Theoretical and Natural Science

Theoretical and Natural Science

TNS Vol.2 (CIAP 2022), 02 February 2023

Open Access | Article

Development of Number Theory and the Application in Cryptography

Wenchao Shang 1
1 Shouguang modern high school, Shouguang, Shandong province, China, 262700

* Author to whom correspondence should be addressed.

Theoretical and Natural Science, TNS Vol.2 (CIAP 2022), 139-144
Published 02 February 2023. © 2023 The Author(s). Published by EWA Publishing
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Citation Wenchao Shang. Development of Number Theory and the Application in Cryptography. TNS (2023) TNS Vol.2 (CIAP 2022): 139-144.


The primary focus of number theory, one of the fields of fundamental mathematics, is on the characteristics of integers. The development of cryptography also benefited greatly from the contributions of number theory. The paper primarily examines the evolution of number theory and its use in cryptography using a method of literature review. The study discovers that number theory development in the East reached a prosperous phase in the 1930s. From the 15th and 16th centuries through the 19th century, number theory flourished in the first. Number theory is still being developed, as demonstrated by the discovery of the biggest known prime number by American mathematician Curtis Cooper. Numerology is also extensively employed in cryptography, including the RSA technique and digital signatures. Numerous algorithms used in cryptography mostly depend on a working understanding of number theory.


number theory, cryptography, application


1. Euclid, Elements of Euclid [D]. Dent, 1993.

2. Wangjun, On the development and influence of number theory in ancient China [J]. Journal of Anyang Normal University, 2014: 118-120

3. Guohaimin. Application of number theory in cryptography [J]. Computer Knowledge and Technology, 2010: 4614-4618

4. Liujia. Some applications of number theory in cryptography[J]. New Courses' Study, 2013:184-185

5. Fujingbo. Application of number theory knowledge in cryptography [J]. Scientific and Technological Innovation, 2012: 183

6. Huangyao. Analysis of the application of number theory in cryptography [J]. Modern Communication, 2017: 196

7. Songyanhong, Kangbaoyuan. Application of number theory in cryptography [J]. Divineland, 2012: 30-31

8. Chenminyi, Xiexiaojuan. Numbers and number theory [J]. Open Class, 2017: 94-95,112-113

9. Zhangrong.The application of mathematics to cryptography [J]. Telecom World, 2016: 258

Data Availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors who publish this journal agree to the following terms:

1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.

2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.

3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open Access Instruction).

Copyright © 2023 EWA Publishing. Unless Otherwise Stated