<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=iA1Pi1a8Dy00ym" style="display:none" height="1" width="1" alt="" />
Skip Navigation
Our Terms of Use (click here to view) have changed. By continuing to use this site, you are agreeing to our new Terms of Use.

Prime and Composite Numbers

Only two factors or more than two factors

Atoms Practice
Estimated2 minsto complete
Practice Prime and Composite Numbers
Estimated2 minsto complete
Practice Now
Turn In
Prime Protection

Credit: Game Developers Conference
Source: http://www.flickr.com/photos/officialgdc/6235163921/
License: CC BY-NC 3.0

Computers are everywhere, and the world of electronic commerce, or “e-commerce,” is a booming industry. What is e-commerce? Put very simply, e-commerce is the world of online shopping. Many people today do a lot of their shopping online, which means that computers and credit cards interface daily.

News You Can Use

Every time someone makes a purchase online that involves a credit card, prime and composite numbers are involved in the transaction. How exactly? Well, the computer uses a code to recognize a person’s credit card. Before the buyer's credit card information is sent through cyberspace, it is encrypted to protect it from being stolen by a computer hacker. To make sense of the encrypted information, a key to the code is required. One of the most popular methods of encryption makes use of prime and composite numbers.

Credit: Julien Gong Mien
Source: http://www.flickr.com/photos/bfishadow/7257134076/
License: CC BY-NC 3.0

Remember that a prime number is only divisible by itself and the number one, and that you get a composite number when you multiply two prime numbers together. Encryption codes can be created by multiplying two prime numbers together. The composite number is recognized by the computer, but only the bank knows the two original prime numbers. The composite numbers used as codes are usually extremely large. Because there are an unknown number of prime numbers, it is nearly impossible to break down the composite number into its two prime factors. Without the two primes, a hacker can’t access the credit card information.

See for yourself: http://www.slate.com/articles/health_and_science/science/2013/06/online_credit_card_security_the_rsa_algorithm_prime_numbers_and_pierre_fermat.html

Explore More

Below are few websites where you can practice working with prime and composite numbers.




Notes/Highlights Having trouble? Report an issue.

Color Highlighted Text Notes
Please to create your own Highlights / Notes
Show More

Image Attributions

  1. [1]^ Credit: Game Developers Conference; Source: http://www.flickr.com/photos/officialgdc/6235163921/; License: CC BY-NC 3.0
  2. [2]^ Credit: Julien Gong Mien; Source: http://www.flickr.com/photos/bfishadow/7257134076/; License: CC BY-NC 3.0

Explore More

Sign in to explore more, including practice questions and solutions for Prime and Composite Numbers.
Please wait...
Please wait...