Browse Definitions :
Definition

# Fermat prime

A Fermat prime is a Fermat number that is also a prime number . A Fermat number F n is of the form 2 m + 1, where m is the n th power of 2 (that is, m = 2 n , where n is an integer ). To find the Fermat number F n for an integer n , you first find m = 2 n , and then calculate 2 m + 1. The term arises from the name of a 17th-Century French lawyer and mathematician, Pierre de Fermat, who first defined these numbers and noticed their significance.

Fermat believed that all numbers of the above form are prime numbers; that is, that F n is prime for all integral values of n . This is indeed the case for n = 0, n = 1, n = 2, n = 3, and n = 4:

When n = 0, m = 2 = 1; therefore
F = 2 1 + 1 = 2 + 1 = 3, which is prime

When n = 1,? m = 2 1 = 2; therefore
F 1 = 2 2 + 1 = 4 + 1 = 5, which is prime

When n = 2, m = 2 2 = 4; therefore
F 2 = 2 4 + 1 = 16 + 1 = 17, which is prime

When n = 3, m = 2 3 = 8; therefore
F 3 = 2 8 + 1 = 256 + 1 = 257, which is prime

When n = 4, m = 2 4 = 16; therefore
F 4 = 2 16 + 1 = 65536 + 1 = 65537, which is prime

Using computers, mathematicians have not yet found any Fermat primes for n greater than 4. So far, Fermat's original hypothesis seems to have been wrong. The search continues for Fermat numbers F n that are prime when n is greater than 4.

Compare Mersenne prime .

This was last updated in September 2005

• compliance risk

Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

• information governance

Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

• enterprise document management (EDM)

Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

• Extensible Authentication Protocol (EAP)

The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

• session key

A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

• data breach

A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

• risk mitigation

Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

• call tree

A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

• Disaster Recovery as a Service (DRaaS)

Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

• cloud storage

Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

• cloud testing

Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

• storage virtualization

Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close