TesfahSec uses a proprietary mathematical approach — formally proved and independently verified — to generate cryptographic primes with far fewer primality tests. As key sizes grow, the savings compound.
Standard prime generation searches blindly. TesfahSec uses a formally proved approach to generate only valid candidates — before any expensive test runs.
A formally proved mathematical constraint eliminates numbers that cannot be prime before any computation begins. No guessing. No wasted iterations. Derived from the Tesfa Grid geometric framework.
Formally proved · Tesfa GridAdditional screening layers further reduce the candidate pool before any primality test is called. Each layer is mathematically justified — not heuristic. The result: 66–79% fewer primality tests.
66–79% test reduction · measuredOnly validated candidates reach the final primality test. We use the industry-standard witness set — deterministically correct for all practical RSA key sizes. Same certainty. Reached faster.
Deterministic · no false positivesEvery prime is selected from a cryptographically random start. The pre-filtering only removes impossible candidates — every valid prime remains reachable with equal probability. Security is unchanged.
CSPRNG random · uniform distributionThe same prime. A fundamentally different path to find it.
Miller-Rabin test count is machine-independent — it measures algorithmic work. Verified independently on two machines with 150 total trials.
512-bit primes · 150 total trials · theorem compliance 100% on all generated primes
Any system generating RSA or ECC keys benefits. The larger the key, the greater the savings.
Millions of TLS certificates issued, each requiring RSA prime generation. At 2048-bit: 554 fewer primality tests per certificate. At scale across millions of certificates, compute savings are measurable.
Hardware security modules generate RSA keys continuously. TesfahSec reduces computation per key and eliminates timing variability in candidate generation — a property valued in FIPS-compliant implementations.
Every secure API call, digital signature, and encrypted transaction uses RSA or ECC. Companies upgrading to 3072-bit for NIST compliance need efficient, formally proved prime generation at scale.
Any application generating RSA keys benefits. Open-source Python library for integration. REST API with a free tier for testing and small projects. Academic paper for those who need the formal proof.
REST API, zero dependencies, any language.
Same quality at every tier. Cancel any time.
HSM / hardware licensing from $50,000 one-time · Contact us
Security proof published on IACR ePrint and arXiv. Every generated prime is drawn from the full distribution with equal probability. No prime excluded.
Constant-time candidate generation — no variable rejection loop. Critical for hardware security modules and FIPS compliance environments.
Core algorithm MIT-licensed on GitHub. Full source available. The API adds infrastructure — not secrecy. Inspect everything.
IACR ePrint and arXiv. Complete security proof. All benchmark data. Seven sections.
Tesfa Grid Sieve: Theorem-Guided Prime Generation — Tesfaye Dereje, JFS, 2026