Browse Definitions:
Definition

# Mersenne prime (or Marsenne prime)

A Mersenne (also spelled Marsenne) prime is a specific type of prime number. It must be reducible to the form 2 n - 1, where n is a prime number. The term comes from the surname of a French monk who first defined it. The first few known values of n that produce Mersenne primes are where n = 2, n = 3, n = 5, n = 7, n = 13, n = 17, n = 19, n = 31, n = 61, and n = 89.

With the advent of computers to perform number-crunching tasks formerly done by humans, ever-larger Mersenne primes (and primes in general) have been found. The quest to find prime numbers is akin to other numerical searches done by computers. Examples are the decimal expansions of irrational numbers such as pi (the circumference-to-diameter ratio of a circle) or e (the natural logarithm base). But the 'next' prime is more difficult to find than the 'next' digit in the expansion of an irrational number.

It takes the most powerful computer a long time to check a large number to determine if it is prime, and an even longer time to determine if it is a Mersenne prime. For this reason, Mersenne primes are of particular interest to developers of strong encryption methods.

In August 2008, Edson Smith, a system administrator at UCLA, found the largest prime number known to that date. Smith had installed software for the Great Internet Mersenne Prime Search (Gimps), a volunteer-based distributed computing project.  The number (which is a Mersenne prime) is 12,978,189 digits long. It would take nearly two-and-a-half months to write out and, if printed, would stretch out for 30 miles.

This was last updated in March 2011

### 1 comment

Send me notifications when other members comment.
I think that there shouldn't be any largest prime number, because if M44 is the largest prime by mersenne's prime, then 2^M44-1 should be the largest prime and so on.
Cancel

## SearchCompliance

• ### risk map (risk heat map)

A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

• ### internal audit (IA)

An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

• ### pure risk (absolute risk)

Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

## SearchCloudProvider

• ### cloud ecosystem

A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

• ### cloud services

Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

• ### uncloud (de-cloud)

The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

## SearchSecurity

• ### federated identity management (FIM)

Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

• ### cross-site scripting (XSS)

Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

• ### firewall

In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...

## SearchHealthIT

• ### 21st Century Cures Act

The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

• ### vendor neutral archive (VNA)

A vendor neutral archive (VNA) is a technology that stores medical images in a standard format and interface, making them ...

• ### HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009

The HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 is legislation that was created to ...

## SearchDisasterRecovery

• ### crisis management plan (CMP)

A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

• ### business continuity and disaster recovery (BCDR)

Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

• ### business continuity plan (BCP)

A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

## SearchStorage

A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

• ### all-flash array (AFA)

An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

• ### volume manager

A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

## SearchSolidStateStorage

• ### hybrid hard disk drive (HDD)

A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close