Ethoryx uses formally proved mathematical structure to generate cryptographic primes with far fewer primality tests — for RSA, FHE, and zk-SNARK applications. Three independent layers. Verified. As key sizes grow, the savings compound.
Standard prime generation searches blindly. Ethoryx uses a formally proved approach to generate only valid candidates — before any expensive test runs.
A formally proved mathematical constraint eliminates numbers that cannot be prime before any computation begins. No guessing. No wasted iterations. Derived from the Tesfa Grid geometric framework.
Formally proved · Tesfa GridAdditional screening layers further reduce the candidate pool before any primality test is called. Each layer is mathematically justified — not heuristic. The result: 66-79% fewer primality tests.
66-79% test reduction · measuredOnly validated candidates reach the final primality test. We use the industry-standard witness set — deterministically correct for all practical RSA key sizes. Same certainty. Reached faster.
Deterministic · no false positivesEvery prime is selected from a cryptographically random start. The pre-filtering only removes impossible candidates — every valid prime remains reachable with equal probability. Security is unchanged.
CSPRNG random · uniform distributionThe same prime. A fundamentally different path to find it.
NTT candidate filtering is machine-independent — it measures pre-filtering work before any primality test. Verified independently on two machines with 150 total trials.
512-bit primes · NTT candidates before primality test · 150 total trials · theorem compliance 100% on all generated primes
Measured on Hetzner VPS · Ethoryx C/GMP Core v1.0 · GMP 6.3.0 · GCC -O3 -march=native
Any system generating RSA or ECC keys benefits. The larger the key, the greater the savings.
Millions of TLS certificates issued, each requiring RSA prime generation. At 2048-bit: 554 fewer primality tests per certificate. At scale across millions of certificates, compute savings are measurable.
Hardware security modules generate RSA keys continuously. Ethoryx C/GMP Core reduces computation per key by 66–79% and eliminates timing variability in candidate generation — a property valued in FIPS-compliant implementations.
Every secure API call, digital signature, and encrypted transaction uses RSA or ECC. Companies upgrading to 3072-bit for NIST compliance need efficient, formally proved prime generation at scale.
Any application generating RSA keys benefits. Open-source Python library for integration. REST API with a free tier for testing and small projects. Academic paper for those who need the formal proof.
Every Ethoryx product runs on the same C/GMP Core — formally proved, measured, production-ready.
Standard RSA prime generation accelerated by the Tesfa Grid Sieve. 79% fewer Miller-Rabin tests at 1024-bit. Drop-in for OpenSSL, GnuTLS, and any RSA key generation pipeline.
/v1/generate?bits=1024&method=wheel
NTT-compatible primes satisfying q ≡ 1 (mod 2n) for any polynomial degree n. Required for FHE schemes (SEAL, OpenFHE, HEAAN), zk-SNARKs (Groth16, PLONK), and post-quantum signature schemes (Dilithium, Falcon internals).
/v1/generate/ntt?bits=1024&ntt_mod=4096
Generates full coefficient modulus chains for Fully Homomorphic Encryption — the set of NTT primes that define the RNS decomposition in SEAL and OpenFHE. Each prime in the chain satisfies both Theorem 7 and the NTT constraint simultaneously.
/v1/generate/fhe?n=4096&count=5&bits_each=55
The C/GMP Core as embedded firmware for Hardware Security Modules. One integration replaces the prime generation layer in Thales Luna, Utimaco, and nCipher products — enabling PQC-compliant key generation without hardware replacement. Licensing from $50,000.
REST API, zero dependencies, any language.
Same quality at every tier. Cancel any time.
HSM / hardware licensing from $50,000 one-time · Contact us
Security proof published on IACR ePrint and arXiv. Every generated prime is drawn from the full distribution with equal probability. No prime excluded.
Constant-time candidate generation — no variable rejection loop. Critical for hardware security modules and FIPS compliance environments.
Core algorithm MIT-licensed on GitHub. Full source available. The API adds infrastructure — not secrecy. Inspect everything.
IACR ePrint and arXiv. Complete security proof. All benchmark data. Seven sections.
Tesfa Grid Sieve: Theorem-Guided Prime Generation — Tesfaye Dereje, JFS, 2026