Fast Effective Deterministic Primality Test Using CUDA/GPGPU
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 12, Issue 3
Abstract
There are great interests in understanding the manner by which the prime numbers are distributed throughout the integers. Prime numbers are being used in secret codes for more than 60 years now. Computer security authorities use extremely large prime numbers when they devise cryptographs, like RSA (short for Rivest, Shamir, and Adleman) algorithm, for protecting vital information that is transmitted between computers. There are many primality testing algorithms including mathematical models and computer programs. However, they are very time consuming when the given number n is very big or n→∞. In this paper, we propose a novel parallel computing model based on a deterministic algorithm using central processing unit (CPU) / general-purpose graphics processing unit (GPGPU) systems, which determines whether an input number is prime or composite much faster. We develop and implement the proposed algorithm using a system with a 8-core CPU and a 448-core GPGPU. Experimental results indicate that upto 94.35x speedup can be achieved for 21-digit decimal numbers.
Authors and Affiliations
Abu Asaduzzaman, Anindya Maiti, Chok Meng Yip
Evaluation of economic advantage for produced electrical energy usage by solar cell in compression with steam power plant in home in Isfahan city
The aim of this article is evaluation of economic advantage from using of solar energy (photovoltaic system) in compression with steam power plant in order to supply the electricity of Isfahan’s household (2009 to 2011...
Advantage of Collaboration Workflows in the Automotive Supply Chain: Case Study on the Automotive Cluster of Slovenia
Strengthening of collaboration among individual business partners has proved essential for the structuring of Slovenian economy and enhancing competitive advantage on the global market. At the same time, ontology, as an...
A Scheduling Approach to Achieve Green Cloud Solution Based on Internet of Things
Internet usage is rapidly increasing in every field of life. Internet coverage is wide either it is textile, pharmaceutical or education sectors. In every sectors where internet envisions are exist, there objects must be...
Security Defects in Biometric- based IdentificationSystemsand Mechanisms torectify them
Biometrics is one of the evolving technologies widely used in different aspects of life today. Theuse of biometrics for identification is a system mainly established to recognize a certain person through authentication b...
Advanced IT Outsourcing By Using Cloud Computing Model
In this paper we will discuss Outsourcing is the commissioning of a third party (or a number of third parties) to manage a client organization.s IT assets, people and/ or activities to required results. Business process...