65,537
| ||||
---|---|---|---|---|
Cardinal | sixty-five thousand five hundred thirty-seven | |||
Ordinal | 65537th (sixty-five thousand five hundred thirty-seventh) | |||
Factorization | prime | |||
Prime | 6,543rd | |||
Greek numeral | ͵εφλζ´ | |||
Roman numeral | LXVDXXXVII | |||
Binary | 100000000000000012 | |||
Ternary | 100222200223 | |||
Senary | 12232256 | |||
Octal | 2000018 | |||
Duodecimal | 31B1512 | |||
Hexadecimal | 1000116 |
65537 is the integer after 65536 and before 65538.
In mathematics
65537 is the largest known prime number of the form (). Therefore, a regular polygon with 65537 sides is constructible with compass and unmarked straightedge. Johann Gustav Hermes gave the first explicit construction of this polygon. In number theory, primes of this form are known as Fermat primes, named after the mathematician Pierre de Fermat. The only known prime Fermat numbers are
In 1732, Leonhard Euler found that the next Fermat number is composite:
In 1880, Fortuné Landry showed that
65537 is also the 17th Jacobsthal–Lucas number, and currently the largest known integer n for which the number is a probable prime.[2]
Applications
65537 is commonly used as a public exponent in the RSA cryptosystem. Because it is the Fermat number Fn = 22n + 1 with n = 4, the common shorthand is "F4" or "F4".[3] This value was used in RSA mainly for historical reasons; early raw RSA implementations (without proper padding) were vulnerable to very small exponents, while use of high exponents was computationally expensive with no advantage to security (assuming proper padding).[4]
65537 is also used as the modulus in some Lehmer random number generators, such as the one used by ZX Spectrum,[5] which ensures that any seed value will be coprime to it (vital to ensure the maximum period) while also allowing efficient reduction by the modulus using a bit shift and subtract.
References
- ^ Conway, J. H.; Guy, R. K. (1996). The Book of Numbers. New York: Springer-Verlag. p. 139. ISBN 0-387-97993-X.
- ^ "Sequences by difficulty of search". Archived from the original on 2014-07-14. Retrieved 2014-06-14.
- ^ "genrsa(1)". OpenSSL Project. Archived from the original on 2017-03-13. Retrieved 2017-05-24.
-F4|-3 [..] the public exponent to use, either 65537 or 3. The default is 65537.
- ^ "RSA with small exponents?".
- ^ Vickers, Steve (1983). "Chapter 11. Random numbers". Sinclair ZX Spectrum Basic Programming (2nd ed.). Sinclair Research Ltd. pp. 73–75. Retrieved 2022-05-26.
The ZX Spectrum uses p=65537 and a=75, and stores some bi-1 in memory.