date.issued2020
dc.description.abstractIn this paper, we explain the importance and applications of the Greatest Common Divisor(GCD) in the field of security. GCD of two numbers is the greatest divisor that ultimately divides these two numbers. The paper initially discusses four standard algorithms used in calculating GCD: Euclidean Algorithm, Binary GCD algorithm, Dijkstra's algorithm, and Lehmer's algorithm. We then analyze the various GCD applications in computer security. Some applications like generating modular multiplicative inverse are used in various cryptographic algorithms, reducing public keys' disclosure within closed groups, the importance of GCD in cryptographic algorithms, key refreshment message authentication, and peer validation. In the end, we cover the effects arising due to not proper use of GCD according to the algorithms stated in this paper, and how a poor choice of prime numbers that we use to compute the GCD and miscalculation of GCD can affect the computer security. © 2020 IEEE.
dc.identifier.citationProceedings - 2020 International Conference on Interdisciplinary Cyber Physical Systems, ICPS 2020, 2020, Vol., , p. 51-57
dc.identifier.urihttps://doi.org/10.1109/ICPS51508.2020.00015
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/30554
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.subjectComputer Security
dc.subjectCryptography
dc.subjectDecryption
dc.subjectEncryption
dc.subjectGreatest Common Divisor
dc.subjectNumber Theory
dc.subjectPrivate key
dc.subjectPublic key
dc.titleGreatest common divisor and its applications in security: Case study

Files