Published October 31, 2025 | Version 1.0
Working paper Open

Prime Duality: Decoupling Computational Utility and Cryptographic Security

  • 1. QNFO

Description

The use of prime numbers for both canonical data encoding and cryptographic security has created a fundamental, long-term conflict in computer science. The migration to post-quantum standards, driven by the threat of quantum algorithms, reveals an implicit but unformalized design principle: selecting for mathematical problems that are hard but lack the broad “constructive utility” of integer factorization. This work provides a formal framework to classify computational hardness assumptions based on their intrinsic algebraic and geometric properties. We argue that a problem’s potential for constructive utility is a direct function of its underlying algebraic structure, such as supporting unique, canonical decompositions in an abelian group. By analyzing the properties of integer factorization versus those of lattice-based problems, we formalize the “hardness without utility” principle, providing a theoretical explanation for the ongoing cryptographic transition. The proposed taxonomy offers a constructive methodology for the design and evaluation of future cryptographic systems, ensuring security is decoupled from general computational utility.

Files

Prime Duality.pdf

Files (380.1 kB)

Name Size Download all
md5:fdbc31bd460ff9ce1279b62aa141a373
5.0 kB Preview Download
md5:e598dd076ed72b38eb7d72452b881005
7.4 kB Preview Download
md5:13642581946466f245dd882ae25452a3
4.6 kB Preview Download
md5:8a6331f9dbf25c188c9b9d92e2a062e3
3.8 kB Preview Download
md5:342dfbe3d69675afda795d6060846535
6.3 kB Preview Download
md5:76e5d52ec641f564d9e251a533fc0b75
3.5 kB Preview Download
md5:9b3fde29af1fe31d584f61f6b71b5afd
6.8 kB Preview Download
md5:a06a3cb47d21acf9698e1d7271ec51a2
7.0 kB Preview Download
md5:60af38671c8a05de5fa57857bc200841
3.8 kB Preview Download
md5:a9088a5da284f362324f84920ebdb121
4.9 kB Preview Download
md5:7b84b00257f4eacfd88d25f2aded88c4
8.4 kB Preview Download
md5:b596febb368cfb2a176cf631ea062fd3
3.7 kB Preview Download
md5:48dda5db4b29ff1c4c9066490fd968b0
5.0 kB Preview Download
md5:ac6f1019310465e77552fbf4e5cdfed3
4.4 kB Preview Download
md5:5b9621376aaa8a2b8ad76dee3c732816
12.1 kB Preview Download
md5:e55271330f6a341ca017bfc8b9e200f6
13.4 kB Preview Download
md5:393d80804cdead45c19ee81147504605
9.0 kB Preview Download
md5:dd7f2681d36c0ef5441671ac762e93cb
16.6 kB Preview Download
md5:522c7d6ad44bcadb9b474aeac654c6ac
16.8 kB Preview Download
md5:d0cbd1d40e03db6536da27d510c2c531
12.5 kB Preview Download
md5:a519a0de3259b680de9bae09c4924ed6
180.9 kB Preview Download
md5:de3bc9c5277d117d7ecf181b11400409
3.7 kB Preview Download
md5:08cb5f3b070b1962b61c33ea309051a6
14.8 kB Preview Download
md5:fb1a52521edfe7d8251eac953a2f0d67
15.5 kB Preview Download
md5:12977a4193051e1b6e71fccfe6090f52
4.0 kB Preview Download
md5:f1432365aae567eabe9cb0104cbae4b4
6.3 kB Preview Download