Search results
Results from the WOW.Com Content Network
A modular multiplicative inverse of a modulo m can be found by using the extended Euclidean algorithm. The Euclidean algorithm determines the greatest common divisor (gcd) of two integers, say a and m. If a has a multiplicative inverse modulo m, this gcd must be 1. The last of several equations produced by the algorithm may be solved for this gcd.
The modular multiplicative inverse is defined by the following rules: Existence: There exists an integer denoted a −1 such that aa −1 ≡ 1 (mod m) if and only if a is coprime with m. This integer a −1 is called a modular multiplicative inverse of a modulo m.
Finally, given a, the multiplicative inverse of a modulo n is an integer x satisfying ax ≡ 1 (mod n). It exists precisely when a is coprime to n , because in that case gcd( a , n ) = 1 and by Bézout's lemma there are integers x and y satisfying ax + ny = 1 .
With that provision, x is the modular multiplicative inverse of a modulo b, and y is the modular multiplicative inverse of b modulo a. Similarly, the polynomial extended Euclidean algorithm allows one to compute the multiplicative inverse in algebraic field extensions and, in particular in finite fields of non prime order.
In modular arithmetic, the modular multiplicative inverse of a is also defined: it is the number x such that ax ≡ 1 (mod n). This multiplicative inverse exists if and only if a and n are coprime. For example, the inverse of 3 modulo 11 is 4 because 4 ⋅ 3 ≡ 1 (mod 11). The extended Euclidean algorithm may be used to compute it.
The modular inverse of aR mod N is REDC((aR mod N) −1 (R 3 mod N)). Modular exponentiation can be done using exponentiation by squaring by initializing the initial product to the Montgomery representation of 1, that is, to R mod N, and by replacing the multiply and square steps by Montgomery multiplies.
Get AOL Mail for FREE! Manage your email like never before with travel, photo & document views. Personalize your inbox with themes & tabs. You've Got Mail!
The RSA cryptosystem is based on this theorem: it implies that the inverse of the function a ↦ a e mod n, where e is the (public) encryption exponent, is the function b ↦ b d mod n, where d, the (private) decryption exponent, is the multiplicative inverse of e modulo φ(n).