## Introduction to Network Security – Part 10

NOTIFICATION: These examples are provided for educational purposes. The use of this code and/or information is under your own responsibility and risk. The information and/or code is given ‘as is’. I do not take responsibilities of how they are used. You are welcome to point out any mistakes in my posting and/or leave a comment.

RSA Algorithm

RSA is an algorithm for public-key cryptography. The signals R.S.A. come from the last name of Ron Rivest, Adi Shamir, and Leonard Adleman who where the first to describe this algorithm. This algorithm is famous for being the first suitable algorithm for signing as well as encryption.

RSA algorithm allow to choose which key should be use for encryption and decryption.

1. Public key for encryption, private key for decryption or,
2. Private key for encryption, public key for decryption.

Generate the Pair Key (Public and Private Key)

1. Choose two random prime numbers p and q.
p = 17
q = 11

For better security, you can use the Primality Test to obtain to obtain these two random prime number. They should be of similar bit-length.
2. Compute n = p*q in which n is the modulus used for both the private and public keys.
n = p * q = 17 * 11 = 187
3. Compute Euler Totient Function ø(n)
ø(n) = ø(187) = (p – 1) * (q – 1) = 16 * 10 = 160
4. Select a public key exponent e number where 1 < e < ø(n) and gcd(e, ø(n)) = 1
If we choose e = 7 then gcd(e, ø(n)) = gcd(7, 160) = 1
5. Determine the multiplicative inverse d:

1. d must be less than ø(n): d < 160
2. if d * e mod ø(n) = d * 7 mod ø(187) = d * 7 mod 160 = 1 then
3. let d = 23 in this way d * e = 23 * 7 = 161 = (160 + 1)
d * 7 mod 160 = 23 * 7 mod 160 = 1
6. The public key will be:
PU = {e, n} = {7, 187}
7. The private key will be:
PR = {d, n} = {23, 187}

Encryption

1. Sender must obtain the public key PU = {e, n} to the recipient, where PU is the public key, n for modulus, and e for public exponent (also known as public encryption).
PU = {e, n} = {7, 187}
2. The message M (also known as the plaintext) must be turn into an integer m by using a padding scheme (an reversible protocol) in which 0 < m < n.
Lets assume the message is m = 88 where 0 < m < n so 0 < 88 < 187.
3. Then the sender must compute the ciphertext.

Where c is the ciphertext, m is the integer message , e is the public exponent, and n i for modulus.

Decryption

1. The recipient must use the private key to decrypt the ciphertext PR = {d, n} where PR is the private key, d is the private key exponent, n for modulus.
PR = {d, n} = {23, 187}
2. Compute the message.

Where m is the integer message, c is the ciphertext, n for modulus.
3. Then turn back the original message M by using  integer message m with the reverse padding scheme.

Encryption / Decryption Example

Algorithm Requirements

1. There should be able to find values for e, d, and n so for all values of m where 0 < M < n
2. and should be easy to calculate for all valus of m where 0 < m < n.
3. It should be very hard for an attacker to determine d given e and n

Possible Attacks to RSA

1. Brute Attack
2. Mathematical attacks
1. Determine d directly
2. Determine the Euler Totient Function ø(n) without using the prime numbers p and q
3. Factorising n into the correct prime factors p and q

Key Distribution

One of the important aspects is how to distribute the keys between the sender and the receiver. For example, one way is to use the public-key encryption to distribute the keys.

For doing that there are three different methods of distributions that can be used:

1. Public announcement,
2. Public-key authority, and
3. Public-key certificates

Public Annoucement

One way to distribute the public keys is having the sender to distribute the public key to the recipient; however, this have the disadvantage that an attacker could create a key claiming to be the sender. This disadvantage is known as forgery.

A solution is to create a public-key autority.

Public Key Authority

A public key authority is a central authority that maintain a dynamic directory of public keys for all the users. Example: {name, public-key}

1. In a secure way (in person), each user register a public key in this directory authority.
2. It is required that the user known the public key for the directory.
3. Only the authority known the corresponding private key
4. Users interact with the directory in order to obtain the public key securely

Steps:

1. User A send  a timestamped message to the public key authority.
This message contain a request for the public key of user B.
2. The public-key authority responds to user A returning an encrypted message using it’s private key. This message contains:
1. The original request so it can be use to match with the request
2. The original timestamp so it can be determined if the message is not from the public-key authority.
3. The public key of user B.
3. User A store the public-key of user B and use this public-key to encrypt a message that will contain the identity of user A plus a “nonce N1”. This message will be deliver to user B.
4. User B send  a timestamped message to the public key authority.
This message contain a request for the public key of user A.
5. The public-key authority responds to user B returning an encrypted message using it’s private key. This message contains:
1. The original request so it can be use to match with the request
2. The original timestamp so it can be determined if the message is not from the public-key authority.
3. The public key of user A.
6. User B encrypt a message using the public-key of user A and send this encrypted message to user A.
This encrypted message have:

1. User A’s nonce
2. A nonce genereated by User B
7. User A encrypt a message using the public-key of User B and send this encrypted message to user B.
This encrypted message holds:

1. the  nonce N2 of user A

(This will ensure user B that the encrypted message is coming from user A).

Disavantages:

Since the users must appeal to the public-key authority in order to obtain the other users’ public key it can produce a bottleneck.

Public Key Certificates

Another way to exchange keys without the need of a public-key authority is the public-key certificates. The general idea would be:

1. A certificate is a data block that contains a public key plus an identifier of the key’s owner. This data block would be signed by a trusted third party which would be the certificate authority.
2. A user would generate a pair key and send the public key to this certify authority in a secure way and obtain a certificate issued by the certify authority (the trusted third party).
3. This user then would publish this certificate so another user can verify that the certificate was created by the trusted third party.

Please notice that the certificate authority (the trusted third party) is the only one that can create and update certificates.

Steps:

1. User A supply a public key PUa with a request for a certificate to the certificate authority. This request must be done in a secure ways such as in person for example.
2. The certificate authority would provide user A with this from:
where E is the encryption algorithm, PRauth is the authority’s private key and Time1 is a timestamp, and IDa is the user A identification.
3. User A then can pass the certificate CA any user (in this case user B).
4. User B get the certificate from user A and verify if the certificate correspond to the certify authority by decrypting the message using the authority’s public key:

In this way it can verify that the certificate is not counterfeit.

## Introduction to Network Security – Part 9

NOTIFICATION: These examples are provided for educational purposes. The use of this code and/or information is under your own responsibility and risk. The information and/or code is given ‘as is’. I do not take responsibilities of how they are used. You are welcome to point out any mistakes in my posting and/or leave a comment.

Some of the mathematical tools (known as number theory) use in network security are prime numbers, greatest common divisor (GCD), Fermat’s theorem, Euler Totient function and theorem, primality testing and Miller Rabin algorithm.

Prime Number

A prime number is an integer p greater than 1 which can only be divided by 1 and itself.

Formally speaking:

“A prime number (or prime integer, often simply called a “prime” for short) is a positive integer that has no positive integer divisors other than 1 and  itself. ” <http://mathworld.wolfram.com/PrimeNumber.html>

An example of prime numbers: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, …

An example of numbers that are not prime: 1, 4, 6, 8, 9, 10, 12, 14, 15, 16, 18, 20, 21, 22, 24, 25, …

In the website Math.com you can find a prime number calculator that can tell you if a number is prime or not: <http://www.math.com/students/calculators/source/prime-number.htm>

One of the ways we can use prime numbers is to factorize a number in a unique way:

Any number a greater than 1 can be factored in a unique way using prime p numbers while each consecutive prime number is greater than the previous prime number and their consecutive exponents b are one greater that then previous:

a = p1^b1 * p2^b2 * ... * pn^bn while p1 < p2 < ... < pn and (b1, b2, ..., bn) > 0

For example:

1. a = 91 = p1 ^ b1 * p2 ^ b2 = 7 ^ 1 * 13 ^ 1 = 7 * 13
Therefore, P1 = 7 and P2 = 13
2. a = 3600 = p1 ^ b1 * p2 ^ b2 * p3 ^ b3 = 2^4 * 3^2 * 5^2
Therefore, P1 = 2, P2 = 3, and P3 = 5

Greatest Common Divisor (GCD)

The greatest common divisor (gcd) is a number in which you can divide two positive numbers a and b and at the same time is common in a and b.

Formally Speaking:

“The greatest common divisor … of two positive integers  and  is the largest divisor common to  and . ” <http://mathworld.wolfram.com/GreatestCommonDivisor.html>

There are different ways to obtain the greatest common divisor such as using prime factorizations, Euclid’s algorithm, and others <http://en.wikipedia.org/wiki/Greatest_common_divisor>.

Approach 1:

A way to determine the greatest common divisor of two integers a and b is by
comparing the prime factorization of a and b and using their least powers.

Lets assume we wish to obtain the greatest common divisor of 12 and 30, gcd(12, 30).

For 300, we obtain the following prime numbers:

30 = 2^1 * 3^1 * 5^1

For 12, we obtain the following prime numbers:

12 = 2^1 * 3^1 = 2^1 * 3^1 * 5^0

In both cases, we have that 2 and 3 are the prime numbers used in a and b.
Also, we have that 2^1 and 3^1 are their least powers. Therefore,

gcd(12, 30) = 2^1 * 3^1 = 6

Approach 2:

The follow is a more friendly approach to obtain the greates common divisor.
Lets assume we wish to know the greatest common denominator of 7 and 160, gcd(7, 160)

1. Write down this formula:
(Dividend) = (Divisor) * (Quotient) + (Remainder)
2. The greatest number will be the dividend:
Dividend = 160
(160) = (Divisor) * (Quotient) + (Remainder)
3. The other number will be the divisor:
Divisor = 7
(160) = (7) * (Quotient) + (Remainder)
4. Multiply the divisor with a quotient that would get you a number as close as possible to the dividend
If 160/7 = 22.8571429 then use 22 for the quotient
(160) = (7) * (22) + (Remainder)
5. The remainder will be the number that you need to reach 160. Since 7 * 22 is 154 the remainder is 6
(160) = (7) * (22) + (6)
6. Now the Divisor became the new dividend and the remainder became the new divisor:
New dividend = 7 (previous divisor)
New divisor = 6 (previous remainder)
(7) = (6) * (Quotient) + (Remainder)
7. Repeat the process, get a quotient that would multiply the divisor (6) as close as possible to the dividend (7)
(7) = (6) * (1) + (Remainder)
8. The remainder would be 1. This remainder is the greatest common divisor between 7 and 160
gcd(7, 160) = 1

You can find a gcd calculator here:
<http://britton.disted.camosun.bc.ca/gcdlcm/jbgcdlcm.htm>

Fermat’s Theorem

Before going over the Fermat’s theorem, let review an old concept related with this topic, modular arithmetic.

Modular arithmetic (also known as clock arithmetic), is a system in which numbers “wrap around” after reaching a certain value. Of this system, we use the congruence relation on integer known as modulus.

Formally speaking:
“For a positive integer n, two integers a and b are said to be congruent modulo n, (a = b mod n),
if their difference a − b is an integer multiple of n. The number n is called the modulus of the congruence” <http://en.wikipedia.org/wiki/Modular_arithmetic#Congruence_relation>

For Example:

1. Lets assume we have a = 100, b = 86, and n = 7 such that 100 = 86 (mod 7).
2. 100 - 86 = 14 in which 14 has 7 as a divisor.
3. If we divide 100 by 7,
we find out that the quwootient is 14 and remainder is 2.
4. Just coincidence, if we have 100 = 2 (mod 7),
we also find out that the remainder (b) is two too.

Another way to see the previous example is as follows:

100 = 86 (mod 7)

Means that 100 and 86 leave the same remainder when you divide by
7; or, equivalently, that their difference is a multiple of 7.

Here is a link in which you can find the quotient and remainder of a division:
<http://www.analyzemath.com/Calculators_3/quotient_remainder.html>

Another example:

1. For a = 0 mod 5, If a = 0 mod 5 then a^4 = 0^4 = 0 mod 5
2. For a = 1 mod 5, if a = 1 mod 5 then a^4 = 1^4 = 1 mod 5
3. For a = 2 mod 5, if a = 2 mod 5 then a^4 = 2^4 = 16 = 1 mod 5
4. For a = 3 mod 5, if a = 3 mod 5 then a^4 = 3^4 = 81 = 1 mod 5
5. For a = 4 mod 5, if a = 4 mod 5 then a^4 = 4^4 = 256 = 1 mod 5

Now that we have an idea about modulus, we can begin talking about Fermat’s Theorem.

Fermat’s theorem also known as “Fermat’s little theorem” (do not confuse with “Fermat’s last theorem”), establish that:

1. If p is a prime number and for any integer a lower than the prime number p, a<p is a positive integer not divisible by the prime number p.

2. Or, if p is a prime number then for any integer a, a^p – a will be evenly divisible by p.
3. Or, if p is a prime and a is an integer relatively prime to p, then [a^(p−1)] − 1 will be evenly divisible by p.

For example:

1. Lets assume p = 3 and a = 2Fermat's little theorem establish that
2. Then a^(p-1) = 2^(3 - 1) = 2^2 = 4
3. So, 1 = a^(p-1) mod p = 4 mod 3 = 1

In network security, Fermat’s little theorem is used in public key and primality testing.

Euler Totient Function ø(n)

The Euler Totient function is represented by ø(n) or φ(n) depending the author.

The Euler Totient function establish that:

1. ø(n) is the number of possitive integers less than n and coprime (also known as relatively prime) to n
2. Or the number of positive integers less or equal to n that are relatively prime to n, where 1 is counted as being coprime (relatively prime) to all numbers.
3. Or, ø(n) returns the number of integers less than n (including 1) that are relatively prime to n.

Note: we say that two integers a and b are relatively prime if a and b have no common positive factor other than 1 or, if their greatest common divisor is 1. a is relatively prime to b if gcd(a, b) = 1.

A list of Euler’s Totient Function Values For n = 1 to 500, with divisor lists can be found in the following URL address: <http://primefan.tripod.com/Phi500.html>

For example:

1. Lets n = 37 so ø(n) = ø(37) = 35. 37 can be divided by 1 and by 37.
Therefore, all integers from 1 to 36 are relatively prime to 37
2. Lets n = 35 so ø(n) = ø(35) = 24. 35 can be divided by 1, 5, 7, and 35.
Therefore, integers 1, 2, 1, 2, 3, 4, 6, 8, 9, 11, 12, 13, 16, 17, 18, 19, 22, 23, 24, 26,
27, 29, 31, 32, 33, 34 are relatively prime to 35.

You may ask, I did you found these values (such as ø(35) = 24)?

To find these values:

1. (Case 1) For n = p (a prime), we have that ø(p) = p – 1.
For Example: Lets p = 7 so ø (p) = ø(7), then ø (7) = 7 – 1 = 6.
Therefore ø(7) = 6
2. (Case 2) When n = p^a (power of a prime).
The numbers with common factor with n are: p, 2p, 3p, . . . ,p^(a-1) * p
since there are p^(a-1) of them.
For example: Lets assume we have a prime number p = 5 and a is 2:
ø(p^a) = p^a – p^(a-1) = (p^(a-1)) * (p – 1) = (p^a) * (1 – 1/p)
ø(5^2) = 5^2 – 5^(2 -1) = (5^(2 – 1)) * (5 – 1) = (5^2) * (1 – 1/5)
ø(25) = 5^2 – 5 = 5 * (5 – 1) = (5^2) * (1 – 1/5) = 20
ø(25) = 20 and all integers relative prime to 25 are
1, 2, 3, 4, 6, 7, 8, 9, 11, 12, 13, 14, 16, 17, 18, 19, 21, 22, 23, 24.

As a general case for the Euler’t Totient function ø(n), we have that:

1. Let p be a prime integer dividing n integer so the integers divisible by p are:
p, 2p, 3p, 4p, . . . , (n/p)(p) where there are n/p number of integers.
2. Then, the number of integers not divisible by p are: n – n/p = n * (1 – 1/p)
3. Let q be another prime number dividing n.
If we wish to find the number of integers divisible by neither p or q,
then deduct the n/q multiples of q such that q, 2q, 3q, . . . , (n/q)(q)
4. In case some elements of p and q are common, the n/pq multiples of pq are:
pq, 2pq, 3pq, . . . , (n/pq)(pq) so n/q – n/pq = (n/q)(1- 1/p)
5. Therefore the total of integers not divisible by p or q is:
n(1 – 1/p) – (n/q)(1 – 1/p) = n(1 – 1/p)(1 – 1/q)

General formula for Euler’s Totient Function ø(n):

ø(n) = n * (1 – 1/p1) * (1 – 1/p2) * . . .  * (1 – 1/pm), where p1, p2, . . . , pm are prime factors of n and m is the total number of prime numbers.

Example:

Lets n = 60, p1 = 2, p2 = 4,  p3 = 5 and ø(n= n * (1 – 1/p1) * (1 – 1/p2) * (1 – 1/p3) then

ø( 60) = 60 * (1 – 1/2) * (1 – 1/3) * (1 – 1/5)
ø(60) = (60 – 60/2) * (1 – 1/3) * (1 – 1/5)
ø(60) = (60 – 30) * (1 – 1/3) * (1 – 1/5)
ø(60) = (30) * (1 – 1/3) * (1 – 1/5)
ø(60) = (30 – 30/3) * (1 – 1/5)
ø(60) = (30 – 10) * (1 – 1/5)
ø(60) = (20) * (1 – 1/5)
ø(60) = (20 – 20/5)
ø(60) = (20 – 4)
ø(60) = 16

All integers relative prime to 16 are:
1, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 49, 53, 59

Euler’s Totient Function ø(n) using two Prime Numbers:

Let have two prime number p and q such that p ≠ q so ø(pq) = ø(p)*ø(q) = (p-1)*(q-1) in which

1. The set {1, 2, …, pq -1} of integers is less than pq
2. The integers in the set {1, 2, …, pq – 1} are not relatively prime to pq:
{p, 2p, …, (q – 1)p} and {q, 2q, …, (p – 1)q}
3. ø(pq) = (pq – 1) – [(q-1) + (p-1)]
ø(pq) = pq – p – q +1
ø(pq) = (p-1) * (q-1)
ø(pq) = ø(p)*ø(q)

For example:

ø(n) = ø(pq) = (p-1) * (q-1)
ø(21) = ø(3 * 7)
ø(21) = (3 – 1) * (7 – 1)
ø(21) = 2 * 6
ø(21) = 12

Euler’s Theorem

Euler’s Theorem (also known as Fermat-Euler theorem) establish that for every positive integer a relatively prime to n then

For example:

1. Lets a = 3 and n = 10 then
ø(n) = ø(pq) = (p-1) * (q-1)
ø(10)
= ø(2*5) = (2 – 1) * (5 -1) = (1) * (4) = 4
a
^ø(n) mod n = 1
3^ø(10) mod 10 = 1
3^4 mod 10 = 1
81 mod 10 = 1
2. Lets a = 2 and n = 11 then
ø(n) = ø(p – 1)
ø(11)
= ø(11 – 1) = 10
a
^ø(n) mod n = 1
2
^ø(11) mod 11 = 1
2^10 mod 11 = 1
1024 mod 11 = 1

Primality Testing

1. Very large prime numbers selected at random are necessary for most of cryptographic algorithms.
2. Naïve Algorithm: The objective of this algorithm is to divide a number a by all the numbers in turn that are less than the square root of a. This kind of algorithm works for small numbers, but it inefficient for large numbers.

Miller Rabin Algorithm

Miller Rabin algorithm (also known as Miller-Rabin Primality Test) is an algorithm that return a true or false value depending a given value n. Normally, If it outputs true, then n is “probably prime”, else then n is definitely composite.

Approach 1:

[Split Off Power of]: Lets n > 3 and n be odd, k > 0, and  q odd so

1. [Random Base] Choose a random integer a with 1 < a < n.
2. [Odd Power] Set b = a^n (mod m) so if b = ±1 (mod n) then output true and terminate.
3. [Even Powers] For any r with 1 <= r <= k – 1, if b^2^r = -1 (mod n) then output true and terminate else output false

Approach 2:

1. Lets n > 3 and n be odd, k > 0, and  q odd so .
Divide (n – 1) by 2 until the result is an odd number.
2. Let a be an integer 1 < a < n where n > 2 so
Check which of the following two conditions is true:
(a) ( ) == true ?
(b) There exist 1 <= j <= k such that == true ?
3. If any of the previous conditions (a and b) are true, then n may not be a prime number.

Example:

1. Lets n = 2047 such that 2047 = 23 * 89.
2. If so n – 1 = 2^1 * 1023 then
3. 2^1023 mod 2047 = 1
4. However, 2047 is not a prime

Approach 3: (Similar to approach 1)

1. Check if n integer value is prime or not
2. If n is prime then find integers k > 0, q being odd, such that is true.
3. if is true then output is true (n maybe prime) else
4. Check for every value of j going from 1 to k if is true.
If true then output true (n maybe prime) else
5. return false (n is not prime)

Probabilistic Consideration

For an odd no prime number n and a randomly chosen integer a where 1 < a < n -1,
we can expect a probability of failure in detecting  that n is not a prime number of less than one quarter of the probabiblities.

If we repeat the Millan Rabin algorithm with different values of a, there is a chance that we find a “maybe” prime number n after trying a t number of tests:

Probabilities of finding a “maybe” prime number n after t test are:
Pr(n maybe a prime number after t tests) = (1/4)^t

For example:
Lets assume we wish perform t = 10 tests using different values of a, we have less than 10^-6 probabilities to find an n that maybe a prime number.

Extra Examples

Lets have a = b mod p such that we wish to know a, b = 5^6 and p is 23 so a = 5^6 mod 23

How can we solve this? Using Modulus Arithmetic. One of the properties say that C^(ab) mod p = (C^a mod p)^b mod p

So,

5^6 mod 23 => 5^(2*3) mod 23 => (5^2 mod 23)^3 mod 23 => (25 mod 23)^3 mod 23

The remaider of 25 mod 23 is 2 (23 = 0, 24 = 1, 25 = 2) or you could divide 25 by 23: 23 * 1 = 23 => 25 – 23  = 2 remainer

(25 mod 23)^3 mod 23 => (2)^3 mod 23 => 8 mod 23 = 8 (is less than 23 so is inside the modulus)

## Example Generating Prime Numbers using Sieve of Eratosthenes Algorithm

Example of how to generate prime numbers using Sieve of Eratosthenes algorithm.

NOTIFICATION: These examples are provided for educational purposes. Using this code is under your own responsibility and risk. The code is given ‘as is’. I do not take responsibilities of how they are used.

primes.cpp:

#include<iostream>
#include<vector>
#include<stdio.h>
#include<ctime>
#include<math.h>
#include<string.h>
using namespace std;

//
// generatePrimesSlow()
// The array arr store the prime numbers up to and including x
// To test if a number i is prime, see if any prime number
// before i divides i evenly. If no prime number does, i is prime
// and is added to our array of prime numbers.
// Note: We should never see a number less than 2 in our array!
//
void generatePrimesSlow(int x, int * arr, int * amount)
{
int count = 0; // numbers currently in the array

for(int i=2; i<=x; i++) {
bool isPrime = true;
for (int j=0; j<count; j++) {
if (i % arr[j] == 0) {
isPrime = false;
break;
}
}
if (isPrime) {
arr[count] = i;
count++;
}
}
*amount = count;
}

//
// generatePrimesFast()
// The array arr stores our prime numbers up to and including x
// To generate these numbers, we use the the Sieve of Eratosthenes
// Visit http://en.wikipedia.org/wiki/Sieve_of_Eratosthenes
// for the explanation of the algorithm.
//
void generatePrimesFast(int x, int * arr, int * amount)
{
int num = 2;
int count = 0;
bool *boolArr = new bool[x+1];
//bool boolArr[x];
memset(boolArr, true, (x+1)*sizeof(bool));
for(int i=2; i<=x; i++) {
if (boolArr[i]) {
arr[count] = i;
count++;
int temp = i+i;
while (temp <= x) {
boolArr[temp] = false;
temp += i;
}
}
}
*amount = count;
}

int main() {
cout << 'Up to what number would you like to generate primes? ';
int max;
cin >> max;
cout << endl;

// This will be our array to hold the prime numbers.
// Notice that this is probably way too much memory, since not every
// number up to max will be prime
// In fact, very very few numbers will be, let's try to free up some
// memory by using some math
// I think a bound for the number of primes up to N is N/lg(N)
// Let's try it

int amount = 0;
int num_primes;
if (max > 150) {
double x = max;
double actualNumberOfPrimes = x/(log(x)-4);
//double actualNumberOfPrimes = x/(log(x));
num_primes = (int) actualNumberOfPrimes;
}
else
num_primes = max;
int arr[num_primes+1];
memset(arr,0,sizeof(arr));
//generatePrimesFast(max, arr, &amount);
generatePrimesSlow(max, arr, &amount);

cout << 'Here are the prime numbers from 2 to ' << max << endl;
for (int i=0; i < amount; i++) {
cout << arr[i] << endl;
}
}

If you encounter any problems or errors, please let me know by providing an example of the code, input, output, and an explanation. Thanks.

## Code Examples in C++

Here are some code examples written in C++
Even do they are written in C++, I would advice to compile them in Linux as I did. If you encounter any problems or errors, please let me know by providing an example of the code, input, output, and an explanation. Thanks
NOTIFICATION: These examples are provided for educational purposes. Using this code is under your own responsibility and risk. I do not take responsibilities of how they are used.